skip to main content
10.1145/3640115.3640203acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciteeConference Proceedingsconference-collections
research-article

A Novel Approach for SIP Based SIG-Flood Threat Detection

Published:26 March 2024Publication History

ABSTRACT

In the dynamic landscape of Internet communication, systems employing the Session Initiation Protocol (SIP) for Voice over Internet Protocol (VoIP) are increasingly vulnerable to Denial of Service (DoS) attacks. Traditional detection methods fall short in accuracy and real-time response. The present study unveils a novel detection model for SIP-DoS attacks, incorporating traffic balance and fluctuation analysis to augment both precision and timeliness. Experimental results confirm the model's efficacy, marking a significant advancement in SIP-DoS attack detection and setting the stage for future research and applications.

References

  1. CSRIC VII, Working Group 6. 2021. CSRIC VII Report on SIP Security Challenges and Mitigation. Accessed May 12, 2023. https://www.fcc.gov/file/20609/download.Google ScholarGoogle Scholar
  2. Mirkovic, J., and Reiher, P. 2004. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communication Review 34, 2 (2004), 39-53. https://doi.org/10.1145/997150.997156Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Roesch, M. 1999. Snort: Lightweight Intrusion Detection for Networks. In Proceedings of Lisa '99. 229-238.Google ScholarGoogle Scholar
  4. Niccolini, S., Garroppo, R.G., Giordano, S., 2006. SIP Intrusion Detection and Prevention: Recommendations and Prototype Implementation. In Proceedings of the 1st IEEE Workshop on VoIP Management and Security. IEEE, 47-52. https://doi.org/10.1109/VOIPMS.2006.1638122Google ScholarGoogle ScholarCross RefCross Ref
  5. Chen, W.E., Lin, Y.B., and Pang, A.C. 2005. An IPv4-IPv6 Translation Mechanism for SIP Overlay Network in UMTS all-IP Environment. IEEE Journal on Selected Areas in Communications 23, 11 (2005), 2152-2160. https://doi.org/10.1109/JSAC.2005.856836Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ehlert, S., Zhang, G., and Magedanz, T. 2008. Increasing SIP Firewall Performance by Ruleset Size Limitation. In Proceedings of the 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 1-6. https://doi.org/10.1109/PIMRC.2008.4699868Google ScholarGoogle ScholarCross RefCross Ref
  7. Nassar, M.E.B., State, R., and Festor, O. 2006. Intrusion Detection Mechanisms for VoIP Applications. arXiv preprint cs/0610109.Google ScholarGoogle Scholar
  8. Sengar, H., Wang, H., Wijesekera, D., 2006. Fast Detection of Denial-of-Service Attacks on IP Telephony. In Proceedings of the 200614th IEEE International Workshop on Quality of Service. IEEE, 199-208. https://doi.org/10.1109/IWQOS.2006.250469Google ScholarGoogle ScholarCross RefCross Ref
  9. Gil, T.M., and Poletto, M. 2001. MULTOPS: A Data-Structure for Bandwidth Attack Detection. In Proceedings of the USENIX Security Symposium. 23-38.Google ScholarGoogle Scholar
  10. FengXiang, Z., and Shunji, A.B.E. 2006. A DoS/DDoS Attacks Detection Scheme Based on In/Out Traffic Proportion. Information and Communication Engineers 105, (2006), 7-11.Google ScholarGoogle Scholar
  11. Nassar, M., State, R., and Festor, O. 2010. Labeled VoIP Data-set for Intrusion Detection Evaluation. In Networked Services and Applications-Engineering, Control and Management: 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Springer Berlin Heidelberg, 97-106. https://doi.org/10.1007/978-3-642-13971-0_10Google ScholarGoogle ScholarCross RefCross Ref
  12. Verma, Vishal and Kumar, Vasudha, DOS/DDOS Attack Detection using Machine Learning: A Review (April 24, 2021). Proceedings of the International Conference on Innovative Computing & Communication (ICICC) 2021, Available at SSRN: https://ssrn.com/abstract=3833289 or http://dx.doi.org/10.2139/ssrn.3833289Google ScholarGoogle ScholarCross RefCross Ref
  13. O. Ali and P. Cotae, "Towards DoS/DDoS Attack Detection Using Artificial Neural Networks," 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2018, pp. 229-234, doi: 10.1109/UEMCON.2018.8796637.Google ScholarGoogle ScholarCross RefCross Ref
  14. Bouyeddou, B., Kadri, B., Harrou, F., and Sun, Y. 2020. DDOS-attacks detection using an efficient measurement-based statistical mechanism. Engineering Science and Technology, an International Journal 23, 4 (2020), 870-878. ISSN 2215-0986. https://doi.org/10.1016/j.jestch.2020.05.002.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICITEE '23: Proceedings of the 6th International Conference on Information Technologies and Electrical Engineering
    November 2023
    764 pages
    ISBN:9798400708299
    DOI:10.1145/3640115

    Copyright © 2023 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 26 March 2024

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)1

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format