基于SIP的VoIP系统抵御DoS/DDoS攻击的实用安全框架综述

Sheeba Armoogum, N. Mohamudally
{"title":"基于SIP的VoIP系统抵御DoS/DDoS攻击的实用安全框架综述","authors":"Sheeba Armoogum, N. Mohamudally","doi":"10.1109/ISTAFRICA.2014.6880664","DOIUrl":null,"url":null,"abstract":"Since its existence for the past ten years, the SIP-based Voice Over IP (VoIP) network is playing a key role in the current and future communication by utilising the existing broadband Internet access. Unfortunately, Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks can inflict harmful threats to various nodes (SIP proxy servers, User agents, etc) and may cause failure to the SIP system. This is one reason why over 40 proposals, addressing these problems, have been published. Regrettably, not many of these researchers have considered scalability, extensibility and other performance issues by testing their promising prevention techniques in a real network. We find that there are around eight practical frameworks and the aim of this paper is to revisit these countermeasures solutions. We propose a new way of evaluation criteria and a comparative study of the researchers' ideas are being addressed based on the models (if any) used, the network architectures and the results. We however do not judge any of these proposals; instead we give hints on how the attacks on VoIP networks could be further addressed.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Survey of practical security frameworks for defending SIP based VoIP systems against DoS/DDoS attacks\",\"authors\":\"Sheeba Armoogum, N. Mohamudally\",\"doi\":\"10.1109/ISTAFRICA.2014.6880664\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since its existence for the past ten years, the SIP-based Voice Over IP (VoIP) network is playing a key role in the current and future communication by utilising the existing broadband Internet access. Unfortunately, Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks can inflict harmful threats to various nodes (SIP proxy servers, User agents, etc) and may cause failure to the SIP system. This is one reason why over 40 proposals, addressing these problems, have been published. Regrettably, not many of these researchers have considered scalability, extensibility and other performance issues by testing their promising prevention techniques in a real network. We find that there are around eight practical frameworks and the aim of this paper is to revisit these countermeasures solutions. We propose a new way of evaluation criteria and a comparative study of the researchers' ideas are being addressed based on the models (if any) used, the network architectures and the results. We however do not judge any of these proposals; instead we give hints on how the attacks on VoIP networks could be further addressed.\",\"PeriodicalId\":248893,\"journal\":{\"name\":\"2014 IST-Africa Conference Proceedings\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IST-Africa Conference Proceedings\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISTAFRICA.2014.6880664\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IST-Africa Conference Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTAFRICA.2014.6880664","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

摘要

基于sip协议的IP语音(VoIP)网络自诞生以来已有十年,利用现有的宽带互联网接入,在当前和未来的通信中发挥着关键作用。不幸的是,拒绝服务和分布式拒绝服务(DoS/DDoS)攻击会对各种节点(SIP代理服务器、用户代理等)造成有害的威胁,并可能导致SIP系统故障。这就是为什么已经发表了40多份解决这些问题的建议的原因之一。遗憾的是,这些研究人员中没有多少人考虑过可伸缩性、可扩展性和其他性能问题,并在真实网络中测试了他们有前途的预防技术。我们发现大约有八个实用框架,本文的目的是重新审视这些对策解决方案。我们提出了一种新的评估标准,并根据使用的模型(如果有的话)、网络架构和结果对研究人员的想法进行了比较研究。然而,我们对这些建议不予评判;相反,我们给出了如何进一步解决VoIP网络攻击的提示。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Survey of practical security frameworks for defending SIP based VoIP systems against DoS/DDoS attacks
Since its existence for the past ten years, the SIP-based Voice Over IP (VoIP) network is playing a key role in the current and future communication by utilising the existing broadband Internet access. Unfortunately, Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks can inflict harmful threats to various nodes (SIP proxy servers, User agents, etc) and may cause failure to the SIP system. This is one reason why over 40 proposals, addressing these problems, have been published. Regrettably, not many of these researchers have considered scalability, extensibility and other performance issues by testing their promising prevention techniques in a real network. We find that there are around eight practical frameworks and the aim of this paper is to revisit these countermeasures solutions. We propose a new way of evaluation criteria and a comparative study of the researchers' ideas are being addressed based on the models (if any) used, the network architectures and the results. We however do not judge any of these proposals; instead we give hints on how the attacks on VoIP networks could be further addressed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Exploring three approaches to offer distance learning courses through a social network of health researchers in three African countries Streamlining capacity development for employment Understanding the maturity of EU code of conduct on data centres: A Mauritian case study explained User willingness to accept friend requests on SNS: A facebook experiment An open speaker recognition enabled identification and authentication system
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1