Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/4988
Title: | Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling |
Authors: | Golait, Diksha Hubballi, Neminath |
Keywords: | Computer crime;Discrete event simulation;Floods;Internet protocols;Internet telephony;Network security;Security of data;Voice/data communication systems;Anomalous behavior;Application layer protocols;Communication system security;Coordinated attack;Detection performance;Session initiation protocol;Text-based protocols;Training sequences;Denial-of-service attack |
Issue Date: | 2017 |
Publisher: | Institute of Electrical and Electronics Engineers Inc. |
Citation: | Golait, D., & Hubballi, N. (2017). Detecting anomalous behavior in VoIP systems: A discrete event system modeling. IEEE Transactions on Information Forensics and Security, 12(3), 730-745. doi:10.1109/TIFS.2016.2632071 |
Abstract: | Session initiation protocol (SIP) is an application layer protocol used for signaling purposes to manage voice over IP connections. SIP being a text-based protocol is vulnerable to a range of denial of service (DoS) attacks. These DoS attacks can render the SIP servers/SIP proxy servers unusable by depleting memory and CPU time. In this paper, we consider two types of DoS attacks, namely, flooding attacks and coordinated attacks for detection. Flooding attacks affect both stateless and stateful SIP servers while coordinated attacks affect stateful SIP servers. We model the SIP operation as discrete event system (DES) and design a new state transition machine, which we name as probabilistic counting deterministic timed automata (PCDTA) to describe the behavior of SIP operations. We also identify different types of anomalies that can occur in a DES model, which appear in the form of illegal transitions, violating timing constraints, and appear in number which is otherwise not seen. Subsequently, we map various DoS attacks in SIP to a type of anomaly in DES. PCDTA can learn probabilities of various transitions and timings delay from a set of nonmalicious training sequences. A trained PCDTA can detect anomalies, and hence various DoS attacks in SIP. We perform a thorough experiment with computer simulated SIP traffic and report the detection performance of PCDTA on various attacks generated through custom scripts. © 2005-2012 IEEE. |
URI: | https://doi.org/10.1109/TIFS.2016.2632071 https://dspace.iiti.ac.in/handle/123456789/4988 |
ISSN: | 1556-6013 |
Type of Material: | Journal Article |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: