Protecting SIP proxy servers from ringing-based denial-of-service attacks

William Conner, Klara Nahrstedt

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to grow in importance for Voiceover-IP deployments that use SIP for call signaling. Since the protection of the global telecommunications infrastructure is critical to people's everyday lives, ensuring the availability of SIP proxy servers under attack should be a high priority. This paper first describes a disruptive denial-of-service attack that exploits the semantics of the SIP protocol to exhaust resources at a stateful SIP proxy server. Unlike previous approaches that focus on flooding-based denial-of-service attacks, we consider attacks that do not result in high incoming call traffic rates at the SIP proxy server. After describing this semantic-based attack, we then propose a new algorithm to reduce the effects of such an attack. Our algorithm has been implemented in a SIP proxy server and evaluated extensively through experiments on a local testbed.

Original languageEnglish (US)
Title of host publicationProceedings - 10th IEEE International Symposium on Multimedia, ISM 2008
Pages340-347
Number of pages8
DOIs
StatePublished - 2008
Event10th IEEE International Symposium on Multimedia, ISM 2008 - Berkeley, CA, United States
Duration: Dec 15 2008Dec 17 2008

Publication series

NameProceedings - 10th IEEE International Symposium on Multimedia, ISM 2008

Other

Other10th IEEE International Symposium on Multimedia, ISM 2008
Country/TerritoryUnited States
CityBerkeley, CA
Period12/15/0812/17/08

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Protecting SIP proxy servers from ringing-based denial-of-service attacks'. Together they form a unique fingerprint.

Cite this