Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

Meeting of the European Network of Universities and Companies in Information and Communication Engineering

EUNICE 2010: Networked Services and Applications - Engineering, Control and Management pp 97–106Cite as

  1. Home
  2. Networked Services and Applications - Engineering, Control and Management
  3. Conference paper
Labeled VoIP Data-Set for Intrusion Detection Evaluation

Labeled VoIP Data-Set for Intrusion Detection Evaluation

  • Mohamed Nassar18,
  • Radu State18 &
  • Olivier Festor18 
  • Conference paper
  • 1254 Accesses

  • 13 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 6164)

Abstract

VoIP has become a major application of multimedia communications over IP. Many initiatives around the world focus on the detection of attacks against VoIP services and infrastructures. Because of the lack of a common labeled data-set similarly to what is available in TCP/IP network-based intrusion detection, their results can not be compared. VoIP providers are not able to contribute their data because of user privacy agreements. In this paper, we propose a framework for customizing and generating VoIP traffic within controlled environments. We provide a labeled data-set generated in two types of SIP networks. Our data-set is composed of signaling and other protocol traces, call detail records and server logs. By this contribution we aim to enable the works on VoIP anomaly and intrusion detection to become comparable through its application to common datasets.

Keywords

  • Intrusion Detection
  • Session Initiation Protocol
  • Intrusion Detection System
  • Attack Scenario
  • Internet Relay Chat

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Download conference paper PDF

References

  1. VoIPSA: VoIP security and privacy threat taxonomy. Public Release 1.0 (2005), http://www.voipsa.org/Activities/VOIPSA_Threat_Taxonomy_0.1.pdf

  2. Reynolds, B., Ghosal, D.: Secure IP telephony using multi-layered protection. In: Proceedings of The 10th Annual Network and Distributed System Security Symposium, San Diego, CA, USA (2003)

    Google Scholar 

  3. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: RFC3261: SIP: Session initiation protocol (2002)

    Google Scholar 

  4. Niccolini, S., Garroppo, R., Giordano, S., Risi, G., Ventura, S.: SIP intrusion detection and prevention: recommendations and prototype implementation. In: 1st IEEE Workshop on VoIP Management and Security, pp. 47–52 (2006)

    Google Scholar 

  5. Wu, Y., Bagchi, S., Garg, S., Singh, N., Tsai, T.K.: SCIDIVE: A stateful and cross protocol intrusion detection architecture for Voice-over-IP environments. In: International Conference on Dependable Systems and Networks (DSN 2004), pp. 433–442. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  6. Sengar, H., Wijesekera, D., Wang, H., Jajodia, S.: VoIP intrusion detection through interacting protocol state machines. In: Proceedings of the 38th IEEE International Conference on Dependable Systems and Networks (DSN 2006). IEEE Computer Society, Los Alamitos (2006)

    Google Scholar 

  7. Fiedler, J., Kupka, T., Ehlert, S., Magedanz, T., Sisalem, D.: VoIP defender: Highly scalable SIP-based security architecture. In: Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications (IPTComm 2007). ACM, New York (2007)

    Google Scholar 

  8. Chen, E.Y.: Detecting DoS attacks on SIP systems. In: Proceedings of 1st IEEE Workshop on VoIP Management and Security, San Diego, CA, USA, pp. 53–58 (2006)

    Google Scholar 

  9. Ehlert, S., Wang, C., Magedanz, T., Sisalem, D.: Specification-based denial-of-service detection for SIP Voice-over-IP networks. In: The Third International Conference on Internet Monitoring and Protection (ICIMP), pp. 59–66. IEEE Computer Society, Los Alamitos (2008)

    CrossRef  Google Scholar 

  10. Zhang, G., Ehlert, S., Magedanz, T., Sisalem, D.: Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding. In: Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications (IPTComm 2007), pp. 57–66. ACM, New York (2007)

    CrossRef  Google Scholar 

  11. Sengar, H., Wang, H., Wijesekera, D., Jajodia, S.: Detecting VoIP floods using the Hellinger distance. IEEE Trans. Parallel Distrib. Syst. 19, 794–805 (2008)

    CrossRef  Google Scholar 

  12. Kang, H., Zhang, Z., Ranjan, S., Nucci, A.: SIP-based VoIP traffic behavior profiling and its applications. In: Proceedings of the 3rd annual ACM workshop on Mining network data (MineNet 2007), pp. 39–44. ACM, New York (2007)

    CrossRef  Google Scholar 

  13. Nassar, M., State, R., Festor, O.: Monitoring SIP traffic using support vector machines. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 311–330. Springer, Heidelberg (2008)

    CrossRef  Google Scholar 

  14. Nassar, M., State, R., Festor, O.: The VoIP Bot project, http://gforge.inria.fr/projects/voipbot/

  15. Nassar, M., State, R., Festor, O.: VoIP malware: Attack tool & attack scenarios. In: Proceedings of the IEEE International Conference on Communications, Communication and Information Systems Security Symposium (ICC 2009, CISS). IEEE, Los Alamitos (2009)

    Google Scholar 

  16. Dang, T.D., Sonkoly, B., Molnar, S.: Fractal analysis and modeling of VoIP traffic. In: Proceedings of Networks 2004, pp. 217–222 (2004)

    Google Scholar 

  17. Duffy, F., Mercer, R.: A study of network performance and customer behavior during-direct-distance-dialing call attempts in the USA. Bell System Technical Journal 57, 1–33 (1978)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. INRIA Research Center, Nancy - Grand Est, 615, rue du jardin botanique, 54602, Villers-Lès-Nancy, France

    Mohamed Nassar, Radu State & Olivier Festor

Authors
  1. Mohamed Nassar
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Radu State
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Olivier Festor
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Department of Telematics, Norwegian University of Science and Technology (NTNU), O.S. Bragstads plass 2B, 7491, Trondheim, Norway

    Finn Arve Aagesen

  2. Centre for Quantifiable Quality of Service in Communication Systems (Q2S), Norwegian University of Science and Technology, O.S. Bragstads plass 2E, 7491, Trondheim, Norway

    Svein Johan Knapskog

Rights and permissions

Reprints and Permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nassar, M., State, R., Festor, O. (2010). Labeled VoIP Data-Set for Intrusion Detection Evaluation. In: Aagesen, F.A., Knapskog, S.J. (eds) Networked Services and Applications - Engineering, Control and Management. EUNICE 2010. Lecture Notes in Computer Science, vol 6164. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13971-0_10

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-13971-0_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13970-3

  • Online ISBN: 978-3-642-13971-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

65.108.231.39

Not affiliated

Springer Nature

© 2023 Springer Nature