TY - GEN
T1 - Model-checking DoS amplification for VoIP session initiation
AU - Shankesi, Ravinder
AU - Alturki, Musab
AU - Sasse, Ralf
AU - Gunter, Carl A.
AU - Meseguer, José
PY - 2009
Y1 - 2009
N2 - Current techniques for the formal modeling analysis of DoS attacks do not adequately deal with amplification attacks that may target a complex distributed system as a whole rather than a specific server. Such threats have emerged for important applications such as the VoIP Session Initiation Protocol (SIP). We demonstrate a model-checking technique for finding amplification threats using a strategy we call measure checking that checks for a quantitative assessment of attacker impact using term rewriting. We illustrate the effectiveness of this technique with a study of SIP. In particular, we show how to automatically find known attacks and verify that proposed patches for these attacks achieve their aim. Beyond this, we demonstrate a new amplification attack based on the compromise of one or more SIP proxies. We show how to address this threat with a protocol change and formally analyze the effectiveness of the new protocol against amplification attacks.
AB - Current techniques for the formal modeling analysis of DoS attacks do not adequately deal with amplification attacks that may target a complex distributed system as a whole rather than a specific server. Such threats have emerged for important applications such as the VoIP Session Initiation Protocol (SIP). We demonstrate a model-checking technique for finding amplification threats using a strategy we call measure checking that checks for a quantitative assessment of attacker impact using term rewriting. We illustrate the effectiveness of this technique with a study of SIP. In particular, we show how to automatically find known attacks and verify that proposed patches for these attacks achieve their aim. Beyond this, we demonstrate a new amplification attack based on the compromise of one or more SIP proxies. We show how to address this threat with a protocol change and formally analyze the effectiveness of the new protocol against amplification attacks.
UR - http://www.scopus.com/inward/record.url?scp=70350376882&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70350376882&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-04444-1_24
DO - 10.1007/978-3-642-04444-1_24
M3 - Conference contribution
AN - SCOPUS:70350376882
SN - 3642044433
SN - 9783642044434
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 390
EP - 405
BT - Computer Security - ESORICS 2009 - 14th European Symposium on Research in Computer Security, Proceedings
T2 - 14th European Symposium on Research in Computer Security, ESORICS 2009
Y2 - 21 September 2009 through 23 September 2009
ER -