首页> 外文会议>International Conference on Ubiquitous Computing and Communications >An Empirical Study of Denial of Service (DoS) against VoIP
【24h】

An Empirical Study of Denial of Service (DoS) against VoIP

机译:对VoIP拒绝服务(DOS)的实证研究

获取原文

摘要

This research is motivated by consistent hacking activities against our Voice over IP (VoIP) servers where we observed millions of intrusion attempts from all over the world. From the syslog data on a server, we observed the REGISTER flooding attack. We then conducted a more thorough study by capturing every incoming and outgoing SIP packet from the tcpdump data. In addition to the REGISTER flooding attack, we also identified the INVITE flooding attack. Our major findings are (1) a REGISTER flooding rate of 200 msg/sec has the potential to deplete CPU resource and causes a Denial of Service (DoS) attack, and (2) an INVITE flooding rate with only 110 msg/sec could cause a DoS attack because of process stack overflow. We also discuss different approaches to prevent the DoS attacks against IP-PBX.
机译:这项研究是通过对我们对IP的声音(VoIP)服务器的一致性的黑客活动来激励,我们观察到来自世界各地的数百万侵入企图。从服务器上的Syslog数据,我们观察了寄存器泛滥攻击。然后,我们通过从TCPDump数据捕获每个传入和传出的SIP数据包进行更全面的研究。除了寄存器洪水攻击之外,我们还确定了邀请洪水攻击。我们的主要结果是(1)寄存器洪水速度为200万吨/秒,有可能耗尽CPU资源,并导致拒绝服务(DOS)攻击,(2)只有110万种msg /秒的邀请洪水速度可能导致由于过程堆栈溢出而攻击。我们还讨论了不同的方法,以防止对IP-PBX的DOS攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号