A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack
|
|
|
- Miranda Logan
- 10 years ago
- Views:
Transcription
1 A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack Abhishek Kumar Department of Computer Science and Engineering-Information Security NITK Surathkal , India Dr. P. Santhi Tilagam Department of Computer Science and Engineering-Information Security NITK Surathkal , India ABSTRACT Voice over Internet protocol (VoIP) is continuously evolving and changing the face of business telephony. The Session Initiation Protocol (SIP) is a widely used standard in VoIP communications to setup and tear down phone calls. Low rate Denial-of Service (DoS) attack recently emerged as the greatest threat to enterprise VoIP systems. Such attacks are difficult to detect and capable of discovering vulnerabilities in protocols with low rate traffic. In this paper we aim to provide a novel low rate SIP flooding detection scheme using area under curve of monitored dynamic SIP traffic with classification of SIP flooding attacks and its impact on SIP server under low rate DoS attack. Compared to the other detection system our technique achieves advantages of accuracy, fast, light weight, and flexibility to deal with DDoS attack detection. Experimental results show the effectiveness of the scheme. General Terms Application Security. Keywords VoIP, SIP, Low Rate DoS Attack, Behavior Based Analysis. 1. INTRODUCTION Voice over Internet Protocol (VoIP) is a technology that is reshaping the future of telephony and in coming decades it will completely replace the Public Switched Telephone Network (PSTN) and the traditional PBX system. While enterprise VoIP offers low cost and various functionality it s also opens the door for external threats. Facilitating the VoIP services to legitimate users would be the main concern about the productivity of future business telephony. Most VoIP services uses the SIP infrastructure, because its simplicity and wide range of features, which makes its service vulnerable. The Registrar server makes it possible for users to alter the address at which they are contactable. This is possible through the SIP client sending a REGISTER request of change of an address to the Registrar server which involves significant computation on Registrar server. The low rate attack strategies are novel approach to launch flooding DoS attack without sending high rate traffic to the victim. These attacks are mixed approaches between flooding and vulnerability attacks by which attackers get advantages after reducing traffic rate. These low rate DoS attacks degrade the performance of SIP application server and cause in rejection of legitimate requests significantly where results obtained under different hardware and software system specification [3]. This paper is an extended work of [3] and addresses the important issue on how fast and accurately detects the low rate DoS attack on SIP application server. We use a freely available open source Asterisk SIP server version [1]. We populated unique username and passwords in user account and directory data of server. We automate a registration flooding low rate DoS attack scenario and populate a.csv file of valid and invalid username and passwords to generate legitimate and illegitimate dynamic traffic behavior to SIP application server. Figure 1, shows the notional diagram of DoS attack target (SIP Registrar) of SIP application server. We used very popular traffic automation and generation tool SIPp [2]. In this paper, we focus on behavior based fast detection of low rate DoS attack on SIP server using area under curve. Our method clearly distinguishes the normal traffic behavior, low rate flooding attack (obviously high attack rate also) and flash crowd. Fig. 1 DoS Attack Target SIP Registrar The rest of this paper includes following structure; section 2 gives a brief introduction to SIP protocols vulnerabilities and major flooding attacks with threat model. Experimental testbed set up with different modules and proposed detection scheme are described in section 3. Section 4 presents SIP signaling traffic behavior with computer simulated results. Related works are described in section 5. Section 6 is the conclusion and future work. 2. VULNERABILITY AND SIP FLOODING ATTACK Session Initiation Protocol (SIP) is a simple and textual based protocol having less secure authentication and authorization mechanism. Due to this inherent property of SIP, it is vulnerable to unauthorized privilege access, denial of service attack and 31
2 unstable system behavior. DoS attack on the SIP infrastructure is the easiest way to exploit vulnerability. Some DoS attack exploits the vulnerability of the SIP protocol RFC specification and other exploits the SIP protocol implemented by the different vendors. According to [4], there exist different classes of DoS attack which either consume the server resources for fake computations or under utilize the network bandwidth. To reduce the chances of falling victim to this type of attack, a number of measures can be taken. Proxy servers and firewalls can be implemented on a network to prevent UDP from being used maliciously and filter unwanted traffic. For example, if an attack appeared to come from one source previously, you could set up a rule on the firewall that blocks UDP traffic from that IP address. In this paper we focus on detection of registration flooding and authentication flooding attack on SIP server. 2.1 Signaling Flooding Attack A. SIP Registration Flooding Attack. A user agent send REGISTER request to SIP server when they initially want to communicate with other user and at regular interval as shown in Figure 2. An attacker can easily spoof large number of location addresses and send request to REGISTRAR with invalid username and passwords. In response attacker receives the 401 UNAUTHORIZE messages and again send the invalid MD5 digest calculated by hash function with nonce, realm, username and password values as shown in Figure 2. Here we assume the attacker know the username and locations of valid users. When SIP server receive the calculated MD5 digest it will match the received digest to digest calculated by server, while doing so server lookup the database of users and engaged in calculating digests. Due to excessive calculation of unwanted MD5 digest and to lookup user directory server incur high load on server and cross the threshold value of packet processing and hence cause the DoS attack. B. Authentication Flooding Attack. The authentication mechanism used by SIP is based on HTTP Digest mechanism based on challenge/response model. In order to verify the valid password sent by client, SIP server needs to compute MD5 Digest response to match the received response. The attacker machine needs not to calculate the MD5 Digest response using the realm, nonce, username and passwords values. An attacker can easily send the random Digest values stored. Using this mechanism an attacker can send more requests per second to target server to keep server busy. C. INVITE Flooding Attack. The SIP infrastructure is also vulnerable to INVITE flooding attack. A VoIP server should have a security feature to blocks flooded call request from unregistered clients. So, an attacker registers first after spoofing a legitimate user, and then sends flooded INVITE requests in a short period of time with different rates. This impacts significantly the performance of SIP server. Fig. 2 Normal Registration and Registration Flooding Attack D. PING Flooding Attack. VoIP protocol uses ping message in the application layer to check out the reachability of server, like SIP OPTIONs message. A router or firewall do not allow (Internet Control Message Protocol) ICMP ping in many production network for security reason. However a VoIP system should allow ping message in application layer for more reliable serviceability, but an attacker can misuse this message and can flood the SIP server with various ping messages. Beside of these major flooding attacks, an attacker can flood valid or invalid call control messages like SIP INFO, NOTIFY, Re-INVITE etc. after call set up. 2.2 Threat Model SIP is vulnerable to many network anomalies as mentioned in section 2. Such attacks can be easily launched on SIP server using openly available traffic generator tools such as SIPp [2]. Stateful SIP proxy server maintains the transaction state for each request for some time. SIP REGISTRAR server rejects many legitimate REGISTRATION request if the attack rate is even low. Attackers can launch low rate DoS attack instead of high rate flooding attack because it is difficult to detect and its impact of request rejection on server is significant [3]. Thus the low rate SIP REGISTRATION flooding attack is deteriorating VoIP network. We focus our discussion on the low rate REGISTRATION flooding attack. 3. DETECTION SCHEME AND EXPERIMENTAL CONFIGURATION In this section, we describe our proposed detection scheme design and experimental testbed configuration for computer simulation results. Our proposed detection scheme is combination of three modules running on server side and developed in Perl language as shown in Figure 3. The first module is internet packet filter and captures all SIP packets coming through the internet and it also capture the response generated by the SIP REGISTRAR. The second module takes input from the first module and makes n samples of attributes with transaction IDs for each delta t duration (in our case it is 10 seconds). The third module calculates the three parameters, Hash Computation Efficiency (HCE), Successful URI Binding Efficiency (SUBE) and Registration Drop Efficiency (RDE) and 32
3 also determines the area under curve of these parameters on the scale of 0 to 1 over n samples. To know more about parameters refer [3]. 1. Hash Computation Efficiency (HCE). The ratio of third REGISTER request [Fig. 2] with MD5 digest to responded fourth 200 OK messages. This parameter shows the positive attitude of SIP server. 2. Successful URI Binding Efficiency (SUBE). Ratio of total number of successful URI binding is to total number of request received. This parameter shows the positive attitude of SIP server. 3. Registration Drop Efficiency (RDE). Ratio of total number of rejected URI binding is to total number of request received. This parameter shows the negative attitude of SIP server. AUCHCE AUCSUBE m n 1 n r k HCEn SUBEn 1 RDEn (1) (2) AUCRDE (3) n 1 AV AUCHCE AUCSUBE AUCRDE (4) We calculate area under curve (AUC) for each 10 second interval by each parameter as shown in equation 1, 2 and 3. The total number of samples (m, k and r) for each parameter may be slightly differing. But for each value of n, all parameters belong to same transaction. The attitude value (AV) calculated in equation 4. Further explanations of these values are described in section 4. user s credentials in our CSV file, which is an input of created XML attack scenario. As a client configuration module for legitimate request we have separate CSV file with valid extension number, location, username and password. This tool is capable to generate normal call flow in a real world call scenario, to analyze the performance of detection scheme under attack scenario. The normal flow depends on the organization of service provider and different configuration and specification of SIP server. In our experiment we used open source version of ASTERISK 1.6 as a SIP server. We compiled and run a C code to add users in SIP database to configure SIP.conf file and EXTENSION.conf file. 3.2 Experimental TestBed For our experiment we used following test bed setup: 1. Legitimate Traffic Generator. This module is responsible to generate all legitimate REGISTER request to SIP server. We generate uniformly distributed normal traffic. 2. Attacker. We have implemented attacker as a different instance of SIPp[2].This module is responsible to to generate low rate flooding and flash crowd requests to SIP server. 3. Attack Detector. This module is responsible to perform all steps mentioned in detection scheme and report anomalies if exist. 4. SIP Server. This module works as a REGISTRAR. Here we used the open source version of Asterisk [1] as a SIP server. 5. Hardware Specification. The testbed has been designed in our NITK Information Security Lab. All modules are operated in Linux machine. The SIP server machine is Intel(R) Core 2 Duo, 2.0 GHz processor with 2 MB RAM and L2 cache running Linux Fedora Core 13 with Kernel version The Attacker and legitimate traffic generator is Intel(R) Core(TM), 3.0 GHz with 1 GB RAM and 4096 KB cache running Linux Fedora 8 with kernel version Fig. 3 Detection Scheme Design 3.1 Configuration Module In our experiment we used SIPp tool with Transport Layer Security (TLS) support as an attack traffic and legitimate traffic generation module. We wrote a XML scenario of REGISTER packet for attacking purpose as well as for legitimate request. For attack generation module, we added illegitimate Fig. 4 Experimental Testbed 33
4 4. PERFORMANCE EVALUATION Now, we present the performance of our proposed detection scheme. As for given hardware specifications of SIP server machine, maximum valid registration request processed by REGISTRAR is 20 REGISTER packet/sec in no attack scenario. For analysis purpose we present all statistics in Figure 5 A, B, C, D, E, F, G, H and I. Where A, B and C shows the performance of HCE parameter under normal condition (request rate uniformly distributed between 1 to 20 REGISTER per second), under low rate attack (flooding rate is comparable to normal condition) and under flash crowd (20-40 REGISTER per second) respectively. Performance of SUBE parameter under normal condition, low rate attack and flash crowd are presented in D, E, and F of Figure 5 respectively. Figure G, H and I present performance of RDE parameter under all three condition. According to our SIP server specification and experiment, SIP server is capable to process 20 legitimate REGISTER packet/sec for configured phones in normal condition. For good accuracy and due to frequent change in network traffic, we have taken 136 samples of SIP attribute data set in duration of 30 minutes. 4.1 Behavior under normal condition From Figure 5.A, the average area under curve by HCE is which is 97.62% of 1350.In ideal case this value should be 100%, but it is due some fluctuation in normal condition. Here area under curve is cumulative sum of trapezoidal shape made over 136 samples. In Figure 5.D, SUBE cover 98.41% of the total area in normal condition. From Figure 5.G it is clear that, the RDE cover only 1.58% of total area in normal scenario, which should be very less in ideal condition. For accurate detection of attack, the sum of positive attitude (HCE and SUBE) must be less than negative attitude (RDE). But here positive attitude is much more than negative one which shows good accuracy of our scheme. So behavior under normal condition is: HCE + SUBE >> RDE 4.2 Behavior under low rate DoS attack Now we analyze effectiveness our detection scheme under low rate attack. For low rate attack, we injected illegitimate requests which rate is less than or equal to normal condition rate. From Figure 5.B, 5.E and 5.H, it is clear that the positive attitude is very less than negative attitude in comparison with normal condition. From Figure 5.B we can see the HCE cover only which is 20.23% of total area. Figure 5.E shows that area covered by SUBE is only 35% of total. Both positive attitude values are less than that of normal condition. In Figure 5.H, the negative attitude RDE cover 64.68% of total area. So in low rate attack scenario, the sum of positive attitude is less than negative attitude. So behavior under low rate attack condition is: HCE + SUBE < RDE 4.3 Behavior under flash crowd Our detection scheme also detect flash crowd (20-40 REGISTER request per second), however our aim was to detect low rate DoS attack. From Figure 5.C, 5.F and 5.I, it is clear that the positive attitude values are less than the negative attitude value. From Figure 5.C, the HCE cover only 37.03% of total area which is more than attack scenario but less than normal condition. Whereas area covered by SUBE is 16.65% in Figure 5.F, which is very less than normal condition. From Figure 5.I, area covered by negative attitude RDE is 83.34% of total which is also much more than normal condition. So behavior under flash crowd is: HCE + SUBE < RDE Table [1], shows summary of the effectiveness of our detection scheme under normal condition, low rate DoS attack and flash crowd. 5. RELATED WORK To the best of our knowledge, no detection scheme is designed to detect the anomaly behavior of SIP server (particularly for SIP REGISTRAR with LOCATION SERVER) against low rate DoS attack. As a result, not much experiment is done to analyze the behavior of SIP server under low attack rate scenario, which significantly degrades the performance of server. The author of [5], experimentally analyzed the behavior of SIP server which is based on HD with probability distribution model. The result show good capability to detect low rate DoS attack for INVITE flooding, however scheme will be ineffective if attacker simultaneously flood the four SIP attributes that are used to build probability distribution model as mentioned in [6]. The important work done in [6], their scheme integrated with two techniques sketch and Hellinger distance with voting procedure which takes significant time for calculation. They focused on INVITE flooding attack and did not mention how fast their detection scheme works. 6. CONCLUSION AND FUTURE WORK In this paper we have experimentally shown the behavior of SIP REGISTRAR under normal condition, low rate DoS attack and flash crowd. The overall calculation time it takes to define behavior of server after module I is 2 to 4 seconds (according to our system configuration). Since our detection scheme is strongly capable to detect low rate DoS attack it also gives high accuracy of detection in high rate flooding attacks as well. Our detection scheme have very low overhead and accurate to detect low rate DoS attack against SIP Server. Our detection mechanism force to build the strong mitigation techniques for different protocol supporting server of VoIP infrastructure under low rate DoS attack. In future we will extend our detection scheme for all low rate DoS attack mentioned in this paper and define protocol state machine to mitigate it. 7. ACKNOWLEDGMENTS I would like to appreciate co-author of this paper and Department of Computer Science and Engineering-Information Security, NITK Surathkal for valuable support in this research. 34
5 Table 1 Summary of performance evaluation of detection scheme International Journal of Computer Applications ( ) Behavior under conditions HCE SUBE RDE Attitude Value Anomaly Detection Normal 97.62% 98.41% 1.58% No Low rate attack 20.23% 35.31% 64.68% Yes Flash crowd 37.03% 16.65% 83.34% Yes Fig. 5 A. HCE under normal condition, B. HCE under low rate attack, C. HCE under flash crowd, D. SUBE under normal condition, E. SUBE under low rate attack, F. SUBE under flash crowd, G. RDE under normal condition, H. RDE under low rate attack, I. RDE under flash crowd 35
6 8. REFERENCES [1] Asterisk, The Open Source Telephony Projects, [2] R. Gayraud et al., SIPp, [3] A. Kumar, S. Thilagam, A. Pais, V. Sharma, K. Sadalkar, Towards Evaluating Resilience of SIP Server Under Low Rate DoS Attack, Proceeding AIM Advances in Information Technology and Mobile Communication AIM 11. Springer-Berlin Heidelberg, CCIS-Vol. 147, pp , (2011). [4] Al-Allouni, H.,Rohiem, A.E.,Hashem, M.,El-moghazy, A.,Ahmed, A.E., VoIP Denial of Service Attacks Classification and Implementation., National Radio Science Conference, NRSC 09. pp 1 12, (2009). [5] H. Sengar, Overloading Vulnerability of VoIP Network. Dependable Systems and Networks, DSN 09. IEEE/IFIP International Conference, pp , (2009). [6] J. Tang,Y. Cheng, C. Zhou, Sketch-Based SIP Flooding Detection Using Hellinger Distance.,Proceeding GLOBECOM 09 Proceedings of the 28th IEEE conference on Global telecommunications. pp , (2009). 36
An Overview on Security Analysis of Session Initiation Protocol in VoIP network
An Overview on Security Analysis of Session Initiation Protocol in VoIP network Tarendra G. Rahangdale 1, Pritish A. Tijare 2, Swapnil N.Sawalkar 3 M.E (Pursuing) 1, Associate Professor 2, Assistant Professor
MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 11, No 4 Sofia 2011 MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks N.
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology
Unregister Attack in SIP Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology Unregister Attack We present a new VoIP Denial Of
Prevention of Anomalous SIP Messages
International Journal of Future Computer and Communication, Vol., No., October 03 Prevention of Anomalous SIP Messages Ming-Yang Su and Chung-Chun Chen Abstract Voice over internet protocol (VoIP) communication
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
User authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology [email protected] Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
Radius/LDAP authentication in open-source IP PBX
Radius/LDAP authentication in open-source IP PBX Ivan Capan, Marko Skomeršić Protenus d.o.o. Telecommunications & networking department Zrinskih i Frankopana 23, Varaždin, 42000, Croatia [email protected],
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise
A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise K.Subhash Bhagavan #1, Kirankumar.P #2, MVSS Nagendranath#3, #1 Student, Sasi Institute of Technology and Engineering,
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
Enumerating and Breaking VoIP
Enumerating and Breaking VoIP Introduction Voice over Internet Protocol (VoIP) has seen rapid implementation over the past few years. Most of the organizations which have implemented VoIP are either unaware
Deployment of Snort IDS in SIP based VoIP environments
Deployment of Snort IDS in SIP based VoIP environments Jiří Markl, Jaroslav Dočkal [email protected] K-209 Univerzita obrany Kounicova 65, 612 00 Brno Czech Republic Abstract This paper describes
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
A VoIP Traffic Monitoring System based on NetFlow v9
A VoIP Traffic Monitoring System based on NetFlow v9 Chang-Yong Lee *1, Hwan-Kuk Kim, Kyoung-Hee Ko, Jeong-Wook Kim, Hyun- Cheol Jeong Korea Information Security Agency, Seoul, Korea {chylee, rinyfeel,
A Call Conference Room Interception Attack and its Detection
A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,
SIP Infrastructure Performance Testing
SIP Infrastructure Performance Testing MIROSLAV VOZNAK, JAN ROZHON Department of Telecommunications VSB Technical University of Ostrava 17. listopadu 15, Ostrava CZECH REPUBLIC [email protected],
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION Yu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Changyong Lee, Hwankuk-Kim, Hyuncheol Jeong, Yoojae Won Korea Information Security Agency, IT Infrastructure Protection Division
Voice over IP Security
Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with
SIP Trunking Manual. For Samsung OfficeServ. Sep 18, 2006 doc v.1.0.2. Sungwoo Lee Senior Engineer
SIP Trunking Manual For Samsung OfficeServ Sep 18, 2006 doc v.1.0.2 Sungwoo Lee Senior Engineer [email protected] OfficeServ Network Lab. Telecommunication Systems Division Samsung Electronics
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Evaluation of Security for a H.323-based VoIP Emulated Architecture
Evaluation of Security for a H.323-based VoIP Emulated Architecture Eng. MARIUS HERCULEA, Professor VIRGIL DOBROTA Ph.D. Abstract Evaluation tests were conducted on H.323 Cisco Gatekeeper, Gateways and
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
Sonus Networks engaged Miercom to evaluate the call handling
Lab Testing Summary Report September 2010 Report 100914 Key findings and conclusions: NBS5200 successfully registered 256,000 user authenticated Total IADs in 16 minutes at a rate of 550 registrations
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
How To Use A Phone Over Ip (Phyto) For A Phone Call
SIP and VoIP Skype an example VoIP client 1 SIP / VoIP: what are these? Voice over IP (VoIP) Session Initiation Protocol (SIP) Control channel Known in telephone world as signaling channel Does call setup:
Distributed Denial of Service Attack Tools
Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily
nexvortex Setup Guide
nexvortex Setup Guide CISCO UC500 March 2012 Introduction This document is intended only for nexvortex customers and resellers as an aid to setting up the Cisco PBX software to connect to the nexvortex
Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0 Abstract These Application Notes describe the procedures for configuring
A Senior Design Project on Network Security
A Senior Design Project on Network Security by Yu Cai and Howard Qi Michigan Technological University 1400 Townsend Dr. Houghton, Michigan 49931 [email protected] Abstract Distributed denial-of-service (DDoS)
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer
Avaya IP Office 8.1 Configuration Guide
Avaya IP Office 8.1 Configuration Guide Performed By tekvizion PVS, Inc. Contact: 214-242-5900 www.tekvizion.com Revision: 1.1 Date: 10/14/2013 Copyright 2013 by tekvizion PVS, Inc. All Rights Reserved.
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
SIP Trunking Quick Reference Document
SIP Trunking Quick Reference Document Publication Information SAMSUNG TELECOMMUNICATIONS AMERICA reserves the right without prior notice to revise information in this publication for any reason. SAMSUNG
VOIP TELEPHONY: CURRENT SECURITY ISSUES
VOIP TELEPHONY: CURRENT SECURITY ISSUES Authors: Valeriu IONESCU 1, Florin SMARANDA 2, Emil SOFRON 3 Keywords: VoIP, SIP, security University of Pitesti Abstract: Session Initiation Protocol (SIP) is the
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
Deploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
Stateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
Security of VoIP. Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks
Security of VoIP Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks A thesis submitted in partial fulfilment of the requirements for the Degree of Master of Science in Computer
SIP Registration Stress Test
SIP Registration Stress Test Miroslav Voznak and Jan Rozhon Department of Telecommunications VSB Technical University of Ostrava 17. listopadu 15/2172, 708 33 Ostrava Poruba CZECH REPUBLIC [email protected],
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Evaluating DoS Attacks Against SIP-Based VoIP Systems
Evaluating DoS Attacks Against SIP-Based VoIP Systems M. Zubair Rafique, M. Ali Akbar and Muddassar Farooq Next Generation Intelligent Networks Research Center (nexgin RC) FAST National University of Computer
Kommunikationsdienste im Internet Möglichkeiten und Risiken
Die Zukunft der Kommunikationsdienste im Internet Möglichkeiten und Risiken Erwin P. Rathgeb Technik der Rechnernetze, Universität Duisburg-Essen Jochen Kögel, Marc Barisch IKR, Universität Stuttgart Steffen
Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,
Mediatrix 3000 with Asterisk June 22, 2011
Mediatrix 3000 with Asterisk June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 Network Topology... 3 Equipment Detail... 3 Configuration of the Fax Extension... 4 Configuration
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Vijay Radhakrishnan & Ranjith Mukundan Wipro Technologies, Bangalore, India Email:{radhakrishnan.vijay,
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Security & Reliability in VoIP Solution
Security & Reliability in VoIP Solution July 19 th, 2006 Ram Ayyakad [email protected] About My background Founder, Ranch Networks 20 years experience in the telecom industry Part of of architecture
Monitoring SIP Traffic Using Support Vector Machines
Monitoring SIP Traffic Using Support Vector Machines Mohamed Nassar, Radu State, Olivier Festor (nassar, state, festor)@loria.fr MADYNES Team INRIA, Nancy Grand Est 17 September 2008 Outline Introduction
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
Index Terms: DDOS, Flash Crowds, Flow Correlation Coefficient, Packet Arrival Patterns, Information Distance, Probability Metrics.
Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Techniques to Differentiate
Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Efficient nonce-based authentication scheme for Session Initiation Protocol
Efficient nonce-based authentication scheme for Session Initiation Protocol Jia Lun Tsai National Chiao Tung University, Taiwan, R.O.C. [email protected] Abstract: In recent years, Session Initiation
Cconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
SIP Proxy Robustness against DoS Attacks
SIP Proxy Robustness against DoS Attacks Miroslav Voznak, Jakub Safarik CESNET Zikova 4, 160 00 Prague Czech Republic [email protected], [email protected] Abstract: - This paper deals with one of key
TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13
COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security
Configuration Notes 290
Configuring Mediatrix 41xx FXS Gateway with the Asterisk IP PBX System June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 About Mediatrix 41xx Series FXS Gateways...
Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date: 2014. 09.29
Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date: 2014. 09.29 http://www.dinstar.com 1 / 9 Contents Chapter 1: Authors and changes logs... 3 Chapter
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs
Network Security Ola Lundh [email protected] Schedule/ time-table: landris.hh.se/ (NetwoSec) Course home-page: hh.se/english/ide/education/student/coursewebp ages/networksecurity cisco.netacad.net Packet
IP Office Technical Tip
IP Office Technical Tip Tip no: 188 Release Date: September 27, 2007 Region: GLOBAL Verifying IP Office SIP Trunk Operation IP Office back-to-back SIP Line testing IP Office Release 4.0 supports SIP trunking.
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
SECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
