DocumentCode :
1999532
Title :
Detection of Resource-Drained Attacks on SIP-Based Wireless VoIP Networks
Author :
Tang, Jin ; Hao, Yong ; Cheng, Yu ; Zhou, Chi
Author_Institution :
Dept. of Electr. & Comput. Eng., Illinois Inst. of Technol., Chicago, IL, USA
fYear :
2010
fDate :
6-10 Dec. 2010
Firstpage :
1
Lastpage :
5
Abstract :
The Session Initiation Protocol (SIP) has been widely used in VoIP for session control and management. As the basic SIP specifications do not require the proxy servers to track the states of established sessions, an extension header field "Session-Expires" has been proposed for SIP to allow the proxy server to hold resources for established sessions just within the specified periods. In this paper, we identify a novel denial of service (DoS) attack utilizing this SIP extension to drain resources of the proxy servers in wireless VoIP. In particular, by deliberately setting a large value of the "Session-Expires\´\´ header and then physically disconnecting from the wireless network, attackers can repeatedly hold resources of the proxy server as long as they want. Also, the low-volume nature of the attack allows it to avoid being detected by existing volume-based intrusion detection systems. As a counter-measure, we propose a robust detection scheme based on the statistical Anderson-Darling test. The key insight that leads to the scheme is the changed statistical property of the header values induced by the attack. We validate the performance through computer simulation. The scheme shows its ability to detect the attack and is even more effective when applied against the distributed denial of service (DDoS) attack.
Keywords :
Internet telephony; signalling protocols; statistical testing; telecommunication security; DDoS attack; SIP-based wireless VoIP network; Session Initiation Protocol; attack detection; distributed denial of service attack; proxy server; resource-drained attack; session control; session management; session-expires; statistical Anderson-Darling test; statistical property; volume-based intrusion detection system; Computer crime; Intrusion detection; Protocols; Robustness; Servers; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE
Conference_Location :
Miami, FL
ISSN :
1930-529X
Print_ISBN :
978-1-4244-5636-9
Electronic_ISBN :
1930-529X
Type :
conf
DOI :
10.1109/GLOCOM.2010.5684028
Filename :
5684028
Link To Document :
بازگشت