Title :
A lightweight countermeasure to cope with flooding attacks against session initiation protocol
Author :
Hussain, Iqbal ; Djahel, Soufiene ; Geneiatakis, D. ; Nait-Abdesselam, Farid
Author_Institution :
LIPADE, Univ. of Paris Descartes, Paris, France
Abstract :
Session Initiation Protocol (SIP) is a widely used protocol for voice and video communication in Internet architecture. Due to its open nature and the lack of robust security mechanisms, SIP is vulnerable to several attacks similar to those existing in Internet infrastructure, such as the flooding attack. An attacker can use any SIP request to launch a flooding attack, leading to severe consequences at either client or server side SIP elements or both of them. In this context, end user´s devices are considered more vulnerable to flooding attacks due to their limited capabilities. In this paper, we focus on INVITE flooding attack for which we propose a simple and robust detection scheme. This scheme prevents an attacker from launching an INVITE flood through a transition state table used by the proxy to analyse the incoming INVITE requests and exclude the suspicious ones. Our scheme requires also that the end-user keeps track of the time and IP addresses of each incoming request. Furthermore, we modify the header of the REGISTER request by adding a new field named Critical number which holds the value of maximum number of users or callers that could easily be handled by the end user. Unlike the existing solutions, our scheme does not require any special detection device or firewall at the SIP server. The proposed mechanism has been implemented in SIP Express Router (SER) and the obtained results have confirmed its effectiveness.
Keywords :
IP networks; Internet telephony; computer network security; network servers; routing protocols; signalling protocols; video communication; INVITE flooding attack; IP address; Internet; REGISTER request header; SER; SIP express router; SIP server; critical number; firewall; incoming INVITE request analysis; lightweight countermeasure; robust detection scheme; robust security mechanism; session initiation protocol; transition state table; video communication; voice communication; Computer crime; IP networks; Protocols; Registers; Servers; Time factors; Denial of Service; INVITE Flooding Attack; Security; Session Initiation Protocol (SIP); Voice over Internet Protocol (VoIP);
Conference_Titel :
Wireless and Mobile Networking Conference (WMNC), 2013 6th Joint IFIP
Conference_Location :
Dubai
Print_ISBN :
978-1-4673-5615-2
Electronic_ISBN :
978-1-4673-5614-5
DOI :
10.1109/WMNC.2013.6549057