University of Limerick Institutional Repository

A lightweight countermeasure to cope with flooding attacks against session initiation protocol

DSpace Repository

Show simple item record

dc.contributor.author Hussain, Intesab
dc.contributor.author Djahel, Soufiene
dc.contributor.author Geneiatakis, Dimitris
dc.contributor.author Naït-Abdesselam, Farid
dc.date.accessioned 2013-08-08T11:22:54Z
dc.date.available 2013-08-08T11:22:54Z
dc.date.issued 2013
dc.identifier.uri http://hdl.handle.net/10344/3295
dc.description peer-reviewed en_US
dc.description.abstract Session Initiation Protocol (SIP) is a widely used protocol for voice and video communication in Internet architecture. Due to its open nature and the lack of robust security mechanisms, SIP is vulnerable to several attacks similar to those existing in Internet infrastructure, such as the flooding attack. An attacker can use any SIP request to launch a flooding attack, leading to severe consequences at either client or server side SIP elements or both of them. In this context, end user’s devices are considered more vulnerable to flooding attacks due to their limited capabilities. In this paper, we focus on INVITE flooding attack for which we propose a simple and robust detection scheme. This scheme prevents an attacker from launching an INVITE flood through a transition state table used by the proxy to analyse the incoming INVITE requests and exclude the suspicious ones. Our scheme requires also that the end-user keeps track of the time and IP addresses of each incoming request. Furthermore, we modify the header of the REGISTER request by adding a new field named Critical number which holds the value of maximum number of users or callers that could easily be handled by the end user. Unlike the existing solutions, our scheme does not require any special detection device or firewall at the SIP server. The proposed mechanism has been implemented in SIP Express Router (SER) and the obtained results have confirmed its effectiveness. en_US
dc.language.iso eng en_US
dc.publisher IEEE Computer Society en_US
dc.relation.ispartofseries The 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC’2013);pp. 1-5
dc.relation.uri http://dx.doi.org/10.1109/WMNC.2013.6549057
dc.rights “© 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.” en_US
dc.subject voice over internet protocol (VoIP) en_US
dc.subject session initiation protocol (SIP) en_US
dc.subject INVITE en_US
dc.subject flooding attack en_US
dc.subject security en_US
dc.title A lightweight countermeasure to cope with flooding attacks against session initiation protocol en_US
dc.type info:eu-repo/semantics/conferenceObject en_US
dc.type.supercollection all_ul_research en_US
dc.type.supercollection ul_published_reviewed en_US
dc.contributor.sponsor SFI en_US
dc.relation.projectid 10/CE/I1855 en_US
dc.rights.accessrights info:eu-repo/semantics/openAccess en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search ULIR


Browse

My Account

Statistics