Abstract
We present the Self-Protecting Session Initiation Protocol Stack capable of recognizing malicious SIP messages and protecting itself in high-load conditions. The stack model is based on the two-step processing and uses hash lookup tables and cellular automata rules to identify SIP message either as a regular or malicious one. Results show that a presented SIP stack exhibits very promising results with respect to messages classification and enables regular operation of SIP stack under high-load consisting of highly malicious traffic.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Rosenberg, J., Schulzrine, H., Camarillo, G.: SIP: Session Initiation Protocol., RFC 3261 (June 2002)
Cortes, M., Ensor, J., Esteban, J.: On SIP Performance. Bell Labs Tech. J., 155–172 (2004)
Neumann, J.V.: The Theory of Self-Reproducing Automata. In: Burks, A.W. (ed.). Univ. of Illinois Press, Urbana (1966)
Vichniac, G.Y.: Simulating physics with CA. Physica 10, 96–116 (1984)
Mitchell, M.: Computation in Cellular Automata: A Selected Review, Santa Fe Institute (1998)
Kuthan, J.: Accelerating SIP. In: SIP 2002, Paris,France (2002), http://www.iptel.org/
Batteram, H., Meeuwissen, E., van Bemmel, J.: SIP Message Prioretization. Bell Labs Tech. J. 11(1), 21–36 (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rusinovic, Z., Bogunovic, N. (2008). Self-Protecting Session Initiation Protocol Stack. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2008. Lecture Notes in Computer Science(), vol 5177. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85563-7_90
Download citation
DOI: https://doi.org/10.1007/978-3-540-85563-7_90
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85562-0
Online ISBN: 978-3-540-85563-7
eBook Packages: Computer ScienceComputer Science (R0)