Ajou University repository

SIP 기반의 VoIP 시스템에서 서비스 거부 및 통화단절 공격 탐지
  • Ryu, Jae Tek
Citations

SCOPUS

0

Citation Export

Advisor
유승화
Affiliation
아주대학교 정보통신전문대학원
Department
정보통신전문대학원 정보통신공학과
Publication Year
2011-02
Publisher
The Graduate School, Ajou University
Keyword
SIP securityflooding attackcall disruption
Description
학위논문(석사)--아주대학교 정보통신전문대학원 :정보통신공학과,2011. 2
Abstract
This dissertation provides an in depth analysis of the existing security threats which are call disruption attacks and flooding attacks in SIP(Session Initiation Protocol) based VoIP(Voice over IP) systems. Also it discusses the goals and requirements of detection schemes for reliable SIP based VoIP systems. This dissertation presents various enhanced detection schemes against such attacks as the systems degrade QoS(Quality of Service). The first scheme is detection of SIP flooding attacks based on the upper bound of the possible number of SIP messages, which is an effective detection method for SIP flooding attacks in order to deal with the problems of conventional schemes. We derive the upper bound of the possible number of SIP messages, considering not only the network congestion status but also the different properties of individual SIP messages such as INVITE, BYE and CANCEL. This method can be easily extended to detect flooding attacks by other SIP messages. However, such attacks cannot be easily classified the attack signatures, since they may be frequently modified and newly created. That is, it makes difficult to provide the additional countermeasure scheme after detecting the attacks. Therefore, we also propose bloom filter based SIP flooding attack detection scheme. This scheme utilizes bloom filter for classifying SIP flooding attacks whose attack signatures is defined according to the modulated message pattern. In case of call disruption attacks, we propose an effective detection method for those attack(CANCEL, BYE or REGISTER attack) without authentication or encryption schemes. In order to achieve that, Extended INFO method is utilized to deal with the security threats and can be applied in both pre-call and mid-call VoIP mobility environments without additional functions or systems. The performance of our proposed schemes is evaluated in terms of attack detection time, system resource cost(Memory, CPU consumption and so on) and effectiveness of the schemes both in simulation and analytically.
Language
eng
URI
https://dspace.ajou.ac.kr/handle/2018.oak/17804
Fulltext

Type
Thesis
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Total Views & Downloads

File Download

  • There are no files associated with this item.