TY - GEN
T1 - Protecting SIP proxy servers from ringing-based denial-of-service attacks
AU - Conner, William
AU - Nahrstedt, Klara
PY - 2008
Y1 - 2008
N2 - As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to grow in importance for Voiceover-IP deployments that use SIP for call signaling. Since the protection of the global telecommunications infrastructure is critical to people's everyday lives, ensuring the availability of SIP proxy servers under attack should be a high priority. This paper first describes a disruptive denial-of-service attack that exploits the semantics of the SIP protocol to exhaust resources at a stateful SIP proxy server. Unlike previous approaches that focus on flooding-based denial-of-service attacks, we consider attacks that do not result in high incoming call traffic rates at the SIP proxy server. After describing this semantic-based attack, we then propose a new algorithm to reduce the effects of such an attack. Our algorithm has been implemented in a SIP proxy server and evaluated extensively through experiments on a local testbed.
AB - As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to grow in importance for Voiceover-IP deployments that use SIP for call signaling. Since the protection of the global telecommunications infrastructure is critical to people's everyday lives, ensuring the availability of SIP proxy servers under attack should be a high priority. This paper first describes a disruptive denial-of-service attack that exploits the semantics of the SIP protocol to exhaust resources at a stateful SIP proxy server. Unlike previous approaches that focus on flooding-based denial-of-service attacks, we consider attacks that do not result in high incoming call traffic rates at the SIP proxy server. After describing this semantic-based attack, we then propose a new algorithm to reduce the effects of such an attack. Our algorithm has been implemented in a SIP proxy server and evaluated extensively through experiments on a local testbed.
UR - http://www.scopus.com/inward/record.url?scp=62949104348&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=62949104348&partnerID=8YFLogxK
U2 - 10.1109/ISM.2008.65
DO - 10.1109/ISM.2008.65
M3 - Conference contribution
AN - SCOPUS:62949104348
SN - 9780769534541
T3 - Proceedings - 10th IEEE International Symposium on Multimedia, ISM 2008
SP - 340
EP - 347
BT - Proceedings - 10th IEEE International Symposium on Multimedia, ISM 2008
T2 - 10th IEEE International Symposium on Multimedia, ISM 2008
Y2 - 15 December 2008 through 17 December 2008
ER -