Open Access   Article Go Back

DoS Flooding Attacks against SIP based VoIP Systems- a Survey

M.Kaur 1 , S. Kumar2 , S. Sharma3

Section:Survey Paper, Product Type: Journal Paper
Volume-2 , Issue-5 , Page no. 112-117, May-2014

Online published on May 31, 2014

Copyright © M.Kaur, S. Kumar, S. Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M.Kaur, S. Kumar, S. Sharma, “DoS Flooding Attacks against SIP based VoIP Systems- a Survey,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.112-117, 2014.

MLA Style Citation: M.Kaur, S. Kumar, S. Sharma "DoS Flooding Attacks against SIP based VoIP Systems- a Survey." International Journal of Computer Sciences and Engineering 2.5 (2014): 112-117.

APA Style Citation: M.Kaur, S. Kumar, S. Sharma, (2014). DoS Flooding Attacks against SIP based VoIP Systems- a Survey. International Journal of Computer Sciences and Engineering, 2(5), 112-117.

BibTex Style Citation:
@article{Kumar_2014,
author = {M.Kaur, S. Kumar, S. Sharma},
title = {DoS Flooding Attacks against SIP based VoIP Systems- a Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2014},
volume = {2},
Issue = {5},
month = {5},
year = {2014},
issn = {2347-2693},
pages = {112-117},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=169},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=169
TI - DoS Flooding Attacks against SIP based VoIP Systems- a Survey
T2 - International Journal of Computer Sciences and Engineering
AU - M.Kaur, S. Kumar, S. Sharma
PY - 2014
DA - 2014/05/31
PB - IJCSE, Indore, INDIA
SP - 112-117
IS - 5
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3738 3387 downloads 3545 downloads
  
  
           

Abstract

The success of the Internet has brought significant changes to the telecommunication industry. One of the remarkable outcomes of this evolution is Voice over IP (VoIP), which enables real time voice communications over packet switched networks for a lower cost than traditional public switched telephone networks (PSTN).VoIP networks are more vulnerable to security threats as compared to traditional PSTN due to their open environment such as the Internet and use of open standard like Session Initiation Protocol (SIP), launching an attack on a telephony server is much simpler. Availability is one of the major issues of computer security, along with confidentiality and integrity. Denial of service (DoS) is a threat that potentially violates the availability of a resource in a system. In this survey, we are discussing the DoS flooding attack on SIP server. Firstly, we present a brief overview about the SIP protocol. Then, we discuss security attacks related to SIP protocol. After that, we talk about the detection techniques of SIP flooding attack and various exploited resources due to attack.

Key-Words / Index Term

VoIP, SIP flooding, DoS, PSTN

References

[1] D. Sisalem, J. Kuthan, T. Elhert,� Denial of Service Attacks Targeting SIP VoIP Infrastructure: Attack Scenarios and prevention Mechanisms�, IEEE Network, Page No (26-31), Oct 2006.
[2] Jan Stanek, Lukas Kencl, and Jiri Kuthan� Characteristics of Real Open SIP-Server Traffic�,Springer , Page No (187-197) ,2013.
[3] ITU, Draft Revised Recommendation H.323 V5, Geneva, 20-30, May 2003.
[4] H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, E. Schooler, and J. Rosenberg, �SIP: Session Initiation Protocol�, RFC 3261, June 2002.
[5] Jin Tang and Yu Cheng, �Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks�, IEEE ICC, Page No(1-5), 2011.
[6] D. Geneiatakis, A. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, S. Ehlert, D. Sisalem,� Survey of security vulnerabilities in Session Initiation Protocol�, IEEE Communications Surveys and Tutorials, Volume-8,Issue-3,Page No(68-81), 2006.
[7] S. Ehlert, G. Zhang, D. Geneiatakis, G. Kambourakis, T. Dagiuklas, J. Markl, and D. Sisalem, �Two layer Denial of Service prevention on SIP VoIP infrastructures�, Elsevier, Computer Communications, Page No(2443-2456),2008.
[8] E. Y. Chen, �Detecting DoS attacks on SIP systems�, 1st IEEE Workshop on VoIP Management and Security, Page No( 53�58), April 2006.
[9] Jin Tang, Yu Cheng and Yong Hao,� Detection and Prevention of SIP Flooding Attacks in Voice over IP Networks�,IEEE INFCOM,Page No(1161-1169),2012.
[10] Rafique, M.Z., Ali Akbar, M. Farooq., �Evaluating DoS Attacks against SIP-based VoIP Systems�,IEEE GLOBECOM, Page No(1-6),2009.
[11] Abhishek Bansal, Prashant Kulkarni, Alwyn R. Pais� Effectiveness of SIP Messages on SIP Server�, Proceedings of 2013 IEEE International Conference on Information and Communication Technologies,Page No(251-256),2013.
[12] Ming Luo Tao Peng & Christopher Leckie,�CPU-based DoS Attacks Against SIP Servers�, IEEE,Page No(41-48),2008 .
[13] Harish C. Sharma Sanjay Sharma Sandeep Chopra Pradeep Semwal �The Protection Mechanism against DOS and SQL Injection Attack in SIP Based Infrastructure�, IJARCSSE,Volume-3,Issue-1,Page No(252-256),Jan 2013.
[14] H. Sengar, H. Wang, D. Wijesekera and S. Jajodia, �Detecting VoIP Floods Using the Hellinger Distance�, IEEE Transactions on Parallel and Distributed Systems, Volume-19, Issue- 6, Page No(794-805), June 2008.
[15] Dongwon Seo ,Heejo Lee , Ejovi Nuwere �SIPAD: SIP�VoIP Anomaly Detection using a Stateful Rule Tree�,Elsevier,Computer communication,Page No(562-574),2013.
[16] Jin Tang, Yu Cheng, and Chi Zhou� Sketch-Based SIP Flooding Detection Using Hellinger Distance�,IEEE GLOBECOM, Page No(1-6), 2009 .
[17] Abhishek Kumar, Dr. P. Santhi Tilagam,� A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack� International Journal of Computer Applications,Volume 26� No.1,Page No (0975 � 8887),July 2011
[18] Xianglin Deng, Malcolm Shore,�Advanced Flooding Attack on a SIP Server�, IEEE Computer Society,Page No(647-652),2009.
[19] Dahham Allawi, Alaa Aldin Rohiem, Ali El-moghazy and Ateff Ghalwash,�New Algorithm for SIP Flooding Attack Detection�,IJCST , Volume- 4, Issue- 3, Page No(10-19), March 2013.
[20] Gaston Ormazabal, Sarvesh Nagpal, Eilon Yardeni, and Henning Schulzrinne �Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems�, Springer,Page No(107-132), 2008.
[21] Housam Al-Allouni1,Alaa Eldin Rohiem , Mohammed Hashem Abd El-Aziz Ahmed, Ali El-moghazy ,� VoIP Denial of Service Attacks Classification and Implementation�, 26th NATIONAL RADIO SCIENCE CONFERENCE ,Page No(1-12),17-19 March 2009.
[22] Mahak Chowdhary, Shrutika Suri and Mansi Bhutani, �Comparative Study of Intrusion Detection System,� Proc. International Journal on Computer Science & Engineering, 2011, vol. 2, Issue 4, pp. 197-200.