期刊文献+

基于排队论的SIP DoS攻击防御机制的研究 被引量:4

Research of SIP DoS attack defense mechanism based on queue theory
下载PDF
导出
摘要 随着SIP协议的广泛应用,协议自身的安全问题逐渐显露出来,尤其以DoS攻击最为严重。研究了NGN中DoS攻击防御机制,给出了基于排队论的DoS攻击数学分析模型,接着设计出一种SIP DoS攻击防御方案,最后对防御机制的性能进行了仿真分析。 With the widespread use of session initial protocol (SIP), the protocol's security problems have gradually emerged, in which DoS attacks is the most serious. Focusing on the research of defense mechanisms of DoS attacks in SIP protocol, this paper proposes a model based on queue theory to approximately analyze the DoS attack, and then presents a DoS attack defense method. Simulation was taken to analyze the performance of the defense mechanism.
作者 殷茜
机构地区 重庆邮电大学
出处 《重庆邮电大学学报(自然科学版)》 2008年第4期471-474,共4页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
关键词 SIP 拒绝服务攻击 排队模型 防御机制 SIP DoS attack queue model defense mechanism
  • 相关文献

参考文献7

  • 1[1]ROSENBERG J,SCHUIZRINNE H,CAMARILLO G,et al.SIP:Session Initiation Protocol[EB/OL].(2002-06-25)[2008-03435].http://www.ieff.org/rfc/rfc3261.txt.
  • 2GUAN You-qing SHEN Su-bin.An Implementation Model of Parlay MMCCS API Based on SIP[J].The Journal of China Universities of Posts and Telecommunications,2006,13(2):43-49. 被引量:1
  • 3[4]VOIPsA.VolP Security and Privacy Threat TaxonomyPublic Release 1.0[EB/OL].(2005.10-24)[2008-03-05].http://www.voipsa.org/Activities/VOIPSA Threat Taxonomy 0.1.pdf.
  • 4[1]《现代数学手册》编纂委员会.现代数学手册·随机数学卷[M].武汉:华中科技大学出版社,2000.13-14.
  • 5[6]OHTA M.Overload Protection in a SIP Signaling Network[EB/OL].(2006-09-28)[2008-03-04].http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1690395.
  • 6[7]BERTSEKAS Dimitri,GALLAGERobert R.数据网络[M].第二版.卢刚,王康,译.北京:人民邮电出版社,2004.
  • 7[8]SISALEM D,KUTHAN J,EHLERT S.Denial of service attacks targeting a SIP VolP infrastructure:attack scenarios and prevention mechanisms[J].IEEE Network,2006 2005:.26-31.

二级参考文献12

  • 1The PARLAY Group.Open Service Access (OSA) Application Programming Interface (API) Specifications[EB/OL].2005-03.http:// www.parlay.org/en/specifications/.
  • 2ADAMOPOULOS D,PAVLOU G.Advanced service creation using distributed object technology[J].IEEE Communications Magazine,2002,40(3):146-154.
  • 3WU Xiao-tao,SCHULZRINNE Henning.Programmable end system services using SIP[C] // Proceedings of 2003International Conference on Communications:Vol 2,May 11-15,2003,Anchorage,AK,USA.Piscataway,NJ,USA:IEEE,2003:789-793.
  • 4HELLENTHAL J,PANKEN F,WEGDAM M.Validation of the Parlay API through prototyping[C] // Proceedings of IEEE Intelligent Network Workshop,May 6-9,2001,Boston,MA,USA.Piscataway,NJ,USA:IEEE,2001:58-63.
  • 5WU Wei,ZHU Chun-mei.Key issues of service provisioning in next-generation networks[J].Journal of Chongqing University of Posts and Telecommunications,2003,15(1):77-81.
  • 63GPP.Open service access (OSA) application programming interface (API) mapping for open service access part 4 call control service mapping subpart 4 multiparty call control ISC[EB/OL].2004-03-29.http:// www.3gpp.org/ftp/Specs/html-info/29998-04-4.htm.
  • 7Internet Engineering Task Force (IETF) Network Working Group.Request for comments:3261[EB/OL].2002-06.http:// www.ietf.org/rfc/rfc3261.txt? number =3261.
  • 8LENNOX J,SCHULZRINNE H.Call processing language framework and RFC 2824[EB/OL].2000-05.http:// www.ietf.org/ rfc/ rfc2824.txt ? number = 2824.
  • 9LENNOX J,ROSENBERG J,SCHULZRINNE H.Common gateway interface for SIP,RFC 3050[EB/OL].2001-01.http:// www.ietf.org/rfc/rfc3050.txt?number = 3050.
  • 10KRISTENSEN Anders.The SIP Servlet API Java Specification Request (JSR) 116[EB/OL].2003-03-07.http://jcp.org/jsr/detail/116.jsp.

共引文献1

同被引文献36

  • 1宗晓飞,万晓榆,樊自甫.SIP系统中DoS攻击及防范机制[J].微计算机信息,2008,24(6):83-84. 被引量:4
  • 2Wang Y, Lin C, Li Q, et al. A queueing analysis for the denial of service (DoS) attacks in computer networks [ J ]. Computer Networks : The International Journal of Computer and Telecommunications Networking, 2007, 51 (12) :3564-3573.
  • 3Bellaiche M, Gregoire J. Measuring defense systems against flooding attacks [ C ] //Wireless Communications and Mobile Computing Conference. 2008: 600-605.
  • 4Shi P, Lian Y F. Game-theoretical effectiveness evaluation of DDoS defense [ C ]//The Seventh International Conference on Networking. 2008 : 427-433.
  • 5Willig A. A short introduction to queueing theory[ M ]. Technical University Berlin, 1999.
  • 6Tijms H. New and old results for the M/D/c queue [ J]. AEU-International Journal of Electronics and Communications, 2006, 60 (2) : 125-130.
  • 7Bertsekas D P, Gallager. Data networks[M]. 2nd edition. Prentice Hall, 1992.
  • 8Fall K, Varadhan K. The ns manual[ M/OL]. 2009-01-06 [ 2009-05-01 ]. http://www, isi. edu/nsnam/ns/doc/index, html.
  • 9Fui-Hoon F, Nah. A study on tolerable waiting time: how long are web users willing to wait? [ J]. Behaviour & Information Technology, 2004, 23(3) :153.
  • 10Thomas R. UNIX IP stack tuning guide [ M/OL]. 2000-12-03 [2009-05-01 ]. http://www, cymru, com/Documents/ip-stack-tuning. html.

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部