Withdraw
Loading…
Detecting and Mitigating Denial-of-Service Attacks on Voice over IP Networks
Anwar, Zahid; Potter, Shaya; Narayanaswami, Chandra; Yurcik, William; Gunter, Carl A.; Campbell, Roy H.
Loading…
Permalink
https://hdl.handle.net/2142/11449
Description
- Title
- Detecting and Mitigating Denial-of-Service Attacks on Voice over IP Networks
- Author(s)
- Anwar, Zahid
- Potter, Shaya
- Narayanaswami, Chandra
- Yurcik, William
- Gunter, Carl A.
- Campbell, Roy H.
- Issue Date
- 2008-04
- Keyword(s)
- networking
- computer security
- Abstract
- Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter. We describe the design of our VoIP Vulnerability Assessment Tool (VVAT) with which we demonstrate vulnerabilities to DoS attacks inherent in many of the popular VoIP applications available today. In our threat model we assume an adversary who is not a network administrator, nor has direct control of the channel and key VoIP elements. His aim is to degrade his victim's QoS without giving away his presence by making his attack look like a normal network degradation. Even black-boxed, applications like Skype that use proprietary protocols show poor performance under specially crafted DoS attacks to its media stream. Finally we show how securing Skype relays not only preserves many of its useful features such as seamless traversal of firewalls but also protects its users from DoS attacks such as recording of conversations and disruption of voice quality. We also present our experiences using virtualization to protect VoIP applications from 'insider attacks'. Our contribution is two fold we: 1) Outline a threat model for VoIP, incorporating our attack models in an open-source network simulator/emulator allowing VoIP vendors to check their software for vulnerabilities in a controlled environment before releasing it. 2) We present two promising approaches for protecting the confidentiality, availability and authentication of VoIP Services.
- Type of Resource
- text
- Permalink
- http://hdl.handle.net/2142/11449
- Copyright and License Information
- You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Owning Collections
Manage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…