DocumentCode :
2124792
Title :
Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms
Author :
Rafique, M. Zubair ; Khan, Zeeshan Shafi ; Khan, Muhammad Khurram ; Alghatbar, Khaled
Author_Institution :
Center of Excellence in Inf. Assurance (CoEIA), King Saud Univ., Riyadh, Saudi Arabia
fYear :
2011
fDate :
11-13 April 2011
Firstpage :
559
Lastpage :
563
Abstract :
Modern communication infrastructure (IP Multimedia Subsystem (IMS) and Voice over IP (VoIP)) are vulnerable to zero day attacks and unknown threats. Anomalous SIP requests can be used to remotely launch malicious activity. Furthermore, anomalous messages are capable of crashing - sometimes with one message only - servers and end points. Recently, it is shown that a malicious SIP message "INVITE of Death" crash a server or gain unfettered access to it. In contrast, little research is done to protect IMS against such anomalous messages. In this paper, we propose an anomalous message detection framework that extracts novel syntactical features from SIP messages at the P-CSCF of an IMS. Our framework operates in four steps: (1) analyzes the byte-level distribution of SIP message, (2) extracts spatial features from IMS messages in form of byte transition probabilities, (3) uses well-known feature selection scheme to remove redundancy in the features set, and (4) uses standard machine learning algorithms to raise the final alarm. The benefit of our framework is that it is lightweight requiring less processing and memory resources and provides high detection accuracy. We have evaluated our system on a real-world IMS dataset consisting of more than 10, 000 benign and malicious SIP messages. The results of our experiments demonstrate that using machine learning algorithms, our framework achieves detection accuracy of more than 99%. Last but not least, its testing time is 152μ seconds per packet, as a result, it can be easily deployed on IMS core.
Keywords :
Internet telephony; learning (artificial intelligence); multimedia communication; security of data; signalling protocols; IP-multimedia subsystem; P-CSCF; SIP; Voice over IP; anomalous message; byte-level distribution; feature extraction; machine learning; malicious activity; proxy call state control function; Accuracy; Feature extraction; Machine learning algorithms; Protocols; Security; Servers; Testing; IMS Security; INVITE of Death; Machine Learning; SIP Security; VoIP Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology: New Generations (ITNG), 2011 Eighth International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-61284-427-5
Electronic_ISBN :
978-0-7695-4367-3
Type :
conf
DOI :
10.1109/ITNG.2011.102
Filename :
5945297
Link To Document :
بازگشت