PDF ( 1331Kbytes) - The Smart Computing Review

Smart Computing Review, vol. 3, no. 1, February 2013
1
Smart Computing Review
IP Multimedia
Subsystem—An Intrusion
Detection System
Bakkiam David Deebak1 , Rajappa Muthaiah1 , Karuppusamy Thenmozhi2 , and
Pitchai Iyer Swaminathan1
1
School of Computing, SASTRA University / Thanjavur – 613 401, TamilNadu, India
2
School of Electrical and Electronics Engineering, SASTRA University / Thanjavur – 613 401, TamilNadu,
India
* Corresponding Author: Bakkiam David Deebak
Received November 20, 2012; Revised December 25, 2012; Accepted January 3, 2013; Published February
28, 2013
Abstract: The IP Multimedia Subsystem (IMS) amalgamates the core of telecommunication and
Internet protocol (IP) network access to ease network traffic of the next-generation network (NGN).
Since the coalescence of the NGN, malicious attacks can also disrupt multimedia services. This can
lead to financial loss for telecom operators and loss of connection for users. This paper introduces
an attack detection schema (ADS) that provides security from session initiation protocol (SIP)
flooding attacks. The proposed schema is configured with the OpenOpenIMSCore to validate the
accuracy of SIP session traffic. Similarly, the schema is imbedded with the OpenIMS client, which
helps to detect and expose such attacks on the IMS client display. Since even a small flooding
attack could clog the OpenOpenIMSCore, detection accuracy should be relatively higher to prevent
OpenIMSCore from going down. The proposed schema includes a key authentication schema for
proficiently analyzing SIP packets. The proposed authentication is placed between the transport and
application layers. A network traffic tool, Ntop, is configured with the OpenOpenIMSCore to
analyze SIP traffic, Real Time Transport Protocol (RTP) traffic and the throughput rate. Overall,
the proposed schema of ADS improves reasonably well after it cuts off the attacker.
Keywords: IP Multimedia Subsystem, Next Generation Network, Session Initiation Protocol, Real Time
Transport Protocol and Throughput Rate
Introduction
T
he IP Multimedia Subsystem (IMS) amalgamates the core of telecommunication and Internet protocol (IP) network
access to ease network traffic of the next-generation network (NGN). It has a standard architecture framework that
includes protocols from the Internet Engineering Task Force (IETF). The IMS architecture is standardized to access
The corresponding author would like to thank TATA Consultancy Services (TCS) for Research Motivation and Financial Assistance.
DOI: 10.6029/smartcr.2013.01.001
2
Deebak et al.: IP Multimedia Subsystem—An Intrusion Detection System
multimedia services [1] such as data, voice and video, and moreover, standardization forms fixed mobile convergence
(FMC) for wireless and wireline operators. IMS uses the session initiation protocol (SIP) signaling system to establish,
maintain and terminate multimedia services. Since SIP is employed in IMS, a SIP functional element (proxies/server) is
called the OpenIMSCore. The OpenIMSCore has three call session control functions (CSCF)—proxy, serving and
interrogating—and one home authentication server, usually called the home subscriber server (HSS) [2].
Proxy CSCF (P-CSCF) acts as an initial contact point for user terminals, and the user terminal uses SIP session request
methods for communicating with the OpenIMSCore. The SIP session request later be used serving CSCF (S-CSCF) which
controls the session for continuous communication. Since Telecom depend on IMS service, the threat of malicious SIP
attack can disrupt multimedia services. This can lead to financial loss for telecom operators and connection loss for users.
The OpenIMSCore is vulnerable to many attacks that can be launched in two ways: 1) Flooding attack – an attacker
sends numerous SIP-related request messages to a user, which overloads the SIP server or OpenIMSCore, which terminates
the session; subsequently, unexpected session loss degrades network performance of the OpenIMSCore; and 2) Anomalous
SIP request – an attacker sends an anomalous SIP request to confuse the OpenIMSCore or to compel the server to execute
the anomalous code. As a result, code execution collapses the service session and introduces a longer session delay. This
paper focuses on the detection of flooding attack in the IMS client. The SIP Invite flooding attack is investigated in the
open source IMS client and probing is done through the OpenIMSCore.
In 2003, the Third Generation Partnership Project 2 released a comprehensive security defense for IMS [3] that
addressed the issues of SIP vulnerabilities. Nevertheless, this does not have a security mechanism for detecting and
preventing flooding attacks. The detection and prevention mechanism has not been fully explored for SIP flooding attacks.
Sher and Magedanz [4] suggest that a CPU threshold technique could be used to detect a flooding attack in the
OpenIMSCore. Anomalous attackers always use a traffic pattern technique to exploit a naïve security mechanism. Sengar et
al. [5] and Reynolds and Ghosal [6] proposed a detection schema to identify a SIP attack, which were investigated in SIPbased voice over Internet protocol (VoIP) applications. For more than a decade, Web servers have faced flooding attacks
against transmission control protocol (TCP). Many novel schemas have been proposed for thwarting the TCP SYN flooding
attack [7] [8].
This paper introduces an attack detection schema (ADS) to provide security against SIP flooding attacks. The proposed
schema is configured with the OpenIMSCore to validate the accuracy of SIP session traffic. Similarly, the schema is
imbedded with OpenIMS client (University of Cape Town IP Multimedia Subsystem (UCTIMS)) which helps to detect and
expose the attack on the IMS client display. Since even a small flooding attack could clog the OpenIMSCore, detection
accuracy should be higher in order to prevent the OpenIMSCore from going down. The ADS technique is not timeconstrained and thus has a reasonably accurate detection rate and computational complexity.
The following contributions improve the accuracy rate of the proposed schema.
1. The proposed schema includes a key authentication schema for proficiently analyzing SIP packets. The proposed
authentication is placed between the transport and application layers.
2. Since the proposed schema includes a key authentication schema, the OpenIMSCore analyzes SIP traffic internally to
detect anomalous attacks.
3. A network traffic tool, Ntop [9], is configured with the OpenIMSCore to analyze SIP traffic, RTP traffic and
throughput rate.
IMS Security Background
Many security frameworks have been proposed for thwarting SIP flooding attacks [4] [10] [11]. Sher and Magedanz
proposed a mechanism that weighs the CPU usage of the IMS components [4]. An anomalous attacker may use the crafting
technique to maintain the CPU load below threshold. Awais et al. proposed a mechanism of an artificially based immune
system to detect a flooding attack in the OpenIMSCore [10]. Furthermore the authors compared their schema performance
with signature-based schema.
Sher and Magedanz [4] and Sengar et al. [5] proposed anomalous detection mechanisms for securing VoIP
communication networks. Sengar et al. [5] proposed an attack detection mechanism using the Hellinger distance. The
experimental analysis is very propitious. Nonetheless, detection accuracy is based on the intensity of the flooding attack.
Reynolds and Ghosal [6] proposed a strategy whereby an application layer attack sensor can detect SIP flooding with high
accuracy. Siris and Papagalou [7] proposed a strategy called threshold adaptive and cumulative summation, which is
applied to detect a TCP SYN flooding attack.
Sher et al. [12] proposed security in the transport layer that imbeds an intrusion detection system (IDS) to secure the
application of the IMS server against various time-independent and -dependent attacks. Since SIP uses User Datagram
Protocol (UDP) for communication, there is an issue around transport layer implementation. Other authors investigated
SIP flooding attacks for better OpenIMSCore solutions [13] [14] [15]. In 2007, Sher and Magedanz [16] proposed a
Smart Computing Review, vol. 3, no. 1, February 2013
3
narrowcasting schema that sends the communication request to all participants, and each participant can choose ‗To Whom
he/she would like to send‘ and ‗To whom he/she wouldn‘t like to send‘. They also proposed an intrusion detection and
prevention system to secure the application layer of the OpenIMSCore. This paper addresses anomaly detection that was
not addressed by Sher and Magedanz in 2007 [16].
Mirkovic et al. [17] declared denial of service (DoS) a security threat because it utilizes the availability of target
resources like bandwidth or memory. Moreover, that utilization leads the target system to quickly become unavailable.
Vuong and Bai [18] and Sisalem et al. [19] described SIP vulnerabilities. The SIP does not have any native security
mechanism to thwart all types of flooding attack [17]. Moreover no one has discovered such an anti-attack schema.
Stallings proposed a rate-limiting schema that allows limited requests per interval time [20], and this schema is suitable
against the single-end attack. Therefore it is not suitable for the distributed flooding attack environment. Some research has
been done in state-machine specifications for detecting DoS attacks [21] [22] [23]. The state-machine schemas are designed
as a model to evaluate the transaction or session to find whether it deviates from SIP specifications or not [21] [22]. Ehlert
et al. conducted timing evaluation [21]. The aforesaid is also not suitable for a distributed network environment.
Nonetheless, it could alleviate a single-ended attack. Nagpal et al. [22] proposed a null-authentication mechanism that
identifies whether the request is coming from a known or unknown SIP user. But this schema does not have any additional
proxy to generate the packets actively. Hence, it does not have a lot of processing overhead. However, this schema does not
have any strategies for message tampering [23], a billing attack [24] and VoIP Spit [25]. Thus paper proposes an ADS
schema to detect all types of SIP-related flooding attacks. Moreover this schema is internally configured with a key
authentication schema for regular updating on the OpenIMS client (UCTIMS) display.
Proposed Schema of Attack Detection
We investigate the OpenIMSCore and client to improve the accuracy of SIP flooding attack detection. To achieve a
reasonable accuracy rate, the attack detection schema is configured with the key authentication schema of the
OpenIMSCore and client. The schema is suitable for time-independent and -dependent attacks. Since the proposed schema
has internal configuration with both core and client, it can act as a middle layer between the OpenIMSCore and application
plane. The proposed schema can detect the misuse and also anomalous flooding attack to improve the reliability of the
communication link. The proposed schema incorporates two modules in the OpenIMSCore and client, called Module of
Misuse Detection and Module of Anomalous Detection
Module of Misuse Detection
This is a core module of the proposed schema that detects attack entry and cuts it before it gets processed by the SCSCF.
Module of Anomaly Detection
This is a sub-module of the proposed schema that allows the attacker to enter the OpenIMSCore and then cuts the attack
with the middleware components of the session authenticate manager.
Figure 1. Proposed ADS detection schema for OpenIMSCore
4
Deebak et al.: IP Multimedia Subsystem—An Intrusion Detection System
Installation Procedure of UCTIMS Client
Open Source UCTIMS Client (UCTIMS Client (2012) [Online]. Available at: http://uctimsclient.berlios.de/) has been
designed and developed to be employed for the Fraunhofer FOKUS OpenIMSCore. This offers a wide range of
functionality and can act as an IMS user agent based on the osip/eXsip library. It has the following features:
1. Registration done through AKAv1 and AKAv2
2. Subscription event of watchers and Reg Info‘s
3. Instant messaging (IM) service
4. DTMF tones via SIP Info messages
5. Supports Presence Status
6. Supports XCAP Presence Rules
2.1 Package instruction is given for Debian operating system
For Repository Update, the following command is to be run: apt-get update
Package 1: The package libosip2-dev is to initialize the parser and state machine codes. This also sets a few callbacks
which inform on the state of changes in the SIP Transaction.
apt-get install libosip2-dev
Package 2: The package libeXosip2-dev is to hide the complexities of using the SIP protocol for multimedia session
establishment and mainly uses VoIP telephony applications.
apt-get install libeXosip2-dev
Package 3: The package libgtk2.0-dev is a multi-platform toolkit to create the graphical user interface (GUI).
apt-get install libgtk2.0-dev
Package 4: The package libxml2-dev is the XML parser, and this toolkit was developed by the Gnome Project. This is to
design markup languages (i.e., text language whereby semantic and structures are added to the content using ‗Markup‘
information enclosed by angle brackets).
apt-get install libxml2-dev
Package 5: The package libcurl4-openssl-dev has a URL-based transfer library for clients that supports DICT, FILE, FTP,
FTPS, GOPHER, HTTP, HTTPS, IMAP, IMAPS, LDAP, POP3, POP3S, RTMP, RTSP, SCP, SFTP, SMTP, SMTPS,
TELNET and TFTP.
apt-get install libcurl4-openssl-dev
Package 6: The package libgstreamer0.10-0 is a stream media framework that is based on Filter Graphs to operate on media
data.
apt-get install libgstreamer0.10-0
Package 7: The package libgstreamer-plugins-base0.10-dev has plug-in structures for processing new data types that are
useful for real-time sound video systems.
apt-get install libgstreamer-plugins-base0.10-dev
Package 8: The package libvlc-dev is called the VideoLAN Media Player Project and plays almost all video formats.
apt-get install libvlc-dev
For Code Execution, the following command is typed and run:
$make
For Client Execution, the following command is typed and executed: ./uctimsclient. The execution and graphical views are
shown in Figure 2 and Figure 3.
Figure 2. Execution view of UCTIMS client
Smart Computing Review, vol. 3, no. 1, February 2013
5
Figure 3. Graphical view of UCTIMS client
■ Setting Parameters of UCTIMS Preference Tool
The following steps are done for registration of the UCIMS client in the OpenIMSCore network.
Step 1: Choose Tab Profile and Type ‗Alice‘, for example
Step 2: Choose Tab IMS and make the following changes
Public User Identity
:
sip:[email protected]
Private User Identity
:
[email protected]
Proxy CSCF
:
192.168.91.30:4060
Realm
:
sastratcs.test
Password
:
xxxxx
QoS Strength
:
Mandatory
QoS Type
:
Segmented
Access Network
:
IEEE 802.11a
Step 3: Click ‗Ok‘
Step 4: Choose Tab Option and Select Register ‗Alice‘
■ Registration and De-registration in UCTIMS
When the UCTIMS Client has been run,
Step 1: The user credentials must be entered correctly in the UCTIMS preference options (As briefly shown as above)
Step 2: Click ‗Ok‘ and Choose Options  Register / Register As Alice (If Alice credentials have been set in
Preferences) as shown in Figure 4.
Step 3: Details for Registration Status, Delay and Messages must be seen in the graphical view of UCTIMS When
UCTIMS clients have completed their conversation,
Step 1: Ch
-Register
Step 2: Details for De-Registered Status and its Related Message of Notification must be seen in the graphical view of
UCTIMS, as shown in Figure 5.
Deebak et al.: IP Multimedia Subsystem—An Intrusion Detection System
6
Figure 4. Preferences view of UCTIMS client
Figure 5. Registration & de-registration views of UCTIMS client (―Alice‖)
Installation Procedure of OpenIMSCore
The Multimedia Platform of the OpenIMSCore network (OpenIMSCore Network (2009) [Online]. Available at:
http://www.openim-score.org/.) has been built under Linux Mint (Version 14) for probing communications of the IP
Multimedia Subsystem client. The Linux Mint OS has been installed in the following packages for configuring Proxy –
Call Session Control Function, Serving – Call Session Control Function, and Interrogating – Call Session Control Function.
■ Packages to be Installed
Package 1: The package sun-java6-jdk is installed include Java tools useful to developing and testing the the multimedia
core network.
Package 2: The package mysql-server is installed to provide database access to the multimedia core network.
Package 3: The package libmysqlclient15-dev is installed to provide the Fast, Stable, true multi-user and multi-threaded
SQL database in the multimedia core network.
Smart Computing Review, vol. 3, no. 1, February 2013
7
Package 4: The package libxml2& libxml2-dev is installed for parsing XML documents during registration / de –
registration of IMS clients in the multimedia core network.
Package 5: The package bind9 is installed to enable the multimedia core network domain on the network.
Package 6: The package ant is installed for supporting Built-in-Task in the multimedia core network.
Package 7: The package flex is installed for performing text pattern matching in the multimedia core network.
Package 8: The package bison is installed for analyzing parsing ambiguities in the multimedia core network.
■ Running Views of CSCF
The command ./pcscf is executed in the terminal; the P-CSCF server will start to serve as proxy for registered IMS clients.
The running terminal is seen in Figure 6. The command. /scscf is executed in the terminal; the S-CSCF server will start to
handle registration, authentication, downloading, traffic routing, session performance, supervision, execution and
maintenance. The running terminal is seen in Figure 7. The command. /scscf is executed in the terminal; the I-CSCF server
will start to act as an access control point between the P-CSCF and the S-CSCF. The running terminal is seen in Figure 8.
The command ./fhoss.sh is executed in the terminal; the HSS server will start to act as a service control point between the
P-CSCF and the S-CSCF. The running terminal is seen in Figure 9. Details of CSCSF Elements and Port Numbers are
listed in Table 1.
Figure 6. P-CSCF Server
Figure 7. S-CSCF Server
Deebak et al.: IP Multimedia Subsystem—An Intrusion Detection System
8
Figure 8. I-CSCF Server
Figure 9. HSS Server
Table 1. Details of CSCSF Elements and Port Numbers
CSCF Servers
Configuration Port
Server Of P-CSCF
4060
Server Of I-CSCF
5060
Server Of S-CSCF
6060
Interfacer Of Diameter
3868, 3869, 3870
Flooding Attack Tools
Technology trends change every moment of our lifetime. The same is true for attackers. Although IMS has almost all
security mechanisms, such as MD5 amd AKA V1/V2 for user authentication and authorization, malicious attacks have still
not hit a breaking point. This is why multimedia networks degrade greatly. The DoS attack has been pegged as an attack to
Smart Computing Review, vol. 3, no. 1, February 2013
9
which the OpenIMSCore network is vulnerable. 3GPP, ETSI and TISPAN have been security safeguards against signaling
and media traffic, but they do not do measuring, which is still incomplete.
For instance, it does not counteract the DoS attack designed to block voice call service. In this paper, flooding attack
detection has been analyzed thoroughly using the OpenIMSCore and IMS client. Figure 10 shows the time-independent
attack. Invite flooding generates numerous invite messages to make the server crash. Re-invite flooding generates
numerous re-invite messages to interrupt established service (e.g., voice call service – terminated without any reason).
Teardown flooding generates a bye message for service termination (e.g., before actual call/chat termination).
Figure 10. Possible flooding attacks against P-CSCF
Flooding Attack Behavior
As for the testing phase, the OpenIMSCore network and the UCTIMS client have been configured for active anomaly
detection. Whenever a flooding attack is launched, detection of requests (invite/re-invite/teardown) can be seen on the
display of the client, whereas the anomaly attack could be known by the victim and the victim could disconnect from the
service to elude server crash. The following performance degradation comes with dispersing the flooding attack.
1. It increases the initial poison call rate whereby the additional calls get mixed.
2. At the beginning, the OpenIMSCore network behaves normally by Sending (100 Trying) for each request.
3. For every spoofed request, the OpenIMSCore network transmits seven responses to the unreachable destination.
4. During the transmit response of the spoofed request, the OpenIMSCore network degrades in server performance and
call throughput. Moreover, it suffers from frequent timeouts.
Setting Parameters of Flooding Attack
Figure 11 illustrates the command execution of an invite flooding attack.
Set Interface as lo/eth0/eth1
Set Username as Bob/Alice
Set Target IP with Port as open-ims.test:4060
Set Number of Invite Request as 1000/2000
Figure 12 illustrates detection of invite flooding. Invite flooding has been invoked by IMS client Bob, whereby the
client endures ―Destination Unreachable‖ and the call never ends between the parties until sever timeout. Therefore we
need an efficient IMS client for detecting any such attack in order to prevent server timeout. We have done a thorough
analysis investigating the attack detection schema using both the OpenIMSCore and the client.
Figure 11. Launching of invite flooding attack
10
Deebak et al.: IP Multimedia Subsystem—An Intrusion Detection System
Figure 12. Invite flooding attack in UCTIMS
Homogeneous voice call communication
The following settings were made for testing homogeneous voice call communication:
Step 1: Linux Mint IMS client is registered as ―Bob‖
Step 2: Ubuntu IMS client is registered as ―Alice‖
Step 3: Establish voice call service between homogeneous multimedia clients
Step 4: Probe SIP and RTP Traffic analysis
In-depth analysis of SIP traffic was done by using Network Analyzer (Wireshark (2013) [Online]. Available at:
http://www.wireshark.org/) and Network Monitor (Ntop). The SIP Traffic View was analyzed after the attack was
initialized and it showed steady growth after detection occurred. Figure 13 illustrates the SIP traffic. The RTP traffic also
shows steady improvement after the proposed schema detects the anomaly attack. Figure 14 illustrates RTP Traffic View.
When the proposed schema detects the attack, it cuts off the attacker and starts serving the communication link to the call
parties. The probing result shows that after the cutoff, the throughput rate is reliable, as shown in Figure 15.
Figure 18. SIP Traffic View (after flooding attack detection)
Smart Computing Review, vol. 3, no. 1, February 2013
11
Figure 14. RTP Traffic View (after flooding attack detection)
Figure 15. Throughput Rate View (after flooding attack detection)
Conclusions
The IMS architecture is standardized to access multimedia services (such as data, voice and video), and moreover, this
standardization constitutes fixed mobile convergence (FMC) for wireless and wireline operators. The OpenIMSCore is
vulnerable to many attacks that can be launched in two ways: flooding attack and anomalous SIP request. The SIP invite
flooding attack has been investigated in the UCTIMS open source client, and probing was done through the OpenIMSCore.
The proposed schema adopted a key authentication schema for proficiently analyzing SIP packets. The proposed
authentication was placed between the transport and application layers to test SIP traffic, RTP traffic and throughput rate.
The network traffic analysis tool Ntop shows the result as reasonably good after the proposed schema cuts off the attacker.
References
[1] Poikeselka, Mayer, Khartabil, and Niemi, ―The IMS IP Multimedia Concepts and Services,‖ 2nd ed. John Wiley &
Sons, Ltd., 2006.
[2] A. Cuevas, J. Moreno, P. Vidales, and H. Einsiedler, ―The IMS Service Platform: A Solution for Next-Generation
Network Operators to Be More than Bit Pipes,‖ IEEE Comm. Mag., pp. 75–81, Aug. 2006. Article (CrossRef Link)
[3] 3rd Generation Partnership Project 2 (3GPP2), ―IMS Security Framework,‖ Dec. 2003.
[4] M. Sher and T. Magedanz, ―Secure Service Provisioning Framework (SSPF) for IP Multimedia System and Next
Generation Mobile Networks,‖ in Proc. of IWWST’05, pp. 101–106, April 2005.
[5] H. Sengar, H. Wang, D. Wijesekera, and S. Jajodia, ―Detecting VoIP Floods using the Hellinger Distance,‖ IEEE
Transactions on Parallel and Distributed Systems, vol. 19, no. 6, pp. 794–805, June 2008. Article (CrossRef Link)
[6] B. Reynolds and D. Ghosal, ―Secure IP Telephony Using Multi-Layered Protection,‖ in Proc. of Net. and Distributed
Sys. Sec. Symp., Feb 2003. Article (CrossRef Link)
12
Deebak et al.: IP Multimedia Subsystem—An Intrusion Detection System
[7] V. Siris and F. Papagalou, ―Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks,‖
Computer Communications, vol. 29, no. 9, pp. 1433-1442, 2006. Article (CrossRef Link)
[8] H. Wang, D. Zhang, and K. Shin, ―Detecting SYN flooding attacks,‖ in Proc. of IEEE INFOCOM 2002, vol. 3, 2002.
Article (CrossRef Link)
[9] Ntop – A Traffic Analysis Tool, 2012.
[10] A. Awais, M. Farooq, and M. Javed, ―Attack analysis & bio-inspired security framework for IP Multimedia
subsystem,‖ in Proc. of the Conference Companion on Genetic and Evolutionary Computation, pp. 2093-2098, 2008.
Article (CrossRef Link)
[11] Y. Rebahi, M. Sher, and T. Magedanz, ―Detecting flooding attacks against IP Multimedia Subsystem (IMS)
networks,‖ in Proc. of IEEE/ACS Intl. Conf. on Comp. Sys. and App., pp. 848–851, 2008. Article (CrossRef Link)
[12] M. Sher, S. Wu and T. Magedanz, ―Security Threats and Solutions for Application Server of IP Multimedia
Subsystem (IMSAS),‖ in Proc. of IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation, 2006.
[13] E. Y. Chen, ―Detecting DoS attacks on SIP systems,‖ in Proc. of IEEE Workshop on VoIP Management and Security,
pp.53-58, Apr. 2006. Article (CrossRef Link)
[14] D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, S. Ehlert and D. Sisalem, ―Survey of
Security Vulnerabilities in SIP Protocol,‖ IEEE Communication Surveys, vol. 8, no. 3, pp. 68-81, 2006. Article
(CrossRef Link)
[15] Michael T. Hunter, Russell J Clark and Frank S. Park, ―Security Issues With the IP Multimedia Subsystem (IMS),‖
MNCNA, ACM, 2007. Article (CrossRef Link)
[16] M. Sher and T. Magedanz, ―Developing Intrusion Detection and Prevention System for IP Multimedia Subsystem
Application Servers,‖ Journal of Information Assurance and Security, 2007. Article (CrossRef Link)
[17] J. Mirkovic, S. Dietrich, D. Dittrich, and P. Reiher. ―Internet Denial of Service: Attack and Defense Mechanisms,‖
Prentice Hall, 2005.
[18] S. Vuong and Y. Bai. ―A Survey of VoIP Intrusions and Intrusion Detection Systems,‖ in Proc. of 6th International
Conference on Advanced Communication Technology (ICACT 2004), Feb. 2004. Article (CrossRef Link)
[19] D. Sisalem, J. Kuthan, and S. Ehlert. ―Denial of Service Attacks Targeting a SIP VoIP Infrastructure - Attack
Scenarios and Prevention Mechanisms,‖ IEEE Network - Special Issue on Securing VoIP, vol. 20, no. 5, pp. 26-31,
Sep. 2006. Article (CrossRef Link)
[20] W. Stallings. ―Network Security Essentials: Applications and Standards,‖ 3rd edition. Pearson Education, 2007.
[21] H. Sengar, D. Wijesekera, H. Wang and S. Ja jodia. ―VoIP Intrusion Detection through Interacting Protocol State
Machines,‖ in Proc. of International Conference on Dependable Systems and Networks (DSN-2006), June 2006.
Article (CrossRef Link)
[22] S. Ehlert, G. Zhang, D. Geneiatakis. Kambourakis, T. Dagiuklas, J. Markl and Sisalem, ―Two Layer Denial of
Service Prevention on SIP VoIP Infrastructures,‖ Computer Communications, vol. 31, no. 10, pp. 2443-2456, June
2008. Article (CrossRef Link)
[23] S. Nagpal, E. Yardeni, H. Schulzrinne and G. Ormazabal. ―Secure SIP: A Scalable Prevention Mechanism for DoS
Attacks on SIP-based VoIP Systems,‖ Principles, Systems and Applications of IP Telecommunications (IPTComm
2008), July 2008. Article (CrossRef Link)
[24] D. Geneiatakis, G. Kambourakis. Lambrinoudakis, T. Dagiuklas and S. Gritzalis, ―A Framework for Protecting a
SIP-based Infrastructure against Malformed Message Attacks,‖ Computer Networks, vol. 51, no. 10, pp. 2580-2593,
July 2007. Article (CrossRef Link)
[25] R. Zhang, X. Wang, X. Yang, and X. Jiang. ―Billing Attacks on SIP-Based VoIP Systems,‖ in Proc. of 1st USENIX
Workshop on Offensive Technology (WOOT ’07), Aug. 2007. Article (CrossRef Link)
[26] J. Quittek, S. Niccolini, S. Tartarelli, M. Stiemerling, M. Brunner and T. Ewald. ―Detecting SPIT Calls by Checking
Human Communication Patterns,‖ in Proc. of IEEE International Conference on Communications (ICC ’07), June
2007. Article (CrossRef Link)
Bakkiam David Deebak was born in Cheranmahadevi in 1984. He was obtained the B.Tech
(Information Technology) from Anna University in 2007 and M.E (Embedded Systems and
Computing) from RTM Nagpur University in 2009. Currently, he is working towards the Ph.D.
degree in SASTRA University. His research interest includes Wireless and Multimedia
Communication Network.
Smart Computing Review, vol. 3, no. 1, February 2013
Rajappa Muthaiah obtained Ph.D. degree from SASTRA University in 2009. Currently, he is
working as Associate Professor in SASTRA University. His research interest includes Image
Processing, VLSI and Speech Recognition.
Karuppusamy Thenmozhi obtained Ph.D. degree from SASTRA University in 2008.
Currently, he is working as Associate Dean in School of Electrical and Electronics Engineering
at SASTRA University. Her research interest includes Networking and Wireless
Communication.
Pitchai Iyer Swaminathan obtained Doctorate Degree in Electronics and Communication
Engineering. Currently, he is working as Dean in School of Computing at SASTRA University.
His research interest includes Embedded Systems, Software Engineering and Expert Systems.
Copyrights © 2013 KAIS
13