PREVENTING SPIT WITH NAIVE BAYES IN VOIP COMMUNICATION
|
|
|
- Virgil Hopkins
- 10 years ago
- Views:
Transcription
1 PREVENTING SPIT WITH NAIVE BAYES IN VOIP COMMUNICATION Intesab Hussain Sadhayo*, Fareed Ahmed Jokhio**, Umair Ali Khan*, Pardeep Kumar*, Nisar Ahmed Memon* ABSTRACT Spams over Internet telephony is a serious threat to consumers and enterprises. In comparison to spams, voice spams have drastic effects. It consumes time and resources of the victim for example telemarketing. To counter this problem, we propose a two-step solution with analysis and detection to such threats. In first step, we extract the useful data from VoIP calls to organize and to get the input for our detection phase using bloom filter. In second phase, we examine the data obtained during the first step using Naive Bayes (NB). The efficiency of NB is analyzed by simulations. The results show that our proposed technique for voice spam delivers a high level of accuracy. Keywords: VoIP, SIP Network, security, SPIT, DoS 1. INTRODUCTION Voice over Internet Protocol (VoIP) is a rapidly growing Internet service. Due to its remarkable flexibility, feasible implementation, and low-cost connectivity to international telephones, it has become extremely popular among end-users and communication engineers [1-4]. However, in spite of its immense benefit, this technology contains certain drawbacks also [5] [6]. Session Initiation Protocol (SIP ) [7], which is one of the widely used protocol for VoIP services, is vulnerable to many types of attacks. Apart from this, there are also different types of attacks targeting VoIP protocols [8] [9], such as DoS attacks, call hijacking, toll fraud, SPam over Internet Telephony (SPIT) and phishing. SPIT is one of the most serious threats to IP telephony. Internet telephony is vulnerable to spam calls due to its low cost. Voice over IP systems, like and other Internet applications, are susceptible to abuse by malicious parties to initiate unsolicited and unwanted communications for telemarketing. Apparently, attackers generate a number of machine automated calls to launch a DoS attack. SPIT is similar to the spaming problem which many Internet users face quite often. Although spam will still be a big challenge in the future. The numerous solutions [10-15] proposed over the last few years have helped to mitigate the problem significantly. Many of the well-known techniques which are used for spam detection fail completely in the context of VoIP due to many reasons. First, an usually arrives at a server before it is finally downloaded by the user. Such a mail server can apply many filtering strategies. For instance, it can check whether the text body of the mentions certain products. In contrast, recognizing human voices and to determine whether the message is spam or not is still a very difficult task. Additionally, the recipient of a call only learns about the subject of the message when someone is actually listening to it. Also from a user s perspective, SPIT is quite different from spam. Although a spam is nuisance, it is typically easy to delete such an . But it can be very unproductive if a regular from a friend is considered spam and not delivered to a user s inbox. Having said that, it may be tolerable if an spam filter yields a large ratio of false negatives, but the filter should avoid false positives completely [16]. The work presented in this paper is related to the analysis and detection of threats encountered in Internet telephony. We record a large number of VoIP calls and extract certain input features for spam analysis using bloom filter. The results obtained from the bloom filter are further used as inputs to a Naïve Bayes (NB) classifier for spam detection. The rest of the paper is organized as follows. Section 2 discusses the related work in the domain of spam detection. Section 3 describes our proposed framework for SPIT detection. Section 4 gives a brief overview of the data analysis through bloom filter. Section 5 describes the spam detection using Naïve Bayes classifier. Section 6 discusses the performance evaluation of the proposed technique. Section 7 concludes the paper. * Quaid-e-Awam University of Engineering, Science & Technology, Nawabshah, Pakistan. ** Åbo Akademi University, Finland {intesab, fajokhio, umair.khan, pardeep.kumar, drnisar}@quest.edu.pk 1
2 2. RELATED WORK The relevant literature about spam detection demonstrates various techniques. In [17], SPIT detection is done through human telephony communication patterns. Turing test is used to differentiate between human and computer botnets. The two human communication patterns are discussed which are double-talk and call-start pattern. In double-talk, the fraction of time in which both caller and callee are in talking mode is checked. In start pattern, the proposed scheme checks the starting pattern by asking questions having very short answers. If the callee replies with a long answer for the question which has short answer expected, the Turing test will declare it a SPIT. The limitation of this technique is that it can detect spams in only machine generated calls. The authors in [18] propose a local centric approach based on signaling protocol analysis to counter SPIT. For detection purpose, they consider few facts, e.g., unidirectional spammers, validity of signaling routing data, termination of calls by the same conversation parties, and spammer does not call the same destination for some fraction of time. This solution detects external spammers on a recipient side. The counters are maintained for call setup and call termination in different time stamps. The simultaneous deviation of these counters indicate the spammers activity with respect to certain probabilities. However, false positives may lead this method to consider legitimate callers as SPIT. In [19], authors propose an AntiSPIT method based on a blacklist. This module takes input from Call Detail Record (CDR) and decides whether to put the caller in a black list or not. Although this method is simple, it could block legitimate callers too. The technique proposed in [20] uses a decoy to catch the spammers without their knowledge. In fact, this technique puts a decoy system in front of a server. The spammers treat the decoy as a server and their status are stored in the decoy. This solution is implemented in SIP Express Router (SER). The method is suitable for the IP Multimedia System (IMS) with strong authentication to avoid spoofing. However, this scheme performs well in the situation where two or more decoys are hit by a spammer. The authors in [21] compare different types of Naive Bayes to get the best choice of Naive Bayes for spams. Many machine learning algorithms are used for e- mail spam filtering, e.g., support vector machines, boosting and Naïve Bayes classifier. The authors present a comparison between different Naive Bayes classifiers including multi-variate Bernoulli Naive Bayes, multinomial Naive Bayes, TF attribute, boolean attribute, Multi-variate Gauss Naive Bayes, and flexible Bayes. According to this work, the best results are obtained by the flexible Bayes and multinomial Naive Bayes with boolean attributes. The initial platform to use Naive Bayes in intrusion detection systems for VoIP threats is proposed in [22]. The detection process in this technique keeps track of request intensity, error response, number of destinations, SIP methods and response distribution of VoIP. However, this work can be further extended to detect SPIT. In [23], the consequences of SPIT attacks are highlighted. The first consequence described is space consumption due to voice messages. Second, employees disturbance in companies and the last one is a user s service complaint. In [24-27], different solutions are proposed for some specific scenarios. 3. PROPOSED SOLUTION FOR SPIT DETECTION We consider the properties of various VoIP calls to detect SPIT. The high-level overview of our scheme is depicted in Figure 1. Fig.1: Two-step scheme for SPIT detection We calculate a call-completion-ratio by comparing the number of call initiation, successful acknowledgements and termination. The length of a call is measured by analyzing the call duration. Furthermore, nature of the calls is checked to confirm whether they are machine generated or (genuine) human calls. Our approach also detects the abnormally large number of calls (machine recorded or human) which exhaust the server resources and result in a Denial of Service (DoS) at victim s side. 4. ANALYSIS THROUGH BLOOM FILTERS We use bloom filter in the first step of our proposed technique as described in Figure 2 and Figure 3. In this step, we need to gather the information regarding the callers. This step serves as an input to step 2 in which we use Naive Bayes to predict the probability of calls being SPIT. The bloom filter is a space-efficient technique used for probabilistic dataset for testing whether the element is a member of set or not. An empty bloom filter is a bit array of m bits, all set to 0. There must also be k different hash functions defined, each of which maps or hashes some set element to one of the m array positions with a uniform distribution. 2
3 To add an element in the bloom filter s array, we feed it to each of the k hash functions to get k array positions. We set the bits at all these positions to 1. Bloom filters have a strong space advantage over other data structures for representing sets, such as self-balancing binary search trees, hash tables, simple arrays or linked lists. Fig. 2: Generic structure of Bloom filter Table 1 shows the statistics of the calls analysis with respect to their behavior. We count the number of requests and number of responses through bloom filter. This helps us to check the incomplete sessions of calls. We also count the probability of waiting calls, ongoing traffic sessions and number of maximum dialogues. These parameters help us to specify the respective probabilities to detect the SPIT calls. The bloom filter is used for this data collection. We calculate the probabilities of different frequently used SIP methods. These probabilities are shown in Table 2. This table shows the methods which are necessary for call completion, call cancellation, acknowledgement and registration. These probabilities help us to find the SPIT calls used as input in the second step of our proposed technique. Table 3 shows the probabilities of error response type. In SIP responses, the error could be client error, server error, global error, redirection, successful or provisional response. This step is based on the traffic analysis, and later we use this data to the next step of our proposed scheme. Fig. 3: Bloom filter modified for our proposed technique TABLE 1: SIP CALL DATA Number of Requests Number of Responses Calls Waiting RTP Open ports Maximum no: of Dialogues > > > TABLE 2 : SIP METHODS FOR SPIT INVITE REGISTER ACK CANCEL BYE TABLE 3 : SIP ERROR RESPONSES 1xx 2xx 3xx 4xx 5xx 6xx NAIVE BAYES CLASSIFIER A Naive Bayes classifier is a simple probabilistic classifier based on Bayes theorem [28] with strong independence assumptions. Naive Bayes classifier assumes that the presence of a particular feature of a class is unrelated to the presence of any other feature, given the class variable. The success of Naive Bayes relies on the dependencies. Even if these features depend on each other or on the existence of other features, a Naive Bayes 3
4 classifier considers all of these properties to independently contribute to the probability of an item. Equation 1 shows the probabilistic model of Naïve Bayes classifier. p( e H) p( H) p ( H e) = P( e) (1). In equation 1, p ( H e) represents the probability of instance e being in class H (in our case this represents the probability of a call being legitimate or malicious), p ( e H ) is the probability of generating instance e given class H, p(h ) is the probability of occurrence of class H, and p (e) is the probability of occurrence of instance e. Depending on the precise nature of the probability model, a Naive Bayes classifier can be trained very efficiently by a supervised learning algorithm. In many practical applications, parameter estimation for Naive Bayes models uses the method of maximum likelihood. In spite of its simple design and apparently over-simplified assumptions, Naive Bayes classifier performs quite well in many complex real-world situations. Some analysis of the Bayesian classification [28] shows that there are some theoretical reasons for the apparently unreasonable efficacy of Naive Bayes classifiers. However, a comprehensive comparison with other classification methods [29] shows that Bayes classification is outperformed by more current approaches, such as boosted trees or random forests. However, the main advantage of the Naive Bayes classifier is that it only requires a small amount of training data (means and variances of the variables) to estimate the parameters necessary for classification. Since independent variables are assumed, only the variances of the variables for each class needs to be determined and not the entire covariance matrix.the training is quite easy to implement and just requires the (prior) conditional properties calculated from the offline data analysis. (legitimate/malicious) class. The points illustrating prediction tradeoffs can be obtained by varying the threshold values between classes such as cost curves and cost-benefit analysis of YES and NO. This is particularly useful for the analysis of predictive analytic outcomes. The Naive Bayes classifier is applied to the data retrieved from the bloom filter. Figure 4 depicts margin curve of Naive Bayes. Figure 5 and Figure 6 show threshold curve of YES and threshold curve of NO, respectively. After comparing training data and actual data, Naive Bayes calculates the probability of the calls being SPIT based on the given information and predicts the future probabilities. Thus Naive Bayes classifier is able to detect the SPIT calls through the calculated probability based on the given SIP data. Figure 7 and Figures 8 depict cost-benefit analysis of YES and NO. Figures 9 shows cost analysis of YES and Figure 10 shows cost analysis of NO. Fig. 4 : Naive Bayes Margin curves 6. PERFORMANCE EVALUATION We use Weka [30], a suit of machine learning software written in Java, for the performance evaluation of our proposed technique. It is a data mining tool used for data pre-processing, classification, regression, clustering, association rules, and visualization. We generate random data to check the records of VoIP calls to analyze SPIT. The gathered data includes total number of requests, responses, waiting calls, etc. We further use bloom filter to classify the SIP call data. We generate margin curves which show the difference between the probability calculated for the actual class and the probabilities calculated for the other classes. Margin curves also show the threshold curves of YES/NO Fig.5: Naive Bayes threshold curve of YES Fig. 6: Naive Bayes threshold curve of NO 4
5 Fig. 7: Naive Bayes cost-benefit analysis of YES Fig. 8: Naive Bayes cost-benefit analysis of NO Fig. 9 : Naive Bayes cost analysis of Yes Fig. 10: Naive Bayes cost analysis of No The proposed technique is easy to configure and does not require a special architecture or an additional hardware on the servers. It is cheaper than other proposed techniques in the sense that most of the existing solutions require Intruder Detection Systems (IDS), firewalls and detection devices at both server and client side. The proposed solution is memory-efficient due to the usage of Bloom filter. Future prediction through Naive Bayes works well to block SPIT. Few solutions have been proposed [31-35] for this problem, but they are less efficient than our proposed scheme as shown in our performance evaluation. 5
6 1. CONCLUSION SPIT is a growing threat to SIP based VoIP systems keeping in view that the spam filtering is out of context in VoIP [35-39]. SPIT are harmful for the organizations and for the individuals too. In this paper, we have proposed a two-step solution for spam detection. The first step arranges the SIP data through a bloom filter, while the second step classifies the data to be legitimate or spam using a Naive Bayes classifier. We calculate the probability of the SIP calls being SPIT through a Naive Bayes classifier. At the same time, Naive Bayes helps to predict the future probability of a call being SPIT. The margin curve, cost curve and cost-benefit analysis verify the efficiency of Naive Bayes in our proposed technique. In future, we aim to compare different types of Naïve Bayes classifiers to further improve the accuracy of our proposed technique. REFERENCES [1] [2] [3] [4] [5] D. Kuhn, T. Walsh, S. Fries, Security considerations of voice over IP Systems, National Institute of Standards and Technology (NIST), Gaithersburs, MD, USA, Computer Security Division, Special Publication , January [6] Ge Zhang, "Unwanted Traffic and Information Disclosure in VoIP Networks Threats and Countermeasures", DISSERTATION, Karlstad University Faculty of Economic Sciences, Communication and IT Computer Science [7] H. Schulzrinne et al., "RTP: A Transport Protocol for Real-Time Applications", RFC 1889, January [8] M. Handley et al.," SDP: Session Description Protocol", RFC 2327, April [9] J. Rosenburg et al., "Sip: Session Initiation Protocol", RFC 3261, June 2002 [10] T. Dierks et al., "The Transport Layer Security (TLS) Protocol", RFC 5246, August [11] D. Geneiatakis N. Vrakas, C. Lambrinoudakis, "Utilizing bloom filters for detecting flooding attacks against SIP based services", Computers Security,Vol. 28, No. 7, pp , [12] T. Dierks, E. Rescorla, "The Transport Layer Security (TLS) protocol version 1.1", RFC 4346, April [13] J. Franks et al., HTTP Authentication: Basic and Digest Access Authentication, Internet Engineering Task Force, RFC 2617, June [14] S. Salsano et al., SIP security issues: the SIP authentication procedure and its processing load, IEEE Trans. on Network, Vol. 16, No. 6, pp , [15] B. Ramsdell, Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification, IETF RFC 3851, July [16] S. Ehlert, D. Geneiatakis, T. Magendaz, "Survey of Network Security Systems to Counter SIP-based Denialof-Service Attacks ", Trans. on Computer and Security, Vol. 29, No. 2, pp , [17] D. Xianglin, M. Shore "Advanced flooding attack on a SIP server", In Proc. of IEEE International Conference on Availability, Reliability and Security (ARES), pp , [18] Computer Communications, Volume 31, Issue 10, June [19] M. Bsihop, " Introduction to computer security", Pearson Education India, [20] J. Loughney and G. Camarillo, Authentication, Authorization, and Accounting Requirements for the Session Initiation Protocol (SIP), RFC 3702, Feb [21] Keromytis, Angelos D. "A Comprehensive Survey of Voice over IP Security Research.", IEEE Trans. on Communications Surveys and Tutorials, Vol. 14, No. 2, pp , [22] S. Ehlert, D. Geneiatakis, T. Magendaz, "Survey of Network Security Systems to Counter SIP-based Denialof-Service Attacks ", Trans. on Computer and Security, Vol. 29, No. 2, pp , [23] D. Geneiatakis, A. Dagiouklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, S. Ehlert, D. Sisalem, "Survey of Security Vulnerabilities in Session Initiation Protocol", IEEE Trans. on Communications Surveys and Tutorials, Vol. 8, No. 3, pp , [24] M.A. Akbar, Z. Tariq, M. Farooq, "A comparative study of Detection Algorithms for Detection of SIP Flooding in IMS", In Proc. of IEEEConference on Internet Multimedia Services Architecture and Applications(IMSAA), pp.1-6, [25] D. Geneiatakis T. Daiuklas, G. Kambourakis et.al, "Survey of Security vulnerabilities in Session Initiation Protocol", IEEE Trans. on Communications surveys and tutorials,vol. 8, No. 1-4, pp , [26] D. Sisalem, J. Kuthan, "Denial of service attacks and SIP infrastructure", IEEE Trans. on Network, Vol. 20, No. 5, pp , [27] I. Husaain, F. Nait-Abdesselam, "Strategy based proxy to secure user agent from flooding attack in SIP", In Proc. of 7 th International Wireless Communications and Mobile Computing Conference (IWCMC), pp , [28] Albrecht, Keno, Nicolas Burri, and Roger Wattenhofer. "Spamato-an extendable spam filter system.", In Proc. of 2 nd Conference on and Anti-Spam (CEAS), California, USA
7 [29] MacIntosh R, Vinokurov D., Detection and mitigation of SPAM in IP telephony networks using signalling protocol analysis, In Proc. of IEEE symposium on advances in wired and wireless communication, pp , [30] [31] J. Quittek, S. Niccolini, S. Tartarelli, M. Stiemerling, M. Brunner and T. Ewald, Detecting SPIT calls by checking human communication patterns, In Proc. of IEEE International Conference on Communications (ICC07), pp , [32] Salehin, SM Akramus, and Neco Ventura. "Blocking unsolicited voice calls using decoys for the IMS." In Proc. of IEEE International Conference on Communications, ICC 07, [33] V. Metsis, I. Androutsopoulos, G. Paliouras, Spam filtering with Naïve Bayes - which Naives Bayes?, In Proc. of the 3 rd Conference on and Anti-Spam, Mountain View, pp , [34] Nassar et al., Intrusion detection mechanisms for VoIP applications, [35] " [36] Nucci, Antonio et al., "SIP-based VoIP traffic behavior profiling", United States Patent , [37] H. Sinnreich, A. Johnston., Internet communications using SIP: delivering VoIP and multimedia services with session initiation protocol, Vol. 27, Wiley, ISBN: , [38] Wang, Haiyan, Runsheng Zhou, and Yi Wang, "An antispam filtering system based on the Naive Bayesian Classifier and Distributed Checksum Clearinghouse", In Proc. of IEEE Third International Symposium on Intelligent Information Technology Application (IITA), pp , 2009 [39] M. Voznak and F.Rezc, VoIP SPAM and a defence against this type of threat, In Proc. Of 14 th International Conference on Communications, pp ,
A Phased Framework for Countering VoIP SPAM
International Journal of Advanced Science and Technology 21 A Phased Framework for Countering VoIP SPAM Jongil Jeong 1, Taijin Lee 1, Seokung Yoon 1, Hyuncheol Jeong 1, Yoojae Won 1, Myuhngjoo Kim 2 1
A Call Conference Room Interception Attack and its Detection
A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Vijay Radhakrishnan & Ranjith Mukundan Wipro Technologies, Bangalore, India Email:{radhakrishnan.vijay,
Prevention of Spam over IP Telephony (SPIT)
General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea
SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.
SIP SECURITY Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne WILEY A John Wiley and Sons, Ltd., Publication Foreword About the Authors Acknowledgment xi xiii xv 1 Introduction
Prevention of Anomalous SIP Messages
International Journal of Future Computer and Communication, Vol., No., October 03 Prevention of Anomalous SIP Messages Ming-Yang Su and Chung-Chun Chen Abstract Voice over internet protocol (VoIP) communication
A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack
A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack Abhishek Kumar Department of Computer Science and Engineering-Information Security NITK Surathkal-575025, India Dr. P. Santhi
A VoIP Traffic Monitoring System based on NetFlow v9
A VoIP Traffic Monitoring System based on NetFlow v9 Chang-Yong Lee *1, Hwan-Kuk Kim, Kyoung-Hee Ko, Jeong-Wook Kim, Hyun- Cheol Jeong Korea Information Security Agency, Seoul, Korea {chylee, rinyfeel,
User authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology [email protected] Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 11, No 4 Sofia 2011 MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks N.
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Changyong Lee, Hwankuk-Kim, Hyuncheol Jeong, Yoojae Won Korea Information Security Agency, IT Infrastructure Protection Division
A Lightweight Secure SIP Model for End-to-End Communication
A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China [email protected] Abstract
An Overview on Security Analysis of Session Initiation Protocol in VoIP network
An Overview on Security Analysis of Session Initiation Protocol in VoIP network Tarendra G. Rahangdale 1, Pritish A. Tijare 2, Swapnil N.Sawalkar 3 M.E (Pursuing) 1, Associate Professor 2, Assistant Professor
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
Voice over IP Security
Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with
Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 211 proceedings Quick Detection of Stealthy SIP Flooding Attacks
SIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna ([email protected]) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
A Novel Pathway for Portability of Networks and Handing-on between Networks
A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 [email protected]
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
A Study on Countering VoIP Spam using RBL
2011 2nd International Conference on Networking and Information Technology IPCSIT vol.17 (2011) (2011) IACSIT Press, Singapore A Study on Countering VoIP Spam using RBL Seokung Yoon, Haeryoung Park, Myoung
Detecting Spam in VoIP Networks. Ram Dantu Prakash Kolan
Detecting Spam in VoIP Networks Ram Dantu Prakash Kolan More Multimedia Features Cost Why use VOIP? support for video-conferencing and video-phones Easier integration of voice with applications and databases
A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment
A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment Dimitris Geneiatakis and Costas Lambrinoudakis Laboratory of Information and Communication Systems Security
Customize Approach for Detection and Prevention of Unsolicited Call in VoIP Scenario: A Review
Customize Approach for Detection and Prevention of Unsolicited Call in VoIP Scenario: A Review Jui Khamar 1, Hardik Upadhya 2, Jayesh Mevada 3 1 M.E Student, Department of Computer Engineering, Merchant
SIP, Session Initiation Protocol used in VoIP
SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1
New method for evaluating anti-spit in VoIP networks
New method for evaluating anti-spit in VoIP networks Mina Amanian Dept. of Computer engineering Imam Reza International University of Mashhad, Iran [email protected] Mohammad Hossein Yaghmaee Moghaddam
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
Monitoring SIP Traffic Using Support Vector Machines
Monitoring SIP Traffic Using Support Vector Machines Mohamed Nassar, Radu State, Olivier Festor (nassar, state, festor)@loria.fr MADYNES Team INRIA, Nancy Grand Est 17 September 2008 Outline Introduction
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
How To Attack A Phone With A Billing Attack On A Sip Phone On A Cell Phone On An At&T Vpn Vpn Phone On Vnet.Com (Vnet) On A Pnet Vnet Vip (Sip)
Billing Attacks on SIP-Based VoIP Systems Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Xuxian Jiang Department of Information and Software Engineering George Mason University, Fairfax, VA 22030, USA {rzhang3,
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Cryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163.
Weakness in a Mutual Authentication cheme for ession Initiation Protocol using Elliptic Curve Cryptography Debiao He chool of Mathematics and tatistics, Wuhan University, Wuhan, People s Republic of China
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
Detecting Spam in VoIP Networks
Detecting Spam in VoIP Networks Ram Dantu, Prakash Kolan Dept. of Computer Science and Engineering University of North Texas, Denton {rdantu, prk2}@cs.unt.edu Abstract Voice over IP (VoIP) is a key enabling
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
Bayesian Spam Filtering
Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary [email protected] http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
AN EFFECTIVE SPAM FILTERING FOR DYNAMIC MAIL MANAGEMENT SYSTEM
ISSN: 2229-6956(ONLINE) ICTACT JOURNAL ON SOFT COMPUTING, APRIL 212, VOLUME: 2, ISSUE: 3 AN EFFECTIVE SPAM FILTERING FOR DYNAMIC MAIL MANAGEMENT SYSTEM S. Arun Mozhi Selvi 1 and R.S. Rajesh 2 1 Department
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Unregister Attacks in SIP
Unregister Attacks in SIP Anat Bremler-Barr Ronit Halachmi-Bekel Interdisciplinary Center Herzliya Email: {bremler,halachmi.ronit}@idc.ac.il Jussi Kangasharju Darmstadt University of Technology [email protected]
A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise
A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise K.Subhash Bhagavan #1, Kirankumar.P #2, MVSS Nagendranath#3, #1 Student, Sasi Institute of Technology and Engineering,
Managing Risks at Runtime in VoIP Networks and Services
Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Evaluating DoS Attacks Against SIP-Based VoIP Systems
Evaluating DoS Attacks Against SIP-Based VoIP Systems M. Zubair Rafique, M. Ali Akbar and Muddassar Farooq Next Generation Intelligent Networks Research Center (nexgin RC) FAST National University of Computer
Two-Stage Forking for SIP-based VoIP Services
Two-Stage Forking for SIP-based VoIP Services Tsan-Pin Wang National Taichung University An-Chi Chen Providence University Li-Hsing Yen National University of Kaohsiung Abstract SIP (Session Initiation
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System 1 M.Yasodha, 2 S. Umarani 1 PG Scholar, Department of Information Technology, Maharaja Engineering College,
VoIP Security Threats and Vulnerabilities
Abstract VoIP Security Threats and Vulnerabilities S.M.A.Rizvi and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, UK e-mail: [email protected] This paper presents the
A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony
A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony Dimitris Geneiatakis, Georgios Kambourakis and Costas Lambrinoudakis Laboratory of Information and Communication
An Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
Network Convergence and the NAT/Firewall Problems
Network Convergence and the NAT/Firewall Problems Victor Paulsamy Zapex Technologies, Inc. Mountain View, CA 94043 Samir Chatterjee School of Information Science Claremont Graduate University Claremont,
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University
Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push
Programming SIP Services University Infoline Service
Programming SIP Services University Infoline Service Tatiana Kováčiková, Pavol Segeč Department of Information Networks University of Zilina Moyzesova 20, 010 26 SLOVAKIA Abstract: Internet telephony now
A Scalable Multi-Server Cluster VoIP System
A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu [email protected] {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department
CE 817 - Advanced Network Security VoIP Security
CE 817 - Advanced Network Security VoIP Security Lecture 25 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially
Detecting DoS Attacks on SIP Systems
Detecting DoS Attacks on SIP Systems Eric. Chen TT Information Sharing Platform Laboratories, TT Corporation 3-9-11 Midori-cho, Musashino-shi, Tokyo, 180-8585, Japan TEL: +81-422-59-3347, FAX: +81-422-59-5660
Tweaking Naïve Bayes classifier for intelligent spam detection
682 Tweaking Naïve Bayes classifier for intelligent spam detection Ankita Raturi 1 and Sunil Pranit Lal 2 1 University of California, Irvine, CA 92697, USA. [email protected] 2 School of Computing, Information
SIP Penetration Testing in CESNET Best Practice Document
SIP Penetration Testing in CESNET Best Practice Document Produced by CESNET led working group on Multimedia transmissions and collaborative environment (CBPD142) Author: Miroslav Voznak December 2010 TERENA
Towards Secure SIP Signalling Service for VoIP applications
Ge Zhang Towards Secure SIP Signalling Service for VoIP applications Performance-related Attacks and Preventions Karlstad University Studies 2009:27 Ge Zhang. Towards Secure SIP Signalling Service for
Protecting SIP Proxy Servers from Ringing-based Denial-of-Service Attacks
Protecting SIP Proxy Servers from Ringing-based Denial-of-Service Attacks William Conner and Klara Nahrstedt Department of Computer Science, University of Illinois at Urbana-Champaign {wconner,klara}@uiuc.edu
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
SIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna ([email protected]) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
Countering Unsolicited Calls in the Internet Telephony: An anti-spit Architecture
Countering Unsolicited Calls in the Internet Telephony: An anti-spit Architecture Panos STAMATIOU 1 and Dimitris GRITZALIS 1,2 1 Hellenic Open University (HOU), Dept. of Informatics, Patras, Greece 2 Athens
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Enumerating and Breaking VoIP
Enumerating and Breaking VoIP Introduction Voice over Internet Protocol (VoIP) has seen rapid implementation over the past few years. Most of the organizations which have implemented VoIP are either unaware
How To Protect Your Phone From Being Hacked By A Man In The Middle Or Remote Attacker
An Empirical Investigation into the Security of Phone Features in SIP-based VoIP Systems Ruishan Zhang 1, Xinyuan Wang 1, Xiaohui Yang 1, Ryan Farley 1, and Xuxian Jiang 2 1 George Mason University, Fairfax,
A Novel Distributed Wireless VoIP Server Based on SIP
A Novel Distributed Wireless VoIP Server Based on SIP Yuebin Bai 1,Syed Aminullah 1, Qingmian Han 2, Ding Wang 1, Tan Zhang 1,and Depei Qian 1 1 (School of Computer Science and Engineering, Beihang University,
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
