SIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seo, Dongwon | - |
dc.contributor.author | Lee, Heejo | - |
dc.contributor.author | Nuwere, Ejovi | - |
dc.date.accessioned | 2021-09-06T03:43:44Z | - |
dc.date.available | 2021-09-06T03:43:44Z | - |
dc.date.created | 2021-06-14 | - |
dc.date.issued | 2013-03-01 | - |
dc.identifier.issn | 0140-3664 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/103777 | - |
dc.description.abstract | Voice over IP (VoIP) services have become prevalent lately because of their potential advantages such as economic efficiency and useful features. Meanwhile, Session Initiation Protocol (SIP) is being widely used as a session protocol for the VoIP services. Many mobile VoIP applications have recently been launched, and they are becoming attractive targets for attackers to steal private information. In particular, malformed SIP messages and SIP flooding attacks are the most significant attacks as they cause service disruption by targeting call procedures and system resources. Although much research has been conducted in an effort to address the problems, they remain unresolved challenges due to the ease of launching variants of attacks. In this paper, we propose a stateful SIP inspection mechanism, called SIP-VoIP Anomaly Detection (SIPAD), that leverages a SIP-optimized data structure to detect malformed SIP messages and SIP flooding attacks. SIPAD precomputes the SIP-optimized data structure (termed a stateful rule tree) that reorganizes the SIP rule set by hierarchical correlation. Depending on the current state and the message type, SIPAD determines the corresponding branches from the stateful rule tree, and inspects a SIP message's structure by comparing it to the branches. The SIP-optimized rule tree provides higher detection accuracy, wider detection coverage and faster detection than existing approaches. Conventional SIP inspection schemes tend to have high overhead costs due to the complexity of their rule matching schemes. Experimental results of our SIP-optimized approach, by contrast, indicate that it dramatically reduces overhead and can even be deployed in resource-constrained environments such as smartphones. (C) 2013 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER | - |
dc.subject | VULNERABILITIES | - |
dc.title | SIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Heejo | - |
dc.identifier.doi | 10.1016/j.comcom.2012.12.004 | - |
dc.identifier.scopusid | 2-s2.0-84873993241 | - |
dc.identifier.wosid | 000319369700007 | - |
dc.identifier.bibliographicCitation | COMPUTER COMMUNICATIONS, v.36, no.5, pp.562 - 574 | - |
dc.relation.isPartOf | COMPUTER COMMUNICATIONS | - |
dc.citation.title | COMPUTER COMMUNICATIONS | - |
dc.citation.volume | 36 | - |
dc.citation.number | 5 | - |
dc.citation.startPage | 562 | - |
dc.citation.endPage | 574 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | VULNERABILITIES | - |
dc.subject.keywordAuthor | VoIP security | - |
dc.subject.keywordAuthor | SIP anomaly detection | - |
dc.subject.keywordAuthor | Malformed messages | - |
dc.subject.keywordAuthor | Flooding attacks | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.