Withdraw
Loading…
Protecting SIP Proxy Servers from Ringing-based Denial-of-Service Attacks
Conner, William G.; Nahrstedt, Klara
Loading…
Permalink
https://hdl.handle.net/2142/11469
Description
- Title
- Protecting SIP Proxy Servers from Ringing-based Denial-of-Service Attacks
- Author(s)
- Conner, William G.
- Nahrstedt, Klara
- Issue Date
- 2008-07
- Keyword(s)
- networking
- algorithms
- computer security
- Abstract
- As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to grow in importance for Voice-over-IP deployments that use SIP for call signaling. Since the protection of the global telecommunications infrastructure is critical to people's everyday lives, ensuring the availability of SIP proxy servers under attack should be a high priority. This paper first describes a disruptive denial-of-service attack that exploits the semantics of the SIP protocol to exhaust resources at a stateful SIP proxy server. Unlike previous approaches that focus on flooding-based denial-of-service attacks, we consider attacks that do not result in high incoming call traffic rates at the SIP proxy server. After describing this semantic-based attack, we then propose a new algorithm to reduce the effects of such an attack. Our algorithm has been implemented in a SIP proxy server and evaluated extensively through experiments on a local testbed.
- Type of Resource
- text
- Permalink
- http://hdl.handle.net/2142/11469
- Copyright and License Information
- You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Owning Collections
Manage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…