Comparative study on DOS attacks Detection Techniques in SIP-based VOIP networks

Thanks to the low cost of communication provided by Voice over Internet Protocol (VoIP) networks, the use of VoIP services has significantly increased. Session Initiation Protocol (SIP) is the main protocol used for nowadays VoIP services. Being a text based protocol and implemented in an open environment, SIP is exposed to various security threats including flooding. One of the most well-known attacks is Denial of Service. Given this, numerous flooding detecting techniques were designed. Our paper will focus on presenting a study of those different techniques, and comparing two specific proposed mechanisms for detecting anomalies and alerting users of possible intrusions. Besides, we propose a new VoIP scheme of detecting attacks, so as to protect private communications and raise security awareness in SIP-based VoIP networks.

[1]  Mohammad Hossein Yaghmaee Moghaddam,et al.  An entropy-based VoIP flooding attacks detection and prevention system , 2014, 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE).

[2]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[3]  Gabriel Maciá-Fernández,et al.  Defense techniques for low-rate DoS attacks against application servers , 2010, Comput. Networks.

[4]  Alex Talevski,et al.  Impact of Encryption on Qos in Voip , 2010, 2010 IEEE Second International Conference on Social Computing.

[5]  Sushil Jajodia,et al.  Detecting VoIP Floods Using the Hellinger Distance , 2008, IEEE Transactions on Parallel and Distributed Systems.

[6]  Thomas J. Walsh,et al.  Security Considerations for Voice Over IP Systems , 2005 .

[7]  Seyed Amin Hosseini Seno,et al.  An empirical study of security of VoIP system , 2016, 2016 SAI Computing Conference (SAI).

[8]  Daniel T. Fokum,et al.  Coping with denial-of-service attacks on the IP telephony system , 2016, SoutheastCon 2016.

[9]  Neminath Hubballi,et al.  VoIPFD: Voice over IP flooding detection , 2016, 2016 Twenty Second National Conference on Communication (NCC).

[10]  Simantini J. Shivankar,et al.  Comparative analysis on security techniques in VoIP environment , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).

[11]  Abdul Ghafoor Abbasi,et al.  Security analysis of VoIP architecture for identifying SIP vulnerabilities , 2014, 2014 International Conference on Emerging Technologies (ICET).

[12]  Jinhua Guo,et al.  Security Challenge and Defense in VoIP Infrastructures , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[13]  Muhammad Ali Akbar,et al.  Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony , 2012, Knowledge and Information Systems.

[14]  Dorgham Sisalem,et al.  Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms , 2006, IEEE Network.

[15]  V. N. Venkatakrishnan,et al.  Vetting SSL Usage in Applications with SSLINT , 2015, 2015 IEEE Symposium on Security and Privacy.

[16]  Cihan Varol,et al.  Detecting unprotected SIP-based voice over IP traffic , 2016, 2016 4th International Symposium on Digital Forensic and Security (ISDFS).

[17]  Angelika Bayer,et al.  A First Course In Probability , 2016 .