TY - JOUR
T1 - SIPAD
T2 - SIP-VoIP Anomaly Detection using a Stateful Rule Tree
AU - Seo, Dongwon
AU - Lee, Heejo
AU - Nuwere, Ejovi
N1 - Funding Information:
This research was supported by the R&BD Support Center of Seoul Development Institute and the South Korean government ( WR080951 ) and the Public welfare&Safety research program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2012M3A2A1051118 2012051118). The preliminary version was presented in IFIP TC-11 23rd International Information Security Conference (SEC) [31] .
PY - 2013/3/1
Y1 - 2013/3/1
N2 - Voice over IP (VoIP) services have become prevalent lately because of their potential advantages such as economic efficiency and useful features. Meanwhile, Session Initiation Protocol (SIP) is being widely used as a session protocol for the VoIP services. Many mobile VoIP applications have recently been launched, and they are becoming attractive targets for attackers to steal private information. In particular, malformed SIP messages and SIP flooding attacks are the most significant attacks as they cause service disruption by targeting call procedures and system resources. Although much research has been conducted in an effort to address the problems, they remain unresolved challenges due to the ease of launching variants of attacks. In this paper, we propose a stateful SIP inspection mechanism, called SIP-VoIP Anomaly Detection (SIPAD), that leverages a SIP-optimized data structure to detect malformed SIP messages and SIP flooding attacks. SIPAD precomputes the SIP-optimized data structure (termed a stateful rule tree) that reorganizes the SIP rule set by hierarchical correlation. Depending on the current state and the message type, SIPAD determines the corresponding branches from the stateful rule tree, and inspects a SIP message's structure by comparing it to the branches. The SIP-optimized rule tree provides higher detection accuracy, wider detection coverage and faster detection than existing approaches. Conventional SIP inspection schemes tend to have high overhead costs due to the complexity of their rule matching schemes. Experimental results of our SIP-optimized approach, by contrast, indicate that it dramatically reduces overhead and can even be deployed in resource-constrained environments such as smartphones.
AB - Voice over IP (VoIP) services have become prevalent lately because of their potential advantages such as economic efficiency and useful features. Meanwhile, Session Initiation Protocol (SIP) is being widely used as a session protocol for the VoIP services. Many mobile VoIP applications have recently been launched, and they are becoming attractive targets for attackers to steal private information. In particular, malformed SIP messages and SIP flooding attacks are the most significant attacks as they cause service disruption by targeting call procedures and system resources. Although much research has been conducted in an effort to address the problems, they remain unresolved challenges due to the ease of launching variants of attacks. In this paper, we propose a stateful SIP inspection mechanism, called SIP-VoIP Anomaly Detection (SIPAD), that leverages a SIP-optimized data structure to detect malformed SIP messages and SIP flooding attacks. SIPAD precomputes the SIP-optimized data structure (termed a stateful rule tree) that reorganizes the SIP rule set by hierarchical correlation. Depending on the current state and the message type, SIPAD determines the corresponding branches from the stateful rule tree, and inspects a SIP message's structure by comparing it to the branches. The SIP-optimized rule tree provides higher detection accuracy, wider detection coverage and faster detection than existing approaches. Conventional SIP inspection schemes tend to have high overhead costs due to the complexity of their rule matching schemes. Experimental results of our SIP-optimized approach, by contrast, indicate that it dramatically reduces overhead and can even be deployed in resource-constrained environments such as smartphones.
KW - Flooding attacks
KW - Malformed messages
KW - SIP anomaly detection
KW - VoIP security
UR - http://www.scopus.com/inward/record.url?scp=84873993241&partnerID=8YFLogxK
U2 - 10.1016/j.comcom.2012.12.004
DO - 10.1016/j.comcom.2012.12.004
M3 - Article
AN - SCOPUS:84873993241
SN - 0140-3664
VL - 36
SP - 562
EP - 574
JO - Computer Communications
JF - Computer Communications
IS - 5
ER -