Towards a Security Model against Denial of Service Attacks for SIP Traffic
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1315521

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 999

References:


[1] D. Golait and N. Hubballi, "Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling," IEEE Transactions on Information Forensics and Security, vol. 12, pp. 730-745, 2017.
[2] Security Intelligence. Available: https://securityintelligence.com/hello-youve-been-compromised-upward-attack-trend-targeting-voip-protocol-sip/, (Accessed: 15/11/2017).
[3] A. D. Keromytis, "A comprehensive survey of voice over IP security research," IEEE Communications Surveys & Tutorials, vol. 14, pp. 514-537, 2012.
[4] G. Ormazabal, S. Nagpal, E. Yardeni, and H. Schulzrinne, "Secure sip: A scalable prevention mechanism for dos attacks on sip based voip systems," Principles, systems and applications of IP telecommunications. Services and security for next generation networks, pp. 107-132, 2008.
[5] I. Jouravlev, "Mitigating Denial-Of-Service Attacks On VoIP Environment," International Journal of Applied Management and Technology, vol. 6, 2008.
[6] M. V. Martin and P. C. Hung, "Towards a security policy for VoIP applications," in Electrical and Computer Engineering, 2005. Canadian Conference on, 2005, pp. 65-68.
[7] L. Shan and N. Jiang, "Research on security mechanisms of SIP-based VoIP system," in Hybrid Intelligent Systems, 2009. HIS'09. Ninth International Conference on, 2009, pp. 408-410.
[8] J. Lee, K. Cho, C. Lee, and S. Kim, "VoIP-aware network attack detection based on statistics and behavior of SIP traffic," Peer-to-Peer Networking and Applications, vol. 8, pp. 872-880, 2015.
[9] M. Z. Rafique, M. A. Akbar, and M. Farooq, "Evaluating DoS attacks against SIP-based VoIP systems," in Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 2009, pp. 1-6.
[10] U. U. Rehman and A. G. Abbasi, "Security analysis of VoIP architecture for identifying SIP vulnerabilities," in Emerging Technologies (ICET), 2014 International Conference on, 2014, pp. 87-93.
[11] S. Ehlert, D. Geneiatakis, and T. Magedanz, "Survey of network security systems to counter SIP-based denial-of-service attacks," Computers & Security, vol. 29, pp. 225-243, 2010.
[12] O. Gavilanez, F. Gavilanez, and G. Rodriguez, "Audit Analysis Models, Security Frameworks and Their Relevance for VoIP," arXiv preprint arXiv:1704.02440, 2017.
[13] International Organization for Standardization. Glosario de términos. Available: http://www.iso27000.es/glosario.html. Accessed: 01/12/2017).
[14] UIT-T. X.805: Arquitectura de seguridad para sistemas de comunicaciones extremo a extremo. Available: https://www.itu.int/rec/T-REC-X.805-200310-I/es. (Accessed: 15/11/2017).
[15] OSSTMM. Open Source Security Testing Methodology Manual. Available: http://www.isecom.org/research/osstmm.html. (Accessed: 01/12/2017)
[16] D. Endler and M. Collier, Hacking exposed VoIP: voice over IP security secrets & solutions: McGraw-Hill, Inc., 2006.
[17] GNS3. Available: https://gns3.com/news/article/gns3-1-4-5-released-2. (Accessed: 15/11/2017).
[18] National Institute of Standars and Technology. U.S. Departament of Commerce. Available: https://www.nist.gov/. (Accessed: 15/11/2017).
[19] VOIPSA. Available: http://www.voipsa.org/. (Accessed: 15/11/2017).
[20] ASTERISK. Available: https://community.asterisk.org/t/asterisk-security-best-practices/. (Accessed: 15/11/2017).
[21] S. Salsano, L. Veltri, and D. Papalilo, "SIP security issues: the SIP authentication procedure and its processing load," IEEE network, vol. 16, pp. 38-44, 2002.