DocumentCode :
3128950
Title :
Using a Trust Model to Reduce False Positives of SIP Flooding Attack Detection in IMS
Author :
Chaisamran, Noppawat ; Okuda, Takafumi ; Yamaguchi, Satarou
Author_Institution :
Grad. Sch. of Inf. Sci., Nara Inst. of Sci. & Technol., Nara, Japan
fYear :
2013
fDate :
22-26 July 2013
Firstpage :
254
Lastpage :
259
Abstract :
The IP Multimedia Subsystem (IMS) is constantly evolving to meet the growth of mobile services and Internet applications. One major security problem of the IMS is flooding attacks. There are many works that have been proposed to detect such attacks. However, generally, the detection systems trigger many alarms and most of them are false positives. These false alarms impact the quality of the detection. In this paper, we first present a method to improve the detection accuracy of SIP flooding detection in IMS by using a trust model. The trust value is calculated by a communication activity between a caller and a callee. By this algorithm, the trust value of an attacker is lower than a legitimate user because it does not have real human activities. To evaluate the proposed method, we integrate the trust model with three SIP flooding attack detection algorithms: Cumulative sum, Hellinger distance, and Tanimoto distance. The system is evaluated by using a comprehensive traffic dataset that consists of varying legitimate and malicious traffic patterns. The experimental results show that the trust integration method can reduce false alarms and improve the accuracy of the flooding attack detection algorithms.
Keywords :
IP networks; Internet; computer network security; mobile computing; multimedia communication; trusted computing; Hellinger distance; IMS; IP Multimedia Subsystem; Internet applications; SIP flooding attack detection; Tanimoto distance; caller-callee communication activity; cumulative sum; detection system; false positives reduction; legitimate traffic patterns; legitimate user; malicious traffic patterns; mobile services; security problem; trust integration method; trust model; trust value; Accuracy; Detection algorithms; High definition video; IP networks; Market research; Testing; Training; False Positive; Flooding Attacks; IMS; Trust;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Software and Applications Conference Workshops (COMPSACW), 2013 IEEE 37th Annual
Conference_Location :
Japan
Type :
conf
DOI :
10.1109/COMPSACW.2013.35
Filename :
6605798
Link To Document :
بازگشت