Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3640115.3640226acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciteeConference Proceedingsconference-collections
research-article

A SIP-Based Flooding Attack Detection Method in VoIP Environment

Published: 26 March 2024 Publication History
  • Get Citation Alerts
  • Abstract

    With the continuous development of soft-switch networks and IP networks, VoIP has become the main application and medium for IP-based multimedia communication, and the security threats it faces have become an important issue. Therefore, network attack detection for VoIP services and infrastructure has become a hot topic for current IP call security protection. Based on the research of VoIP platform system in a national network project, we find that its existing network protection approaches are mainly for network layer and non-real-time application protection, and lacks the security protection capability of VoIP real-time communication based on SIP at the application layer. Thus this paper aims to improve the security of VoIP platform communication through the research of key technologies of network attack call detection based on SIP.

    References

    [1]
    Schulzrinne, H. (1999), Converging on Internet Telephony IEEE internet Computing.
    [2]
    Liang Hao, Sun Jian, Xu Du. Analysis of subscriber line DoS attacks generated by legitimate signaling in telecommunication networks[J]. Journal of Information Engineering University, 2010, 11(5): 517-520.Carl G. Denial-of-service attack- detection techniques [J]. Internet Computing, IEEE, 2006, 10(1): 82-89.
    [3]
    Ohsita Y, Ata S, Murata M. Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically[C]. Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE.
    [4]
    S. Ehlert, D. Geneiatakis, and T. Magedanz, “Survey of network security systems to counter SIP-based denial-of-service attacks,” Comput. Secur., vol. 29, no. 2, pp. 225–243, Mar. 2010.
    [5]
    I. M. Tas, B. G. Unsalver, and S. Baktir, “A novel SIP based distributed reflection denial-of-service attack and an effective defense mechanism,”IEEE Access, vol. 8, pp. 112574–112584, 2020.
    [6]
    Iancu B. SER PIKE Excessive Traffic Monitoring Module[EB/OL].[2011-05-10].
    [7]
    I. Hussain, S. Djahel, D. Geneiatakis, F. Nait-Abdesselam, “A Lightweight Countermesaure to Cope with Flooding Attacks against Session Initiation Protocol,” Wireless and Mobile Networking Conference (WMNC), 2013 6th Joint IFIP, pp.1-5, 23-25 April 2013.
    [8]
    J. Stanek and L. Kencl, "SIPp-DD: SIP DDoS Flood-Attack Simulation Tool," 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), Lahaina, HI, USA, 2011, pp. 1-7.
    [9]
    F.E. Goncalves, Building Telephony Systems with OpenSIPS 1.6, Packt Publishing Ltd, UK, 2010.
    [10]
    D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, K. Ehlert, and D. Sisalem, “Survey of security vulnerabilities in session initiation protocol,” IEEE Commun. Surveys Tuts., vol. 8, no. 3, pp. 68–81, 3rd Quart., 2006.
    [11]
    “VoIP Security and Privacy Threat Taxonomy –Public Release 1.0”, VOIPSA, October 2005.
    [12]
    Jayashree Pougajendy, Arun Raj Kumar Parthiban, Detection of SIP-Based Denial of Service Attack Using Dual Cost Formulation of Support Vector Machine, The Computer Journal, Volume 60, Issue 12, December 2017.

    Cited By

    View all
    • (2024)Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP StreamsTelecom10.3390/telecom50300295:3(556-587)Online publication date: 8-Jul-2024

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICITEE '23: Proceedings of the 6th International Conference on Information Technologies and Electrical Engineering
    November 2023
    764 pages
    ISBN:9798400708299
    DOI:10.1145/3640115
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 March 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Denial of Service
    2. INVITE flood attacks
    3. Intrusion detection
    4. SIP
    5. Threshold-based detection
    6. VoIP security

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICITEE 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP StreamsTelecom10.3390/telecom50300295:3(556-587)Online publication date: 8-Jul-2024

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media