• DocumentCode
    2124792
  • Title

    Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms

  • Author

    Rafique, M. Zubair ; Khan, Zeeshan Shafi ; Khan, Muhammad Khurram ; Alghatbar, Khaled

  • Author_Institution
    Center of Excellence in Inf. Assurance (CoEIA), King Saud Univ., Riyadh, Saudi Arabia
  • fYear
    2011
  • fDate
    11-13 April 2011
  • Firstpage
    559
  • Lastpage
    563
  • Abstract
    Modern communication infrastructure (IP Multimedia Subsystem (IMS) and Voice over IP (VoIP)) are vulnerable to zero day attacks and unknown threats. Anomalous SIP requests can be used to remotely launch malicious activity. Furthermore, anomalous messages are capable of crashing - sometimes with one message only - servers and end points. Recently, it is shown that a malicious SIP message "INVITE of Death" crash a server or gain unfettered access to it. In contrast, little research is done to protect IMS against such anomalous messages. In this paper, we propose an anomalous message detection framework that extracts novel syntactical features from SIP messages at the P-CSCF of an IMS. Our framework operates in four steps: (1) analyzes the byte-level distribution of SIP message, (2) extracts spatial features from IMS messages in form of byte transition probabilities, (3) uses well-known feature selection scheme to remove redundancy in the features set, and (4) uses standard machine learning algorithms to raise the final alarm. The benefit of our framework is that it is lightweight requiring less processing and memory resources and provides high detection accuracy. We have evaluated our system on a real-world IMS dataset consisting of more than 10, 000 benign and malicious SIP messages. The results of our experiments demonstrate that using machine learning algorithms, our framework achieves detection accuracy of more than 99%. Last but not least, its testing time is 152μ seconds per packet, as a result, it can be easily deployed on IMS core.
  • Keywords
    Internet telephony; learning (artificial intelligence); multimedia communication; security of data; signalling protocols; IP-multimedia subsystem; P-CSCF; SIP; Voice over IP; anomalous message; byte-level distribution; feature extraction; machine learning; malicious activity; proxy call state control function; Accuracy; Feature extraction; Machine learning algorithms; Protocols; Security; Servers; Testing; IMS Security; INVITE of Death; Machine Learning; SIP Security; VoIP Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Technology: New Generations (ITNG), 2011 Eighth International Conference on
  • Conference_Location
    Las Vegas, NV
  • Print_ISBN
    978-1-61284-427-5
  • Electronic_ISBN
    978-0-7695-4367-3
  • Type

    conf

  • DOI
    10.1109/ITNG.2011.102
  • Filename
    5945297