SIP Service Providers and The Spam Problem



Similar documents
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Technical Means to Combat Spam in the VoIP Service

A Phased Framework for Countering VoIP SPAM

Detecting Spam in VoIP Networks. Ram Dantu Prakash Kolan

Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)

SPAM over Internet Telephony (SPIT) und Abwehrmöglichkeiten

A Lightweight Secure SIP Model for End-to-End Communication

In general, spam describes information, often

Prevention of Spam over IP Telephony (SPIT)

An outline of the security threats that face SIP based VoIP and other real-time applications

Ram Dantu. VOIP: Are We Secured?

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Sangheon Pack, EunKyoung Paik, and Yanghee Choi

A Call Conference Room Interception Attack and its Detection

A Model for Spam Prevention in IP Telephony Networks using Anonymous Verifying Authorities

Service Identifier Comparison module Service Rule Comparison module Favourite Application Server Reinvocation Management module

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks

SIP: Ringing Timer Support for INVITE Client Transaction

Preparatory Meeting for Phase 2 of Philippine National ENUM Trial

Countering Unsolicited Calls in the Internet Telephony: An anti-spit Architecture

Migration of Enterprise VoIP/SIP Solutions towards IMS

Outline. VoIP Research Workshop February, Canberra. VoIP Workshop. VoIP in AARNet (+) Group discussion. Summary, what s next?

Programming SIP Services University Infoline Service

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Chapter 2 PSTN and VoIP Services Context

Why Content Filters Can t Eradicate spam

Voice over IP Communications

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.

A Study on Countering VoIP Spam using RBL

Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users 1

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

INSTANT MESSAGING SECURITY

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

SIP, Session Initiation Protocol used in VoIP

A Lightweight Countermeasure to Cope with Flooding Attacks Against Session Initiation Protocol

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Session Initiation Protocol and Services

Security issues in Voice over IP: A Review

NAT TCP SIP ALG Support

Spam over SIP. Sebastian Domancich. Helsinki University of Technology, Finland

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem

WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.

Integrating Voice over IP services in IPv4 and IPv6 networks

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

Efficient load balancing system in SIP Servers ABSTRACT:

Real-Time Billing in SIP

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

An Efficient Server Load Balancing using Session Management

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Software Engineering 4C03 SPAM

Unit 23. RTP, VoIP. Shyam Parekh

Contents. Specialty Answering Service. All rights reserved.

Analysis of an Artificial Hormone System (Extended abstract)

ADVOSS SIP APPLICATION SERVERS

MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

User authentication in SIP

Applied Networks & Security

eprism Security Appliance 6.0 Release Notes What's New in 6.0

SOSIMPLE Self Organizing SIMPLE A Proposed P2P Instant Messaging System

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Internet Communications Using SIP

(Refer Slide Time: 6:17)

EE4607 Session Initiation Protocol

Architectural Considerations for Providing Carrier Class Telephony Services Utilizing SIP...

Guidance Regarding Skype and Other P2P VoIP Solutions

NTP VoIP Platform: A SIP VoIP Platform and Its Services

Reputation Network Analysis for Filtering

This specification this document to get an official version of this User Network Interface Specification

2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing

Next Generation IP Telephony: Moving beyond phone system replacement

TSIN02 - Internetworking

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Nomination-based Session Initiation Protocol Service for Mobile Ad Hoc Networks

SIP : Session Initiation Protocol

Threat Analysis of the Session Initiation Protocol Regarding Spam

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University

Resource Management and Containment for Active Services

SIP Intrusion Detection and Response Architecture for Protecting SIP-based Services

SIP Technology in the Enterprise

Developing Higher Density Solutions with Dialogic Host Media Processing Software

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Session Initiation Protocol (SIP)

Enabling SIP-Based Services in Ad Hoc Networks

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

An Evaluation of Architectures for IMS Based Video Conferencing

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking

Collaborative Reputation-based Voice Spam Filtering

Customize Approach for Detection and Prevention of Unsolicited Call in VoIP Scenario: A Review

Transcription:

SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation Protocol (SIP) is used for managing multimedia sessions in the Internet. As an emerging standard gaining more and more acceptance within the IT community, SIP will probably be the target of spammers. We propose, in this paper, a reputation-based mechanism that builds trust between users within a SIP community and prevents spammers to carry out attacks. Our technique uses a social networks approach enhanced with some reputation ratings. A metric for computing reputation is defined and an algorithm allowing the users to evaluate each other is also presented. 1 Introduction Spam refers in general to any unsolicited communication. The latter may hide actions that vary from marketing advertisements to some computer virus spreading. Spammers intend to create an environment of untrust in the provided services as well as the tools used for the provision. For instance, some statistics [8] reveal that 52% of email users say spam has made them less trusting email and 25% say that the volume of spam has reduced their usage of email. Spam appears as a real threat that the service providers try to combat using in particular some filtering mechanisms. These filters are not always efficient as they have to make sure before discarding any message that the latter is a spam message with an extremely high confidence. In addition, these filters also need to be maintained and updated regularly. Reputation systems ([15],[16]) are mechanisms that have been used in many different areas to build trust between members of a certain community. As an example, one can mention ebay which is an electronic community where the members can be rated according to the performed commercial transactions. The reputation systems are in general lightweight and can be maintained easily. In this paper, we describe a mechanism that uses the reputation concept for building trust between users in a SIP community. Our mechanism allows the users to rate each other according to some predefined criteria. Based on this rating, a SIP social network is developed. This allows to identify the SIP spammers and discard them from the network. Our scheme could also be used in concert with the existing filtering techniques to prevent spam problems within SIP communities. The paper is organized as follows: Section 2 presents an overview of the SIP spam problem and the existing solutions to deal with. Section describes the proposed architecture as well as its different functionalities. In section 4, some issues that will be addressed in the future are listed and finally section 5 concludes the paper. 1

2 Spam problem in SIP 2.1 SIP Overview The Session Initiation Protocol (SIP) is an application-layer protocol defined by IETF for managing multimedia sessions in the Internet [1]. A session can be established between two end-users or more and can involve IP phone calls, conferencing and messaging. SIP is handled through messages such as INVITE for initiating a session and BYE to terminate it. The main components in a SIP network are briefly described below ([1], [2]), User Agents (UAs): these are the end devices in a SIP network. They can originate SIP requests to establish a media session and send and receive media. A user agent can be either a SIP phone or a SIP client software running on a PC. Servers: these are intermediate SIP entities in a SIP network that assist the user agents in establishing media sessions and some other functions. SIP servers are three categories: proxies, redirect servers and registrars. Location servers: a location server is a database where users information such URLs, IP addresses, scripts and other preferences are stored. A location server may also contain routing information such as locations of proxies, gateways and other location servers. The SIP standard is more and more accepted by the IT community and currently is ubiquitous in the market through a large row of services. For instance, the new Messenger for Windows launched by Microsoft, includes SIP-based telephony, presence, instant messaging and voice/video communication. SIP is increasing its popularity in the mobile world too: in the GPP consortium for G mobile networks, SIP is the chosen signaling protocol and Nokia has announced SIP support for its Series 60 platform of mobile terminals. The SIP protocol has shown a strong acceptance by the market as some service providers offer already free and non-free SIP-based VoIP and Instant Messaging services. Among these SIP providers, one can mention earthlink [] and iptel.org [4]. To provide satisfactory services, SIP providers need to deal with unsolicited or spam communications. The spam problem in email and instant messaging (IM) has conducted the email or the IM users to trust less these tools and consequently reduce their usage. SIP has not been yet the target of this kind of attacks, but it seems it is only a matter of time [5]. 2.2 SIP Spam forms As a new emerging standard, SIP might be also the target of some Spam attacks. As a consequence, identifying SIP spam and the mechanisms to deal with, is a very crucial task before the problem arises. SIP spam can take one of the following forms, for more details, we refer to [5], call spam : this is the case of unsolicited messages for establishing voice, video or IM session. The spammer proceeds to relay his message over the real time media. This form is the usual way used by telemarketers IM spam: this form is similar to email spam, unsolicited IMs whose content contains the message that the spammer is seeking to convey. The SIP MESSAGE request will be used here but also some other messages such as INVITE with text or html bodies 2

Presence spam: this spam is similar to the previous one, i.e unsolicited presence (subscribe) requests are sent to get on the buddy list of a user and send him IM or initiate other forms of communications In [5], a bunch of solutions to SIP spam is also suggested. In general, these solutions are some mechanisms developed to deal with email spam and which could be adapted to SIP spam because of some similarities as mentioned earlier. Among these solutions, one can mention, content filtering, white lists, Consent-based communications and identity authentication [5]. Unfortunately, if these solutions can be applied to the SIP spam problem, they seem to be insufficient and need to be combined with each other or with some other techniques to provide robustness. The SIP Social Networks Approach.1 Graphs Structure Overview A graph is a finite set of nodes (or vertices) connected by links called edges (or arcs). A directed graph is a graph where each edge is an ordered pair of nodes (u,v) representing a directed connection from u to v. The out-degree of a node u is the number of the distinct edges (u,v 1 )...(u,v k ) and the in-degree is the number of the distinct edges (v 1,u)...(v k,u). The degree of a node u is the sum of the in-degree and the out-degree values. A path from node u to node v is a sequence of edges (u,u 1 ), (u 1,u 2 ),... (u k,v). Note that a path from u to v does not imply a path from v to u..2 SIP Social Networks In general, a network refers to a set of items called vertices (or nodes) with possible connections between them, called edges. A social network is a set of people with some pattern of contacts or interactions between them. These patterns can be friendship relations between individuals, business relationships between companies, etc. Systems taking networks or social networks forms are called graphs in the mathematical literature (see section.1). Let s consider now a SIP Provider that offers SIP based services such as VoIP calls and Instant messaging. Let s assume that any user of these services is managing a contact list to keep track of his friends that they are allowed to communicate with him. Usually, buddy lists are used for the Instant Messaging service and phone books are used for the telephony services. However, along this paper, contact lists will be used as a general terminology to describe lists of a user s friends that are allowed to communicate with him. Let s also assume that any SIP user is able to assign a reputation value to all the persons figuring on his contact list. These reputation values simply refer to how trustful the assigned persons are. It turns out when we combine all these scored contact lists, a large reputation network is generated. In fact, this network is constructed by considering first the owner of the contact list and the users figuring on this list as nodes connected with some scored edges. These sub-networks are connected to each other when there is a possibility to connect them. Figure 1 depicts how two users A and B get connected to each other through their common friends.

7 N 1 N 2 5 N 7 4 B 7 N 5 A 9 N 4 N 6 A s contact list B s contact list Figure 1: SIP Reputation Network In the sequel, we will use graphs or SIP social networks when talking about the networks obtained by merging all the contact lists (in the way described above) of the SIP users. In doing so, we will avoid any confusion with the SIP networks (infrastructure) terminology described in section 2.1.. Architecture First of all, the objective of this architecture is to provide a mechanism based on reputation to help detecting unsolicited calls or messages within the users community of a given SIP Service Provider. In fact, it may happen that a user from this community misuse one or more of the provided services by sending unsolicited messages or establishing VoIP calls. The intentions behind this misuse can be business purposes or malicious actions. For detecting SIP spam, our system does not require anything on the user s side except that when the users create their contact lists, they must score the persons on these lists according to an evaluation criteria that the Service Provider has predefined. Figure 2 depicts the different components that our system comprises. These components as well as their functionalities will be discussed below. Reputation Network Manager User Interface SIP incoming requests S I P s e r v e r User_1 User_ Rep_1. Rep_1n-1 SIP repository User_2 User_n Rep_2n. User_ Rep_2 User_n User_7 Rep_n7. Rep_nn-1 User_5 Rep_15 Rep_2n-1 Rep_n Figure 2: Network architecture 4

..1 SIP repository The SIP repository is a database where the contact lists of the different users are stored. The contact list records are of the form described in Figure 2. The first column of these records comprises the users identifiers, which could be the names of these users or their SIP URLs. However, the second column includes the reputation values that the owner of the list has assigned to each member of his contact list. The contact list records are created and updated by the user through a web interface or another suitable tool...2 SIP server As mentioned in section 2.1, a SIP server is an intermediate entity that assists the SIP user agents in establishing the multimedia sessions. In our architecture, the SIP server is the main component as the multimedia services such as VoIP calls and Instant Messages are handled through it. In fact, a spammer needs to issue a SIP request towards the users that the spammer wishes to be in contact with. The SIP request can be for instance the SIP INVITE or the SIP MESSAGE. The SIP server intercepts the mentioned request and before performing the corresponding action, it forwards the request sender identifier and the request destination identifier information to the Reputation Network Manager (RNM) in order to check whether this request is an unsolicited message. Once the SIP server receives the answer from the RNM, it behaves accordingly to treat the received request... Reputation Network Manager The first functionality that the RNM has to perform is building the SIP social network. The RNM has the access to the SIP repository, so, based on the stored contact lists records, it can construct the reputation network in the way described in section.2. As the contact lists might be updated, the RNM has to access regularly the SIP repository and update consequently the SIP social network. The other functionality that the RNM has to carry out is the reputation computing. This simply means that upon receiving the SIP request information from the SIP server, the RNM computes a reputation value related to this request and compare it to a predefined threshold that will be discussed in section...2. If this reputation value is greater than the threshold, the RNM will inform the SIP proxy to process the request, otherwise, the SIP server will reject it....1 Reputation computing algorithm First of all, the RNM needs to find out all the direct paths from the SIP request sender to the user that the request is destined to. Afterwards, all the found paths will be rated and the RNM will take the average of the different ratings. For simplicity seek, the user who sent the SIP request will be denoted by destination and the user that the request is destined to, will be denoted by source. If the source and the destination users are directly linked, so no need to compute a reputation value as the destination identifier is already in the contact list of the source. If the source and the destination are not directly linked, the reputation rating will be the average of the reputation values for the destination returned by each of the neighbors of the source. Defining the metrics to be used in the rating is always a hard task when building reputation systems. In general, reputation is computed locally, as in our case, and the obtained values need to be 5

combined in order to provide a global one. Combining these reputation values can be achieved in different ways that each of them reflects some specific purposes. In our context, we have chosen a simple metric that takes into account how trustful a recommendation provider is when his recommendation is being used. For instance, if we assume that p paths including nodes N 1,, exist between the source and the destination, the metric for computing the reputation of the N n p destination node is described by the following formula, n p 1 r( source, N1 ) * r( Ni, Ni+ 1) * r( Nn, destination) p p i r source destination = = 1 (, ) (1) p where r(a, B) is the reputation value expressing the amount of trust that A has in B. One can note that in the above formula, recommendations (i.e reputation values provided by the next nodes in the paths) are used according to the amount of trust that the user computing the reputation has in the recommenders. Based on the mentioned formula, the algorithm used for rating the incoming SIP request is depicted below, Rep_eval(source, destination) Start from the source Mark the source as visited If the source has no rating for the destination α = 1, β = 0 for each u in the neighborhood of the source if u is not visited yet β ++ α = α * Rep_eval (source, u) * Rep_eval (u, destination) Mark u as visited Rep_eval (source, destination) = α/ β Return Rep_eval(source, destination)...2 Spam threshold reputation As mentioned earlier, this reputation value is needed to classify whether the request is spam or not. If the request reputation value is less than the threshold, the request is classified as spam, otherwise, it is further processed. The reputation threshold is tightly bound to the metric used for the rating, so if the metric changes, the threshold value might need to be updated in order to reflect more the context. 4 Further Work In the future, we will consider more metrics and evaluate them in order to determine their accuracy. We will also study the impact of varying the threshold value on the different used metrics. The algorithm used for rating is particularly based on a graph searching procedure. As the SIP social network can be huge, searching for a path between the source and the destination may generate a 6

considerable delay. For this reason, we also have the intention to refine the mentioned algorithm and optimize it in order to cope more with large scale networks. 5 Conclusion In this paper, we have presented an approach combining social networks and reputation rating to deal with SIP spam. After having described the problem space, we have defined a metric to be used in the rating operation as well as an algorithm designed for searching for eventual paths between the source and the destination and provide the corresponding reputation value. Our mechanism can work in concert with some other filtering techniques to prevent spam problems within SIP communities. REFERENCES [1] J. Rosenberg et al, "SIP: Session Initiation Protocol", RFC 261, June 2002 [2] J. Rosenberg et al, "Session Initiation Protocol (SIP): Locating SIP Servers", RFC 26, June 2002 [] Earthlink, http://www.earthlink.net [4] Iptel.org, http://www.iptel.org [5] J. Rosenberg et al, The Session Initiation protocol (SIP) and Spam, draft-rosenberg-sippingspam-00, July 11, 2004 [6] J. Golbeck et al, Trust Networks on the Semantic Web, http://www200.org/cdrom/papers/poster/p14/p14_golbeck.html [7] J. Golbeck et al, Reputation Network Analysis for Email Filtering, http://www.ceas.cc/papers- 2004/177.pdf [8] P. Oscar et al, Personal Email Networks: An Effective Anti-Spam Tool, http://arxiv.org/abs/cond-mat/040214 [9] M. E. J. Newman et al, Email Networks and the Spread of Computer Viruses, Physical Review E66, 051001R (2002) [10] M. E. J. Newman, Properties of Highly Clustered Networks, Physical Review E68, 026121 (200) [11] M. E. J. Newman et al, Finding and Evaluating Community Structure in Networks, Physical Review E69, 02611 (200) [12] J. M. Pujol et al, Reputation Measures based on Social Networks metrics for Multi Agent Systems, [1] D. Senn, Reputation and Trust Management in Ad Hoc Networks with Misbehaving Nodes, Diploma Thesis DA-200.27, July 2004 [14] A. Alexa, Reputation Management in P2P Networks: The EigenTrust Algorithm, http://www.mpi-sb.mpg.de/units/ag5/teaching/ws0_04/p2p-data/01-20-paper2.pdf [15] L. Xiong, L. Liu, A Reputation-Based Trust Model for Peer-to-Peer ecommerce Communities, Proc of the IEEE International Conference on E-commerce (CEC 0), 200 [16] B. Yu et al, A Social Mechanism of Reputation Management in Electronic Communities, Proceedings of Fourth International Workshop on Cooperative Information Agents, pp 154-165, 2000 [17] G. Zacharias et al, Trust Management Through Reputation Mechanisms, Applied Artificial Intelligence 14, pp 881-907, 2000 7