DocumentCode :
2824923
Title :
A whitelist approach to protect SIP servers from flooding attacks
Author :
Chen, Eric Y. ; Itoh, Mistutaka
Author_Institution :
NTT Inf. Sharing Platform Labs., NTT Corp., Musashino, Japan
fYear :
2010
fDate :
8-10 June 2010
Firstpage :
1
Lastpage :
6
Abstract :
As SIP-based VoIP services are expected to slowly replace the traditional PSTN services, SIP servers are becoming potential targets of various attacks, one of which is flooding. In this paper, we argue that whitelist, as a strategy to defend against flooding attacks, can be more effective on a SIP server than a Web server. Since most SIP clients tend to have persistent connections with their server, and a whitelist is relatively easy to maintain. The methodology we propose to build a whitelist is capable of keeping the most comprehensive and up-to-date information about the legitimate SIP clients without any integration with a SIP server. We also study the impact of various attacks on a SIP server, and evaluate the effectiveness of our approach under the most powerful attacks.
Keywords :
Internet telephony; client-server systems; computer network security; signalling protocols; PSTN services; SIP clients; SIP servers; SIP-based VoIP services; Web server; flooding attacks; persistent connections; whitelist; Authentication; Computer crime; Floods; IP networks; Registers; Web server; DoS attacks; SIP; VoIP security; flooding; whitelist;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications Quality and Reliability (CQR), 2010 IEEE International Workshop Technical Committee on
Conference_Location :
Vancouver, BC
Print_ISBN :
978-1-4244-7795-1
Type :
conf
DOI :
10.1109/CQR.2010.5619917
Filename :
5619917
Link To Document :
بازگشت