首页> 外文期刊>Computers & Security >Utilizing bloom filters for detecting flooding attacks against SIP based services
【24h】

Utilizing bloom filters for detecting flooding attacks against SIP based services

机译:利用布隆过滤器检测针对基于SIP的服务的泛洪攻击

获取原文
获取原文并翻译 | 示例

摘要

Any application or service utilizing the Internet is exposed to both general Internet attacks and other specific ones. Most of the times the latter are exploiting a vulnerability or mis-configuration in the provided service and/or in the utilized protocol itself. Consequently, the employment of critical services, like Voice over IP (VoIP) services, over the Internet is vulnerable to such attacks and, on top of that, they offer a field for new attacks or variations of existing ones. Among the various threats-attacks that a service provider should consider are the flooding attacks, at the signaling level, which are very similar to those against TCP servers but have emerged at the application level of the Internet architecture. This paper examines flooding attacks against VoIP architectures that employ the Session Initiation Protocol (SIP) as their signaling protocol. The focus is on the design and implementation of the appropriate detection method. Specifically, a bloom filter based monitor is presented and a new metric, named session distance, is introduced in order to provide an effective protection scheme against flooding attacks. The proposed scheme is evaluated through experimental test bed architecture under different scenarios. The results of the evaluation demonstrate that the required time to detect such an attack is negligible and also that the number of false alarms is close to zero.
机译:任何利用Internet的应用程序或服务都会遭受一般Internet攻击和其他特定攻击。多数情况下,后者在提供的服务和/或所使用的协议本身中利用漏洞或错误配置。因此,在Internet上使用诸如IP语音(VoIP)服务之类的关键服务很容易受到此类攻击,最重要的是,它们为新攻击或现有攻击的变种提供了一个领域。服务提供商应考虑的各种威胁攻击包括信号级别的泛洪攻击,这种攻击与针对TCP服务器的攻击非常相似,但已在Internet体系结构的应用程序级别出现。本文研究了针对使用会话初始协议(SIP)作为其信令协议的VoIP体系结构的泛洪攻击。重点是适当的检测方法的设计和实现。具体而言,提出了一种基于Bloom过滤器的监视器,并引入了一个新的度量标准(称为会话距离),以提供一种针对泛洪攻击的有效保护方案。通过在不同情况下的实验测试平台架构来评估所提出的方案。评估结果表明,检测到此类攻击所需的时间可以忽略不计,而且错误警报的数量也接近于零。

著录项

  • 来源
    《Computers & Security》 |2009年第7期|578-591|共14页
  • 作者单位

    Laboratory of Information and Communication Systems Security, Department of Information and Communication Systems Engineering, University of the Aegean, Karlovassi, GR-83200 Samos, Greece;

    Laboratory of Information and Communication Systems Security, Department of Information and Communication Systems Engineering, University of the Aegean, Karlovassi, GR-83200 Samos, Greece;

    Laboratory of Information and Communication Systems Security, Department of Information and Communication Systems Engineering, University of the Aegean, Karlovassi, GR-83200 Samos, Greece;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    session initiation protocol (SIP); voice over IP (VoIP); flooding attacks; denial of service; bloom filter; security;

    机译:会话发起协议(SIP);IP语音(VoIP);洪水袭击;拒绝服务;布隆过滤器安全;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号