SIPp-DD: SIP DDoS Flood-Attack Simulation Tool
|
|
|
- Stewart O’Brien’
- 10 years ago
- Views:
Transcription
1 SIPp-DD: SIP DDoS Flood-Attack Simulation Tool Jan Stanek, Lukas Kencl Research & Development Center for Mobile Applications (RDC) Czech Technical University in Prague Technicka 2, Prague 6, Czech Republic {jan.stanek, Abstract With the growing popularity of Voice-over-IP communication and of the SIP protocol, mobile networks including, denial-of-service attacks against the signaling are an increasingly menacing threat. We present SIPp-DD, a tool for generating reallike SIP DDoS flood attacks. SIPp-DD modifies the popular SIPp call generator and offers the option to spoof source IP addresses and ports of the generated messages. For flexibility, any set of source IP addresses and ports can be input, using a text file. To create real-like attacks, we analyze some of the publicly available DDoS flood attacks, derive typical distributions of address and packet populations and employ those in attack generation. We compare the generator outputs with the real analyzed DDoS floods and demonstrate the tool applicability by performing a DDoS attack within a real SIP-server testbed. I. INTRODUCTION Popularity of the Voice over IP (VoIP) technology has grown rapidly in recent years. VoIP replaces the classic Public Switched Telephone Network (PSTN) because it is generally cheaper and the user can control its usage and deployment better. Using classic data network as the transfer medium, VoIP can be deployed almost anywhere, whether using the private network inside a company or the public Internet. This also adds some new security weaknesses, perhaps the biggest being non-guaranteed bandwidth for the call. If the network is overloaded, for example by some kind of flood attack (see Section III), then the quality of the call will be very low and it might even result in an unexpected end of the call. Thanks to extensive research done in the field of flood attacks in the last years, this weakness can be perceptibly limited using some of the known countermeasures. Still, flood attacks remain a big threat to VoIP telephony because one does not need to produce a very large general flood to congest the entire network, as it is much easier to target the key component of the VoIP infrastructure, the Session Initiation Protocol (SIP) server. SIP is the most widely used signaling protocol in VoIP telephony nowadays. It is simple and relatively easy to implement and therefore became quite popular and many implementations of it exist in forms of free or paid SIP servers (SIP server is used as a term for an application covering all the necessary functionality e.g. it usually incorporates the functionalities of SIP proxy server, registrar server and redirect server). Different SIP-server implementations have different weaknesses but it is always much easier to use a flood attack against the SIP server itself then against the entire network. For example the popular Asterisk [25] software can be congested using an attack composed of about 500 appropriately chosen SIP messages per second, instead of hundreds of thousand of packets necessary to congest even a low-dimensioned computer network. There has been a lot of research done upon SIP flooding in the last few years (see Section II). Stopping a DoS flood attack against a SIP server is generally easy it suffices to determine and block the IP address of the attacker. The situation is much more complicated with the distributed (DDoS) flooding attacks since there are many originators that need to be blocked. Even more difficult is the situation when the source addresses in the SIP messages are spoofed. To develop viable countermeasures, it is vital to simulate and inspect such attacks in a SIP testbed and measure the impact on the VoIP service. However currently there is a distinct lack of tools able to simulate a semi-realistic SIP DDoS flood attack. We address this shortcoming by presenting a tool with the ability to easily generate attacks of highly similar patterns to typical DDoS attacks in terms of address or flow popularity distributions, as gathered and studied from multiple public sources of information. This therefore allows to replicate such attacks or their variations and thus to test countermeasures focused on particular properties of real DDoS attacks. The main contributions of this work are: an analysis of the publicly available DDoS attack information, deducing typical address and packet distributions; a prototype SIP DDoS flood generator, SIPp-DD, based on the modified SIPp call generator [22], able to incorporate a list of spoofed source IP addresses used in the generated SIP messages; a spoofed address list that respects the observed typical distributions in DDoS attacks; early performance evaluation of the tool in a SIP testbed; The paper is organized as follows: in Section II, related work is surveyed. Section III describes the basics of flood attacks. Section IV presents the generator of IP addresses, along with the background analysis. Section V introduces the mechanisms to generate a DDoS flood attack and Section VI describes the SIPp-DD DDoS generation tool, its design and usage. In section VII we evaluate SIPp-DD-generated floodattack tests. Section VIII sketches possibilities of usage of SIPp-DD in mobile and wireless networks. The paper concludes in Section IX, including suggestions for future work. II. RELATED WORK VoIP security is an area of extensive research. The Voice over IP Security Alliance (VOIPSA) publication [1] summa /11/$ IEEE
2 DoS attacks can be found in [6], [8] and [16]. Some defense mechanisms against both DoS and DDoS SIP attacks were described and tested in [10], [11], [14] and [15]. SIPp-DD is capable of testing any proposed mechanism and generating the expected attack signature. Fig. 1. Hilbert map of Internet malicious activity created by Team Cymru, 2010 [20]. The map shows the entire Internet address space, each pixel representing a block of 4096 IP addresses. Pixel color represents level of malicious activity produced by machines with IP addresses from the corresponding block (heatmap scheme: black = none, white = highest). rized the general area of VoIP security, including the known threats against a VoIP environment, and established the ground for many other research works. Kang et al. [12] analyze VoIP traffic behavior, providing good insight into distinguishing anomalies in VoIP traffic. Blake published a short guide [9] containing the most important differences between VoIP and PSTN and also provided some best practices for deploying a VoIP solution. Chavhan and Chhabria [13] provided multiple design guidelines for use in VoIP security. Al-Allouni et al. [2] discuss classification, implementation and evaluation of some of the DoS attacks. Sisalem et al. published a very detailed paper about attack scenarios targeting SIP servers [8]. Deng and Shore proposed an advanced flooding attack on a SIP server in [4]. Luo et al. implemented and tested a CPU-based DoS attack on a SIP server in [5]. Liu and Lo simulated a DDoS attack against a SIP server and measured its impact when using different types of queues for storing the communication in [17]. SIPp-DD is capable of reproducing all of the attacks described. DDoS traffic has been analyzed widely. The basis for our generator of source IP addresses is the Hilbert map of malicious Internet activity [20], see Fig. 1. Zulkerine and Haque [19] describe various approaches for detecting DDoS flood attacks. Khazan and Azgomi [18] used the SimEvents software to simulate DDoS attacks and evaluate its security impacts. Mirza et al. used a modeling approach to create random flows and simulate a DDoS attack in [21]. Defense mechanisms against DoS and DDoS attacks have been studied widely. Mirkovic et al. [3] propose metrics to measure DoS attack impact. Various defense approaches to SIP III. FLOOD ATTACKS The flood attacks (floods) aim at the disruption of service using a high number of messages repeatedly sent to the server, resulting in its congestion and inability to process legitimate requests. Floods can be composed of any protocol messages (for example the well-known ICMP protocol is often used for flooding). These attacks are extremely severe in SIP environments, since SIP servers are not optimized to process high numbers of requests. It is generally simple to detect that a flood is being deployed against the server (the traffic is noticeably higher than usual). It is also easy to protect the server against the non-distributed versions of a flood, because once the attack is detected (using typically limits on allowed message rate per time period), it suffices to block its source (the IP address corresponding to the attacker machine). Such defense mechanism may be implemented using a common firewall, even though more sophisticated solutions might be necessary in complex environments (see for example deep packet inspection used in the SNOCER project [28]). Much more menacing are the so-called distributed DoS (DDoS) attacks, using either spoofed (fake) IP addresses or a high number of computers (called bots if under malicious attacker s control). It is highly complicated to defend against a distributed version of a flood due to the many origins of the attack the source limiting approach is unusable in this case. There are some known methods of defense against such attacks, e.g. acknowledgment of messages against spoofedbased attacks, self-learning statistical filters against attacks with typical pattern and others, but there is no generally usable defense approach yet. IV. DDOS FLOOD ATTACKS ANALYSIS To generate attacks similar to real DDoS flood attacks, we have performed an analysis of the few publicly available DDoS attack traces. We did not have any traces of DDoS floods against SIP servers but we have acquired three different sources of information: a rather large set of traces of three different flood DDoSes provided by the USC/LANDER project [23]; the Hilbert map of malicious Internet activity [20]; and the aggregate information about a DDoS flood targeting an HTTP server, provided by Moore et al. [24]. A. DDoS traces The first source is composed of three different traces of similar DDoS floods targeting an unknown server. The information is stored as complete traffic log within the network containing the server targeted during the attack. Unfortunately the IP addresses were anonymized so we have not gathered information about concrete sources, but still it provided very useful information about the division of load between the
3 B. Hilbert map Fig. 2. Loglog scale of DDoS attack load distribution between the attackers for two ICMP flood attacks. different attacking computers (supposedly remotely controlled bots). We have split the huge data-files into smaller parts and analyzed these parts using the Wireshark packet analyzer [26]. The date needed to be split because Wireshark cannot process such huge data files (the capture filesize is between 500MB and 2.7GB). The splitting has uncovered similar per-attacker load patterns across the trace and indicated that the attack process is not changing significantly over time. For specifications of all the analyzed attack traces please see Table I. The first attack (Attack A) was an ICMP flood. All the attackers started and ended their attack almost simultaneously. Attack B was a flood using malformed IP packets. The first attacker has sent packets during the attack which is more than 95% of the whole attack load. The two remaining attackers have sent and packets which is about 2.64% and 2.34% of the whole attack load. All the attackers started their attack almost simultaneously, the leading attacker ended his attack about 20s before the other two attackers. Attack C was an ICMP flood. All the attackers started their attack almost simultaneously and ended the same way. The distribution of sent packets between the individual attackers for Attacks A and C can be seen in Fig. 2. From these results we observe that attack load is typically distributed among the attackers into groups of near-identical attack rate possibly a result of identical connection constraints. There is a leading group (or a single attacker) with a very high attack rate and then there are other attackers that usually form a few groups with similar rates. Occasionally, there are also some freelancers, flows with attack rate different from all others. We have not observed many different starting points the attackers usually start at the same time and maintain their attack rate constant throughout the attack. We have used the Hilbert map of malicious Internet activity [20] to derive a model probability distribution function of attacker source IP address values used by SIPp-DD. Unfortunately, the base information used for creating the Hilbert map is not publicly available we therefore had to extract useful data about IP addresses directly from the map itself using Matlab. Although the map does not allow extracting information about individual IP addresses (one pixel represents a block of 4096 IP addresses), we have been able to extract information about the first two bytes of the IP address and generated the last two bytes of the IP address randomly. The extraction process of the first byte was done as follows: We unwrapped the Hilbert line from the square to obtain a straight line of smaller squares, each containing pixels corresponding to one /8 subnetwork. The squares were then sorted in the line from 0 to 255 so we just had to count the number of differently colored pixels in each square. As the colors were taken from the whole color palette, we assigned every individual pixel a weight computed according to its color (eg. black=0, blue=1, purple=2, green=3, yellow=4, orange=5, red=6 and white=7). The final weight, computed as a sum of all pixels weighted colors in the square was assigned as a weight to each of the 256 squares. Finally the weights were normalized over the sum of all weights to derive the probability distribution function. The resulting cumulative distribution function can be seen in Fig. 3. To extract the necessary information about the second byte for each of the 256 first bytes we had to divide the smaller squares forming the previously unwrapped Hilbert line into 256 parts. As every square was formed by 63x63 pixels (62x62 for the squares at the map edge), we have used interpolation from the nearest pixels to create a borderline to complete the desired 64x64 square. Each square was then converted to a 16x16 square (every 16 pixels forming a small square were aggregated into one with weight equal to the sum of its weights). Because every resulting square again represented 256 bytes ordered in a Hilbert curve style, it was necessary to unwrap each to obtain a straight line from 0 to 255. Finally the weights were normalized as in the previous part. TABLE I DATA GATHERED IN ANALYSIS OF THE DDOS TRACES. number of packets number of IP addresses duration Attack A s Attack B s Attack C s Fig. 3. Cumulative distribution function of the aggregate level of malicious activity computed for /8 network blocks.
4 C. Aggregate data of a specific DDoS flood The third source of information was a list containing recorded aggregate data about a real DDoS flood attack against an HTTP server [24]. It includes IP addresses of the bots that participated in the attack, along with the number of packets originating from them during the attack. We have used this trace to verify the attack properties observed in sections IV-A and IV-B. We have checked whether the distribution of the first byte of source IP addresses in this real attack corresponds to the distribution we extracted from the Hilbert map and whether the load of the attack distributed among the different sources corresponds to the model of attack load distribution. To compare the distributions of the first byte of IP addresses we have computed the correlation coefficient between the distribution we obtained from the Hilbert map analysis and the distribution from the real attack. The coefficient was This can be interpreted as that there is a relation between the two distributions, although not very strong. Considering that the real attacker machines were chosen from only a portion of the address space (probably botnets controlled by the attacker), we may interpret this result as positive. Distribution of the attack load is quite different from the distributions we have plotted for our previously analyzed attacks. This is probably due to the fact that there were 4217 machines involved, many more than in the previously analyzed attacks. The numbers of sent packets were higher too. We have identified the typical groups with similar attack rates, but differences between the rates in a group were higher (a few hundred packets) and there were definitely more freelancers. To prove the grouping hypothesis, more real attacks need to be analyzed in the future. For now, we take it as a possibility for our IP address generator. V. DDOS FLOOD GENERATION PRINCIPLES There are two main methods of generating a distributed attack using a botnet (network of computers under attackers control) or using the IP spoofing mechanism. We use the IP spoofing mechanism because it is more flexible and more easily usable in a simulation environment. A spoofing mechanism sends IP packets with forged information in the source-address field of the IP header (pretending the packets originate from a different address than they actually do). It can be implemented by misuse of the IP protocol, or rather of the TCP/IP stack, by using the RAW socket instead of the classic TCP or UDP socket for network communication. The RAW socket is a lightweight version of a socket that leaves all the header-creation work to the programmer. This introduces additional overhead, because the programmer has to create otherwise automatically created headers, but it leaves him or her the opportunity to change the individual parts of the headers (including the IP source address field) in any manner. The biggest advantage of this approach is that one needs only one machine to simulate a distributed flood attack by simply changing the values of the source IP address in the messages that form the attack. We have used this mechanism in our SIPp-DD attack simulation tool described in Section VI. Fig. 4. Architecture of the attack creation process. The list of IP addresses may be reused or re-generated for each attack. VI. SIP DDOS ATTACK TOOL SIPp-DD is a modification of SIPp [22] an open source software traffic generator for the SIP protocol, which offers the functionality to simulate almost any SIP communication. One can easily generate a DoS flood attack using SIPp without modifications by creating an XML scenario with the chosen SIP message (or messages), transmitting to the SIP server in every call, and setting the call rate high the server will be flooded with requests. This simple DoS attack can be used to stress-test the SIP server and make assumptions about its processing capacity but it is not useful for security testing since a simple DoS attack is easy to detect and block. Therefore we have modified SIPp to be able to spoof source IP addresses and simulate a DDoS flood attack. For architectural overview of attack generation using SIPp-DD see Fig. 4. It would be hard to modify SIPp to enable address spoofing for all the three transport modes (UDP, TCP and TLS) due to protocol complexity, but it is feasible for UDP, used for majority of SIP communication anyway. We have modified SIPp to use a RAW socket next to the classic TCP and UDP sockets and created a new option spoof ip which can be set in the XML scenario file. When spoof ip is set then the modified SIPp uses RAW socket and is able to inject any source IP address and source port into the packet sent to the SIP server. To maintain SIPp-DD as configurable as possible, the source IP addresses and ports are not generated by an integrated generator but instead we have implemented reading of the addresses and ports from an external file. Because SIPp itself provides the functionality to load additional information from a text file into the XML scenario, we have modified this process to load the information about ports and addresses too. As SIPp may read the text file in random mode, one does not need to specifically order the addresses in the source file and may use the implemented pseudo-random strategy. We have designed an IP address generator in the form of a Matlab function. The function takes two arguments: number of packets and number of IP addresses to be used in one iteration. Based on the analysis of DDoS attacks in Section IV, the generator creates four groups with similar attack rates. The IP
5 (a) Attack A (b) Attack C Fig. 5. Loglog scale of comparison of packet load distribution in an original ICMP attack and in a simulation. address and flow population distribution is a very coarse-grain approximation of those measured in Section IV. To create the set of IP addresses for various combinations of configurable numbers of packets and addresses for attack generation but also to suit the needs of SIP flooding (which is effective for low numbers of messages hundreds or at most thousands per second), the generator divides the IP addresses into four groups. The first group contains 30% of IP addresses, the second 50% of IP addresses, the third 20% of IP addresses minus r (where r is a random integer between 1 and 5, but never higher than 10% of IP addresses) and the fourth r addresses (these are the checkers, flows with low packet rate, which are often used by an attacker to check the behavior of the attacked target). The total number of packets is divided between the four groups such that the first group takes 40% of the load, the second takes 50%, the third takes 9.9% and the fourth takes 0,1%. The particular IP addresses for the groups are generated as follows: the random generator for the first two bytes uses the appropriate distributions computed in the analysis phase from the Hilbert map (see Section IV). The last two bytes are generated pseudo-randomly using the uniform distribution. The output is a text file with one IP address per line. The packet rates in the output file are represented by address repeats (e.g. if address A has packet rate 15 packets per second then address A is repeated 15 times). VII. PERFORMANCE EVALUATION A. IP address distribution in an attack To test the generator from Section VI we use two criteria: first, the existence of groups with similar attack rate (which is expected since the generator is designed to produce isolated groups) and, second, a comparison of distribution of the first byte in the IP addresses produced by the generator and the distribution derived from the Hilbert map analysis. As the generator produces the specified number of isolated groups every time, for evaluating the first criterion we have used the setup of the attacks analyzed in Section IV. The comparison of load distribution among individual attackers in attacks A and C and in their simulations can be seen in Fig. 5 (we do not include attack B since there were only 3 attackers present which makes the comparison uninteresting). To compare the distributions of the first bytes of the IP addresses we use the correlation coefficient. Because the generator output highly depends on the pseudo-random numbers generated during its computation phase we have repeated the run of the generator 100 times for every measured setup and computed an average correlation coefficient as an arithmetical mean over the 100 measurements. The results for various setups of the generator can be seen in Table II. The correlation coefficient depends significantly on the number of IP addresses and much less on the number of packets. Higher number of IP addresses used results in a higher correlation. Because the output of the generator will be used for SIP DDoS attack simulations where we expect a few thousand packets per second and a few dozens or hundreds of source IP addresses, we find the results for both criteria satisfactory. If we take the values of 5000 packets per second and 100 IP addresses as a model situation, the existence of isolated groups with the same attack rate is obvious and the value of correlation coefficient (see Table II) is higher than the one measured in the real HTTP flood attack (0.354, see Section IV-C for details). TABLE II AVERAGE CORRELATION COEFFICIENTS FOR THE DISTRIBUTIONS OF THE FIRST IP ADDRESS BYTE, PER DIFFERENT GENERATOR SETUPS. Number of IP addresses Number of packets Correlation coefficient
6 (a) DoS attack, defense off (b) DoS attack, defense on (c) DDoS attack, defense on or off Fig. 6. Comparison of CPU utilization during DoS (SIPp) and DDoS (SIPp- DD) attacks. (a) DoS attack exhausts CPU capacity when no defense is active. (b) CPU utilization during a DoS attack may be reduced highly by employing a simple firewall. (c) Firewall has no influence on DDoS-flood. B. Comparison of DoS and DDoS floods To compare the impact of an attack generated by SIPp-DD to a simple DoS-attack generated by SIPp, we have simulated the attacks in a real testbed. It is composed of three computers with Intel Xeon 2.5Ghz CPUs, connected through one 100 Mbps switch, all running Linux CentOS 5.4 and fully isolated from other networks. The first computer was running Asterisk [25], a widely used open-source PBX, as the test SIP server. The second computer was used as a simulated attacker and was running SIPp (version 3.1-TLS) or SIPp-DD, according to the test setup. The third computer was running SIPp and was used to simulate valid REGISTER and INVITE messages, to check whether the SIP server is able to process legitimate requests during the tests. The simulated legitimate traffic was set to keep the Asterisk-server CPU utilization fluctuating around 5%. Asterisk CPU exhaustion can easily be accomplished using a DoS-flood attack composed of identical SIP messages. We have tested all the basic SIP message types and the best suited for a flood attack are REGISTER, INVITE and OPTIONS, due to their processing complexity. About 500 requests per second will flood Asterisk in our testbed within less than 15 seconds, making it unable to process any further SIP traffic. First we compare the situation when the server is flooded by a single attacker machine (each request having the same source IP address and port) and by many attacker machines. For the first case we have used the non-patched SIPp, for the second SIPp-DD. The scenario for both attacks is the same sending the same SIP requests (REGISTER, INVITE or OPTIONS), using the attack rate 500 requests per second and limiting to requests in total, creating a 20s attack. We have run a monitoring program on the Asterisk server, logging CPU utilization every second. The output was used to generate all the graphs in Fig. 6. The monitoring program starts 5 seconds before the actual attack, so the attack can be seen in the graphs from the 6th second onwards. Under the DoS flood attack, unprotected Asterisk was flooded (the legitimate traffic requests did not receive the expected response and started being retransmitted) within 6s when using the INVITE and within 7s when using the REGISTER and OPTIONS messages (CPU utilization history is presented in Fig. 6(a)). Behavior under the DDoS flood ((we have used a set of 1000 different IP addresses as spoofed sources, Fig. 6(c)) was very similar. We have repeated both simulations 10 times with similar results. For the setup used, there appears no significant difference between the impact of DoS and DDoS floods. Request processing inside Asterisk is not influenced by the source address or port much, these are just stored as variables. Most of the CPU is consumed by processing of the request itself. In a changed test setup, a simple firewall was deployed on the Asterisk server, blocking potential SIP floods using a rate-limiting approach. When more than 300 SIP packets from a single source IP address arrive at the standard 5060 SIP port over a period of 30s, the firewall drops packets from that address for another 30s. When repeating the attack simulations, the impact of DDoS flood did not change but the impact of DoS-flood was practically eliminated (see Fig. 6(b)). Legitimate traffic during the DoS attack was not affected at all (all requests were processed on time). The previous simulation shows the main benefit of SIPp- DD: it is a useful testing tool for SIP defense mechanisms. Although we have shown only penetration of a naive defense solution, using SIPp-DD for security testing of SIP defense mechanisms might reveal potential weaknesses that would be hard to find without considering SIP DDoS flood attacks.
7 VIII. SIPP-DD IN MOBILE AND WIRELESS NETWORKS SIPp-DD was designed as a testing tool for SIP environments and is not usable for e.g. generating DDoS floods targeting band-exhaustion in mobile networks. However, thanks to the popularity of SIP, there are situations where SIPp-DD can be very useful in mobile and wireless networks. Lately, the problem of mobility in heterogeneous networks has been widely discussed, with SIP proposed as possible auxiliary [29], or even a replacement, of mobile IP. A solution based solely upon SIP can be seen in work of Zhang et al. [30]. Even though the work focuses on security aspects of the proposed solution, it does not take into account the SIP DDoS flood attacks that are a major threat for this protocol. Generally, any solution based on SIP that is using a central SIP component is prone to SIP DDoS flood attack and SIPp-DD may be used to test its resistance. Moreover, the mobility-providing solutions often use some kind of IP address-translation mechanisms that can be thoroughly tested using the spoofing ability of SIPp-DD. SIPp-DD may also be employed in testing smartphone SIP clients. SIP clients for smartphones are increasingly popular since they can be much cheaper than using the operator provided voice-call, especially for overseas calls. These clients aim to be easily usable and multi-platform (see [31]) and do not possess strong security protection. Another area where SIPp-DD can be useful is testing of internal security in private wireless networks. Many companies use a SIP server for internal communication and do not consider it necessary to protect it since it is located within the private network. However, often wireless access is provided to guests in their offices and it can be quite easily compromised. SIPp-DD is an ideal tool to test the capabilities of a SIP server inside a private network thanks to the possibility to use any list of source IP addresses for the test scenario. IX. CONCLUSION We have presented a highly flexible tool for a simulated SIP DDoS flood attack generation. Going the way of modification of a popular SIPp call generator, it offers the possibility to generate almost any SIP traffic to be used in the attack. Using a raw socket instead of UDP provides the functionality of spoofing IP addresses and ports in the generated communication and therefore one machine may be employed to simulate the entire DDoS attack. The main contribution of the tool is the demonstrated ability to generate attacks similar to typical DDoS attack patterns in terms of address or flow population distributions, as gathered from multiple sources of information. This allows to replicate such attacks or their variations and thus to test countermeasures focused on particular properties of real DDoS attacks. By performing a simulation of such attacks in a real testbed we have further demonstrated the the tool s usability. As for future work, we intend to collect and analyze more data from real attacks to enhance real-attack similarity as well as introduce variability with respect to the type of attack used. Furthermore, analysis of attack inter-packet timing patterns is needed to likewise generate realistic packet arrival times. The ultimate goal is to improve techniques of detection and mitigation of SIP DDoS flood attacks, by tests employing SIPp-DD, and eventually employing techniques detecting and nullifying the effects of the described attack patterns within real network traffic. Our goal is to make SIPp-DD available to the research community in the near future, to enable further testing and extensions. REFERENCES [1] J. Zar et al., VOIPSA VoIP Security and Privacy Threat Taxonomy. Threat Taxonomy 0.1.pdf, [2] H. Al-Allouni, A. E. Rohiem, M. El-moghazy, A. Ahmed, VoIP Denial of Service Attacks Classification and Implementation. 26th NRSC, [3] J. Mirkovic, P. Reiher, A. Hussain, S. Fahmy, S. Schwab, R. Thomas, C. Ko, Measuring Denial Of Service. QoP, October [4] X. Deng and M. Shore, Advanced Flooding Attack on a SIP Server. International Conference on Availability, Reliability and Security, [5] Ming Luo, Tao Peng, C. Leckie, CPU-based DoS Attacks Against SIP Servers. NOMS, [6] G. Zhang, S. Ehlert, T. Magedanz, D. Sisalem, Denial of service attack and prevention on SIP VoIP Insfrastructures Using DNS Flooding. IPTCOMM, [7] E.Y.Chen,Detecting DoS Attacks on SIP Systems. VoIP MaSe, [8] D. Sisalem, J. Kuthan, S. Ehlert, Denial of Service Attacks Targeting a SIP VoIP Infrastructure: Attack Scenarios and Prevention Mechanisms. MNET, September/October [9] E. A. Blake, Network Security: VoIP Security on Data Network-A Guide. In Information Security Curriculum Development Conference, [10] M. Nassar, S. Nicollini, R. State, T. Ewald, Holistic VoIP Intrusion Detection and Prevention System. IPTCOMM, [11] J. Fiedler, T. Kupka, S. Ehlert, T. Magedanz, D. Sisalem, VoIP Defender: Highly Scalable SIP-based Security Architecture. IPTCOMM, [12] Hun Jeong Kang and Zhi-Li Zhang, SIP-based VoIP Trafc Behavior Proling and Its Applications. MineNet, June [13] N. A. Chavhan and S. A. Chhabria, Multiple Design Patterns for Voice over IP Security. ICAC3, [14] D. Y. Ha et al., Design and Implementation of SIP-aware DDoS Attack Detection System. ICIS, [15] M. A. Akbar and M. Farooq, Application of Evolutionary Algorithms in Detection of SIP based Flooding Attacks. GECCO, July [16] C. Zhou, C. Leckie, K. Ramamohanarao, Protecting SIP Server from CPU-Based DoS Attacks using History-Based IP Filtering. LCOMM, [17] Chung-Hsin Liu and Chun-Lin Lo, The Simulation for the SIP DDoS Attack. NCM, [18] M. A. Khazan and G. Azgomi, A distributed attack simulation for quantitative security evaluation using SimEvents. AICCSA, [19] Yonghua You Zulkernine and M. Haque, Detecting Flooding-Based DDoS Attacks. ICC, [20] Team Cymru reasearch NFP, Hilbert map of Internet malicious activity [21] J. Mirza, M. Shu, J. Yoedhana, C. Gerla, M. S. Lu, Random flow network modeling and simulations for DDoS attack mitigation. ICC, [22] SIPp - test tool for the SIP protocol [23] USC/LANDER Project. LANDER: Los Angeles Network Data Exchange and Repository [24] H. D. Moore et al. Source list of attackers targetting metasploit.com. sources txt, [25] Asterisk Private Branch exchange, [26] Wireshark network protocol analyzer, [27] SIP: Session Initiation Protocol, [28] SNOCER project. Low Cost Tools for Secure and Highly Available VoIP Communication Services. [29] M. Boutabia, E. Abd-Elrahman, H. E. Afifi, A hybrid mobility mechanism for heterogeneous networks in IMS. ICME, [30] L. Zhang, H. Miyajima, H. Hayashi, An Effective SIP Security Solution for Heterogeneous Mobile Networks. ICC, [31] H. Wook, S. Kang, Design and implementation of SIP-based mobile VoIP application for multiple smartphone OS. ICTC, 2010.
A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack
A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack Abhishek Kumar Department of Computer Science and Engineering-Information Security NITK Surathkal-575025, India Dr. P. Santhi
V2W security - defense mechanisms against SIP DDoS flood
V2W security - defense mechanisms against SIP DDoS flood Jan Staněk [email protected] Research & Development center(rdc) for Mobile Applications Czech Technical University in Prague Technická 2, 166 27
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Prevention of Anomalous SIP Messages
International Journal of Future Computer and Communication, Vol., No., October 03 Prevention of Anomalous SIP Messages Ming-Yang Su and Chung-Chun Chen Abstract Voice over internet protocol (VoIP) communication
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
SIP Infrastructure Performance Testing
SIP Infrastructure Performance Testing MIROSLAV VOZNAK, JAN ROZHON Department of Telecommunications VSB Technical University of Ostrava 17. listopadu 15, Ostrava CZECH REPUBLIC [email protected],
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
Comparing Two Models of Distributed Denial of Service (DDoS) Defences
Comparing Two Models of Distributed Denial of Service (DDoS) Defences Siriwat Karndacharuk Computer Science Department The University of Auckland Email: [email protected] Abstract A Controller-Agent
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
A VoIP Traffic Monitoring System based on NetFlow v9
A VoIP Traffic Monitoring System based on NetFlow v9 Chang-Yong Lee *1, Hwan-Kuk Kim, Kyoung-Hee Ko, Jeong-Wook Kim, Hyun- Cheol Jeong Korea Information Security Agency, Seoul, Korea {chylee, rinyfeel,
A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise
A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise K.Subhash Bhagavan #1, Kirankumar.P #2, MVSS Nagendranath#3, #1 Student, Sasi Institute of Technology and Engineering,
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
Quality Certificate for Kaspersky DDoS Prevention Software
Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General
A Call Conference Room Interception Attack and its Detection
A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
Deployment of Snort IDS in SIP based VoIP environments
Deployment of Snort IDS in SIP based VoIP environments Jiří Markl, Jaroslav Dočkal [email protected] K-209 Univerzita obrany Kounicova 65, 612 00 Brno Czech Republic Abstract This paper describes
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea [email protected] and [email protected]
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
SIP Proxy Robustness against DoS Attacks
SIP Proxy Robustness against DoS Attacks Miroslav Voznak, Jakub Safarik CESNET Zikova 4, 160 00 Prague Czech Republic [email protected], [email protected] Abstract: - This paper deals with one of key
modeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 11, No 4 Sofia 2011 MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks N.
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
SIP Intrusion Detection and Response Architecture for Protecting SIP-based Services
SIP Intrusion Detection and Response Architecture for Protecting SIP-based Services KyoungHee Ko, Hwan-Kuk Kim, JeongWook Kim, Chang-Yong Lee, HyunCheol Jeong Applied Security Technology Team Korea Information
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: [email protected] UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
VALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
Cconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
Survey on DDoS Attack in Cloud Environment
Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-issn: 2394-3343 p-issn: 2394-5494 Survey on DDoS in Cloud Environment Kirtesh Agrawal and Nikita
Sonus Networks engaged Miercom to evaluate the call handling
Lab Testing Summary Report September 2010 Report 100914 Key findings and conclusions: NBS5200 successfully registered 256,000 user authenticated Total IADs in 16 minutes at a rate of 550 registrations
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Ingate Firewall/SIParator SIP Security for the Enterprise
Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Part I: Attack Prevention Network Security Chapter 9 Attack prevention, detection and response Part Part I:
SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper
SHARE THIS WHITEPAPER On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper Table of Contents Overview... 3 Current Attacks Landscape: DDoS is Becoming Mainstream... 3 Attackers Launch
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
How To Block A Ddos Attack On A Network With A Firewall
A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators Liang Xia [email protected] Tianfu Fu [email protected] Cheng He Danping He [email protected]
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.
SIP SECURITY Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne WILEY A John Wiley and Sons, Ltd., Publication Foreword About the Authors Acknowledgment xi xiii xv 1 Introduction
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
Future of DDoS Attacks Mitigation in Software Defined Networks
Future of DDoS Attacks Mitigation in Software Defined Networks Martin Vizváry, Jan Vykopal Institute of Computer Science, Masaryk University, Brno, Czech Republic {vizvary vykopal}@ics.muni.cz Abstract.
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009
VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 "It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed,
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13
COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security
VOIP TELEPHONY: CURRENT SECURITY ISSUES
VOIP TELEPHONY: CURRENT SECURITY ISSUES Authors: Valeriu IONESCU 1, Florin SMARANDA 2, Emil SOFRON 3 Keywords: VoIP, SIP, security University of Pitesti Abstract: Session Initiation Protocol (SIP) is the
LCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia [email protected] Abstract The Swinburne
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
DoS/DDoS Attacks and Protection on VoIP/UC
DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
Network Bandwidth Denial of Service (DoS)
Network Bandwidth Denial of Service (DoS) Angelos D. Keromytis Department of Computer Science Columbia University Synonyms Network flooding attack, packet flooding attack, network DoS Related Concepts
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
Firewalls Netasq. Security Management by NETASQ
Firewalls Netasq Security Management by NETASQ 1. 0 M a n a g e m e n t o f t h e s e c u r i t y b y N E T A S Q 1 pyright NETASQ 2002 Security Management is handled by the ASQ, a Technology developed
