期刊文献+

一种SIP分布式洪泛攻击的减弱方法 被引量:2

A Mitigation Method for SIP Distributed Flooding Attack
下载PDF
导出
摘要 对会话初始化协议(SIP)分布式洪泛攻击的原理进行研究,结合SIP协议自身的特点提出一种基于安全级别设定的攻击减弱方法.该方法将SIP消息按照历史记录、协议自身进行安全级别分类,利用流量监控对SIP流量监控.当发生分布式洪泛攻击时,通过设定合适的安全级别减弱攻击造成的影响.仿真实验结果表明基于安全级别的方法能够识别和防御SIP分布式洪泛攻击,有效地减弱SIP代理服务器/IMS服务器被攻击的可能性. This paper studies the theory of SIP distributed flooding attack and the character of SIP protocol itself.A mitigation method for SIP distributed flooding attack which based on security level is proposed.It classifies SIP message according to the SIP session history and SIP itself,attack is alarmed by the traffic monitoring.While attack is detected,mitigation method would set up the suitable security level;the messages that exceed the level would be dropped.The simulation results show that this mitigation method can detect and defend SIP distributed flooding attacks,and effectively reduce the probability of SIP proxy server or IMS server be attacked.
出处 《小型微型计算机系统》 CSCD 北大核心 2012年第5期995-999,共5页 Journal of Chinese Computer Systems
基金 国家水体污染控制与治理科技重大专项(2009ZX07528-006-05)资助
关键词 会话初始化协议 分布式 洪泛攻击 安全级别 攻击减弱 SIP distributed flooding attack security level attack mitigation
  • 相关文献

参考文献15

  • 1Gonzalo C.SIP demystified[M].Translated by Bai Jianjun,PengHui,Tian Min(1th ed).Beijing:Post&Telecom Press,2003.
  • 2Rosenberg J,Schulzrinne H,Camarillo G,et al.SIP:session ini-tiation protocol[S].RFC 3261,2002.
  • 3Sisalem D,Ehlert S,Geneiatakis D,et al.Towards a secure andreliable VoIP[EB/OL].http://www.snocer.org,May 2005.
  • 4张兆心,杜跃进,李斌,张宏莉.SIP代理服务器抗拒绝服务攻击自防御模型[J].通信学报,2009,30(4):93-99. 被引量:5
  • 5Sengar H,Wang H,Wijesekera D,et al.Detecting VoIP floodsusing the hellinger distance[J].IEEE Transactions on Parallel andDistributed Systems,June,2008,19(6):794–805.
  • 6Rebahi Y.Change-point detection for voice over IP denial of serv-ice attacks[C].In the 15th ITG/GI-Fachtagung Kommunikation inVerteilten Systemen(KiVS 2007),Bern,Switzerland,February2007.
  • 7Ming L,Tao P,Leckie C.CPU-based DoS attacks against SIPservers[C].In the 11th Network Operations and ManagementSymposium,2008:41-48.
  • 8Papoulis A,PiIlai S U.Probabilities,random variables and sto-chastic process[M].New York:McGraw-Hili,2002.
  • 9Reynolds B,Ghosal D.Secure IP telephony using multi-layered pro-tection[C].In the 10th Annual Network and Distributed SystemSecurity Symposium,San Diego,USA,February 2003:218-221.
  • 10Lahmadi A,Festor O.SecSip:a stateful firewall for SIP-basednetworks[C].In the 11th IFIP/IEEE International Conference onSymposium on Integrated Network Management,New York,USA,June 2009:172-179.

二级参考文献24

  • 1索望,方勇,王昆.SIP协议中的安全机制[J].信息网络安全,2004(10):32-35. 被引量:8
  • 2储泰山,潘雪增.SIP安全模型研究及实现[J].计算机应用与软件,2004,21(12):101-104. 被引量:15
  • 3司端锋,韩心慧,龙勤,潘爱民.SIP标准中的核心技术与研究进展[J].软件学报,2005,16(2):239-250. 被引量:96
  • 4刘广义,卢泉,杨国良.基于NetFlow流量采样的误差分析[J].电信科学,2005,21(5):68-70. 被引量:3
  • 5郭力,王时龙,张腾.基于SIP通信的安全性研究[J].信息安全与通信保密,2005,27(11):55-58. 被引量:8
  • 6TZVETKOV V, ZULEGER H. Service provider implementation of SIP regarding security[A]. Proceedings of the 21st International Conference Advanced Information Networking and Applications Workshops[C]. Washington, DC, USA, 2007.30-35.
  • 7GENEIATAKIS D, DAGIUKLAS T, LAMBRINOUDAKIS C, et al. Novel protecting mechanism for sip-based infrastructure against malformed message attacks: performance evaluation study[A]. Proc of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP'06)[C]. Patras, Greece, 2006. 261-270.
  • 8ZHANG R S, WANG X Y, YANG X H, et al. Billing attacks on SIP-based VolP systems[A]. Proceedings of the First Conference First USENIX Workshop on Offensive Technologies[C]. Boston, MA, 2007.4-4.
  • 9BILIEN J, ERIK E, JOACHIM O. Secure VoIP: Call Establishment and Media Protection[R]. KTH, Royal Institute of Technology, Stockholm, 2005.
  • 10MAHAJAN R, BELLOVIN S, FLOYD S, et al. Controlling high bandwidth aggregates in the network[J]. ACM SIGCOMM CCR, 2002, 32(3):62-73.

共引文献9

同被引文献18

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部