DoS Flooding Attacks against SIP based VoIP Systems- a Survey

Authors

  • Mandeep Kaur Department of Computer Science, Graphic Era, India
  • Santosh Kumar Department of Computer Science, Graphic Era, India
  • Swati Sharma Department of Computer Science, Graphic Era, India

Keywords:

VoIP, SIP flooding, DoS, PSTN

Abstract

The success of the Internet has brought significant changes to the telecommunication industry. One of the remarkable outcomes of this evolution is Voice over IP (VoIP), which enables real time voice communications over packet switched networks for a lower cost than traditional public switched telephone networks (PSTN).VoIP networks are more vulnerable to security threats as compared to traditional PSTN due to their open environment such as the Internet and use of open standard like Session Initiation Protocol (SIP), launching an attack on a telephony server is much simpler. Availability is one of the major issues of computer security, along with confidentiality and integrity. Denial of service (DoS) is a threat that potentially violates the availability of a resource in a system. In this survey, we are discussing the DoS flooding attack on SIP server. Firstly, we present a brief overview about the SIP protocol. Then, we discuss security attacks related to SIP protocol. After that, we talk about the detection techniques of SIP flooding attack and various exploited resources due to attack.

References

D. Sisalem, J. Kuthan, T. Elhert,” Denial of Service Attacks Targeting SIP VoIP Infrastructure: Attack Scenarios and prevention Mechanisms”, IEEE Network, Page No (26-31), Oct 2006.

Jan Stanek, Lukas Kencl, and Jiri Kuthan” Characteristics of Real Open SIP-Server Traffic”,Springer , Page No (187-197) ,2013.

ITU, Draft Revised Recommendation H.323 V5, Geneva, 20-30, May 2003.

H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, E. Schooler, and J. Rosenberg, “SIP: Session Initiation Protocol”, RFC 3261, June 2002.

Jin Tang and Yu Cheng, “Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks”, IEEE ICC, Page No(1-5), 2011.

D. Geneiatakis, A. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, S. Ehlert, D. Sisalem,” Survey of security vulnerabilities in Session Initiation Protocol”, IEEE Communications Surveys and Tutorials, Volume-8,Issue-3,Page No(68-81), 2006.

S. Ehlert, G. Zhang, D. Geneiatakis, G. Kambourakis, T. Dagiuklas, J. Markl, and D. Sisalem, “Two layer Denial of Service prevention on SIP VoIP infrastructures”, Elsevier, Computer Communications, Page No(2443-2456),2008.

E. Y. Chen, “Detecting DoS attacks on SIP systems”, 1st IEEE Workshop on VoIP Management and Security, Page No( 53–58), April 2006.

Jin Tang, Yu Cheng and Yong Hao,” Detection and Prevention of SIP Flooding Attacks in Voice over IP Networks”,IEEE INFCOM,Page No(1161-1169),2012.

Rafique, M.Z., Ali Akbar, M. Farooq., “Evaluating DoS Attacks against SIP-based VoIP Systems”,IEEE GLOBECOM, Page No(1-6),2009.

Abhishek Bansal, Prashant Kulkarni, Alwyn R. Pais” Effectiveness of SIP Messages on SIP Server”, Proceedings of 2013 IEEE International Conference on Information and Communication Technologies,Page No(251-256),2013.

Ming Luo Tao Peng & Christopher Leckie,”CPU-based DoS Attacks Against SIP Servers”, IEEE,Page No(41-48),2008 .

Harish C. Sharma Sanjay Sharma Sandeep Chopra Pradeep Semwal “The Protection Mechanism against DOS and SQL Injection Attack in SIP Based Infrastructure”, IJARCSSE,Volume-3,Issue-1,Page No(252-256),Jan 2013.

H. Sengar, H. Wang, D. Wijesekera and S. Jajodia, “Detecting VoIP Floods Using the Hellinger Distance”, IEEE Transactions on Parallel and Distributed Systems, Volume-19, Issue- 6, Page No(794-805), June 2008.

Dongwon Seo ,Heejo Lee , Ejovi Nuwere ”SIPAD: SIP–VoIP Anomaly Detection using a Stateful Rule Tree”,Elsevier,Computer communication,Page No(562-574),2013.

Jin Tang, Yu Cheng, and Chi Zhou” Sketch-Based SIP Flooding Detection Using Hellinger Distance”,IEEE GLOBECOM, Page No(1-6), 2009 .

Abhishek Kumar, Dr. P. Santhi Tilagam,” A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack” International Journal of Computer Applications,Volume 26– No.1,Page No (0975 – 8887),July 2011

Xianglin Deng, Malcolm Shore,”Advanced Flooding Attack on a SIP Server”, IEEE Computer Society,Page No(647-652),2009.

Dahham Allawi, Alaa Aldin Rohiem, Ali El-moghazy and Ateff Ghalwash,”New Algorithm for SIP Flooding Attack Detection”,IJCST , Volume- 4, Issue- 3, Page No(10-19), March 2013.

Gaston Ormazabal, Sarvesh Nagpal, Eilon Yardeni, and Henning Schulzrinne “Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems”, Springer,Page No(107-132), 2008.

Housam Al-Allouni1,Alaa Eldin Rohiem , Mohammed Hashem Abd El-Aziz Ahmed, Ali El-moghazy ,” VoIP Denial of Service Attacks Classification and Implementation”, 26th NATIONAL RADIO SCIENCE CONFERENCE ,Page No(1-12),17-19 March 2009.

Mahak Chowdhary, Shrutika Suri and Mansi Bhutani, “Comparative Study of Intrusion Detection System,” Proc. International Journal on Computer Science & Engineering, 2011, vol. 2, Issue 4, pp. 197-200.

Downloads

Published

2014-05-31

How to Cite

[1]
M. Kaur, S. Kumar, and S. Sharma, “DoS Flooding Attacks against SIP based VoIP Systems- a Survey”, Int. J. Comp. Sci. Eng., vol. 2, no. 5, pp. 112–117, May 2014.

Issue

Section

Survey Article