Title :
Performance analysis of VoIP spoofing attacks using classification algorithms
Author :
Vennila, G. ; Shalini, N. Supriya ; Manikandan, M.S.K.
Author_Institution :
Dept. of Electron. & Commun. Eng, Thiagarajar Coll. of Eng., Madurai, India
fDate :
Feb. 27 2014-March 1 2014
Abstract :
Voice over Internet Protocol (VoIP) is an emerging trend of applications on the internet today. As with any recent technology, VoIP also introduces both fortuity and problems. Existing VoIP honeypot experimental set ups based on SIP (Session Initiation Protocol) deals with the basic attacks like DoS (Denial of Service), enumeration detection, signature collection and SPIT (Spam over Internet Telephony). These VoIP service abuse attacks cause discrepancy between the services offered to the VoIP users and service providers. We executed successive attempts with different sets of attributes and sample subsets to collect exact traffic records used for detecting and categorizing the attack packets using honeypot. Finally, a comparison of both the algorithms with its true and false positive rates is evaluated. For result analysis, we propose a test-bed using Zoiper (SIP clients), Asterisk server, Artemisa honeypot and Wireshark as network analyzer. The test-bed demonstrates how the honeypot effectively works in improvising the robustness of the VoIP security system from billing attacks and toll frauds.
Keywords :
Internet telephony; computer network security; signalling protocols; Artemisa honeypot; Asterisk server; DoS; SIP; SPIT attack; Session Initiation Protocol; Spam over Internet telephony; VoIP honeypot experimental set; VoIP security; VoIP spoofing attacks; Wireshark; Zoiper; attack packets; billing attacks; classification algorithms; denial-of-service attack; enumeration detection attack; false positive rates; network analyzer; performance analysis; service providers; signature collection attack; toll frauds; traffic records; true positive rates; voice over Internet Protocol; Algorithm design and analysis; Classification algorithms; Feature extraction; IP networks; Protocols; Security; Servers; Bye Delay Attack; Fake Busy attack; Invite replay attack; Registration hijacking; VoIP Honeypot; VoIP Service abuse attack;
Conference_Titel :
Applications and Innovations in Mobile Computing (AIMoC), 2014
Conference_Location :
Kolkata
DOI :
10.1109/AIMOC.2014.6785540