Skip to main content

SIP Stealthy Attack Detection and Resource-Drained Malformed Message Attack Detection

  • Chapter
  • First Online:
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 703 Accesses

Abstract

In this chapter, we first address the stealthy attack, where intelligent attackers can afford a long time to attack the system, and only incur minor changes to the system within each sampling period. To identify such attacks in the early stage for timely responses, we propose a detection scheme based on the signal processing technique wavelet, which is able to quickly expose the changes induced by the attacks. Then, we address the malformed message attack identified by us, which manipulates both the “Session-Expires” header in the SIP message and openness of wireless protocols to severely drain the network resources. We develop a detection method based on the Anderson–Darling test to deal with such attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. T. Anderson and D. Darling, “Asymptotic Theory of Certain “Goodness-of-Fit” Criteria Based on Stochastic Processes,” Annals of Mathematical Statistics, 1952.

    Google Scholar 

  2. G. Carl, R. Brooks and S. Rai, “Wavelet Based Denial-of-Service detection,” Computers & Security, vol. 25, no. 8, pp. 600–615, Nov. 2006.

    Article  Google Scholar 

  3. I. M. Chakravarti, R. G. Laha, and J. Roy, Handbook of Methods of Applied Statistics, Volume I, John Wiley and Sons, pp. 392–394, 1967.

    Google Scholar 

  4. E. Chen, “Detecting DoS Attacks on SIP Systems,” in Proc. 1st IEEE Workshop on VoIP Management and Security, 2006, pp. 53–58.

    Google Scholar 

  5. G. Cormode and S. Muthukrishnan, “An Improved Data Stream Summary: The Count-Min Sketch and its Applications,” J. Algorithms, 2004.

    Google Scholar 

  6. I. Daubechies, Ten Lectures on Wavelets, Philadelphia, PA: SIAM, 1992.

    Book  MATH  Google Scholar 

  7. S. Donovan, and J. Rosenberg, “Session Timers in the Session Initiation Protocol (SIP),” IETF RFC 4028, Apr. 2005.

    Google Scholar 

  8. S. Elhert, C. Wang, T. Magedanz and D. Sisalem, “Specification-Based Denial-of-Service Detection for SIP Voice-over-IP Networks,” in Proc. 3rd IEEE International Conference on Internet Monitoring and Protection, 2008, pp. 59–66.

    Google Scholar 

  9. D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis and S. Gritzalis, “SIP Security Mechanism: A State-of-the-Art Review,” in Proc. 5th International Network Conference, 2005, pp. 147–155.

    Google Scholar 

  10. D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, K. S. Ehlert and D. Sisalem, “Survey of Security Vulnerabiliteis in Session Initiation Protocol,” IEEE Communication Surveys & Tutorials, vol. 8, no. 3, pp. 68–81, 2006.

    Article  Google Scholar 

  11. A. Gilbert, S. Guha, P. Indyk, S. Muthukrishnan and M. Strauss, “Quicksand: Quick Summary and Analysis of Network Data,” DIMACS Technical Report 2001–43, 2001.

    Google Scholar 

  12. F. Gustafson and M. Lindahl, “Evaluation of statistical distributions for VoIP traffic modelling,” University Essay from University West, Department of Economics and IT, 2009.

    Google Scholar 

  13. C. Huang, S. Thareja and Y. Shin, “Wavelet-Based Real Time Detection of Network Traffic Anomalies,” in Proc. Securecomm and Workshops, 2006.

    Google Scholar 

  14. B. Krishnamurthy, S. Sen, Y. Zhang and Y. Chen, “Sketch-based Change Detection: Methods, Evaluation, and Applications,” in Proc. ACM SIGCOMM IMS, 2003.

    Google Scholar 

  15. A. Lakhina, M. Crovella and C. Diot, “Diagnosing Network-Wide Traffic Anomalies,” in Proc. ACM SIGCOMM, 2004.

    Google Scholar 

  16. A. Lakhina, M. Crovella and C. Diot, “Mining Anomalies Using Traffic Feature Distribution,” in Proc. ACM SIGCOMM, 2005.

    Google Scholar 

  17. X. Li, F. Bian, M. Crovella and C. Diot, “Detection and Identification of Network Anomalies Using Sketch Subspaces,” in Proc. ACM IMS, 2006.

    Google Scholar 

  18. W. Lu, M. Tavallaee and A. Ghorbani, “Detecting Network Anomalies Using Different Wavelet Basis Functions,” in Proc. Communication Networks and Services Research Conference, 2008.

    Google Scholar 

  19. J. Rosenberg, H. Schulzrinne and G. Camarillo, “SIP: Session Initiation Protocol,” IETF RFC 3261, Jun. 2002.

    Google Scholar 

  20. R. Schweller, Z. Li, Y. Chen, Y. Gao, A. Gupta, Y. Zhang, P. Dinda, M. Kao and G. Memik “Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications” in Proc. IEEE INFOCOM, 2006.

    Google Scholar 

  21. H. Sengar, H. Wang, D. Wijesekera and S. Jajodia, “Detecting VoIP Floods Using the Hellinger Distance,” IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 6, pp. 794–805, Jun. 2008.

    Article  Google Scholar 

  22. SIP Express Router, [Online.] Available: http://www.iptel.org/ser/.

  23. D. Sisalem, J. Kuthan and S. Ehlert, “Denial of Service Attacks Targeting a SIP VoIP Infrastructure: Attack Scenarios and Prevention Mechanisms,” IEEE Network, vol. 20, no. 5, pp. 26–31, 2006.

    Article  Google Scholar 

  24. M. Stephens, “EDF Statistics for Goodness of Fit and Some Comparisons,” Journal of the American Statistical Association, vol. 69, pp. 730–737, 1974.

    Article  Google Scholar 

  25. VoIPSA, “VoIP Security and Privacy Threat Taxonomy,” Public Release 1.0, 2005.

    Google Scholar 

  26. S. Vuong and Y. Bai, “A Survey of VoIP Intrusion and Intrusion Detection System,” in Proc. IEEE 6th International Conference on Advanced Communication Technology, 2004, pp. 317–322.

    Google Scholar 

  27. G. Yang and L. Le Cam, Asymptotics in Statistics: Some Basic Concepts, second edition, Wiley, Mar. 2006.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Tang, J., Cheng, Y. (2013). SIP Stealthy Attack Detection and Resource-Drained Malformed Message Attack Detection. In: Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8996-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-8996-2_5

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-8995-5

  • Online ISBN: 978-1-4614-8996-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics