In this paper we address the issue of denial of service (DoS) attacks targeting the hardware and software of voice over IP servers or by misusing specific signaling protocol features. As a signaling protocol we investigate here the session initiation protocol (SIP). In this context we mainly identify attacks based on exhaustion of the memory of VoIP servers, attacks on the CPU or by causing excessive communication with external servers such as DNS or authentication servers. We address two kinds of attacks: wanted attacks caused by malicious users and unwanted attacks caused by network misconfigurations, broken implementations or any other unknowledgeable technology use. A major conclusion of the work is the knowledge that SIP provides a wide range of features that can be used to mount DoS attacks. Discovering these attacks is inherently difficult, as is the case with DoS attacks on other IP components. However, with adequate server design, efficient implementation and appropriate hardware the effects of a large portion of attacks can be reduced. Besides the server implementation and hardware we present different optimizations that reduce the need for contacting DNS servers using caches, policies and extensions to the SIP messages. Further, to reduce the risk of being attacked we describe issues of message monitoring and filtering as well as authentication approaches for different kinds of users.
[1]
Stefan Savage,et al.
Inferring Internet denial-of-service activity
,
2001,
TOCS.
[2]
John D. Howard,et al.
An analysis of security incidents on the Internet 1989-1995
,
1998
.
[3]
K.K. Tam,et al.
Session Initiation Protocol
,
2002,
2002 IEEE International Conference on Industrial Technology, 2002. IEEE ICIT '02..
[4]
Jonathan D. Rosenberg,et al.
Middlebox communication architecture and framework
,
2002,
RFC.
[5]
Martin P. Loeb,et al.
CSI/FBI Computer Crime and Security Survey
,
2004
.
[6]
Bill Marshall.
SIP Extensions for supporting Distributed Call State
,
2000
.
[7]
Kevin J. Houle,et al.
Trends in Denial of Service Attack Technology
,
2001
.
[8]
Christian Huitema,et al.
STUN - Simple Traversal of UDP Through NATs
,
2002
.
[9]
Lawrence C. Stewart,et al.
HTTP Authentication: Basic and Digest Access Authentication
,
1999
.
[10]
Christopher Allen,et al.
The TLS Protocol Version 1.0
,
1999,
RFC.