Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4988
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGolait, Dikshaen_US
dc.contributor.authorHubballi, Neminathen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:36:21Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:36:21Z-
dc.date.issued2017-
dc.identifier.citationGolait, D., & Hubballi, N. (2017). Detecting anomalous behavior in VoIP systems: A discrete event system modeling. IEEE Transactions on Information Forensics and Security, 12(3), 730-745. doi:10.1109/TIFS.2016.2632071en_US
dc.identifier.issn1556-6013-
dc.identifier.otherEID(2-s2.0-85014851482)-
dc.identifier.urihttps://doi.org/10.1109/TIFS.2016.2632071-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4988-
dc.description.abstractSession initiation protocol (SIP) is an application layer protocol used for signaling purposes to manage voice over IP connections. SIP being a text-based protocol is vulnerable to a range of denial of service (DoS) attacks. These DoS attacks can render the SIP servers/SIP proxy servers unusable by depleting memory and CPU time. In this paper, we consider two types of DoS attacks, namely, flooding attacks and coordinated attacks for detection. Flooding attacks affect both stateless and stateful SIP servers while coordinated attacks affect stateful SIP servers. We model the SIP operation as discrete event system (DES) and design a new state transition machine, which we name as probabilistic counting deterministic timed automata (PCDTA) to describe the behavior of SIP operations. We also identify different types of anomalies that can occur in a DES model, which appear in the form of illegal transitions, violating timing constraints, and appear in number which is otherwise not seen. Subsequently, we map various DoS attacks in SIP to a type of anomaly in DES. PCDTA can learn probabilities of various transitions and timings delay from a set of nonmalicious training sequences. A trained PCDTA can detect anomalies, and hence various DoS attacks in SIP. We perform a thorough experiment with computer simulated SIP traffic and report the detection performance of PCDTA on various attacks generated through custom scripts. © 2005-2012 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceIEEE Transactions on Information Forensics and Securityen_US
dc.subjectComputer crimeen_US
dc.subjectDiscrete event simulationen_US
dc.subjectFloodsen_US
dc.subjectInternet protocolsen_US
dc.subjectInternet telephonyen_US
dc.subjectNetwork securityen_US
dc.subjectSecurity of dataen_US
dc.subjectVoice/data communication systemsen_US
dc.subjectAnomalous behavioren_US
dc.subjectApplication layer protocolsen_US
dc.subjectCommunication system securityen_US
dc.subjectCoordinated attacken_US
dc.subjectDetection performanceen_US
dc.subjectSession initiation protocolen_US
dc.subjectText-based protocolsen_US
dc.subjectTraining sequencesen_US
dc.subjectDenial-of-service attacken_US
dc.titleDetecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modelingen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: