10.1145/1326304.1326306acmconferencesArticle/Chapter ViewAbstractPublication PagesiptcommConference Proceedingsconference-collections
research-article

Holistic VoIP intrusion detection and prevention system

Authors Info & Claims
Published:19 July 2007Publication History

ABSTRACT

VoIP security is crucial for current and future networks and services. The rapid shift from a closed and confined telephony towards an all IP network supporting end to end VoIP services provides major challenges to the security plane. Faced with multiple attack vectors, new and comprehensive defensive security solutions for VoIP must emerge from the research community.

This paper describes a multilayer intrusion detection and prevention system architecture for VoIP infrastructures. The key components of the approach are based on a VoIP-specific honeypot and on an application layer event correlation engine. While each component alone can detect only a subset of VoIP-specific attacks, the two of them together can provide an effective defense for the many class of attacks. We show in this paper, how different and complementary conceptual approaches can jointly provide an in depth defense for VoIP architectures.

References

  1. J. Brown. Working with SEC - the Simple Event Correlator. http://sixshooter.v6.thrupoint.net/SEC-examples/article.html;http://sixshooter.v6.thrupoint.net/SEC-examples/article-part2.html.Google ScholarGoogle Scholar
  2. D. E. Denning. An Intrusion-Detection Model. In IEEE Symposium on Security and Privacy, pages 118--133. IEEE Computer Society Press, Apr 1986.Google ScholarGoogle Scholar
  3. D. Endler and M. Collier. Hacking VoIP Exposed. McGraw-Hill Osborne Media, 2006.Google ScholarGoogle Scholar
  4. C. Krügel, T. Toth, and E. Kirda. Service specific anomaly detection for network intrusion detection. In SAC '02: Proceedings of the 2002 ACM symposium on Applied computing, pages 201--208, New York, NY, USA, 2002. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Mathieu, Y. Gourhant, and Q. Loudier. SPIT mitigation by a network level anti SPIT entity. In Third annual security workshop (VSW'06). ACM Press, June 2006.Google ScholarGoogle Scholar
  6. M. Nassar, R. State, and O. Festor. Intrusion detections mechanisms for VoIP applications. In Third annual security workshop (VSW'06). ACM Press, June 2006.Google ScholarGoogle Scholar
  7. M. Nassar, R. State, and O. Festor. VoIP Honeypot Architecture. In Proc. of 10 th. IEEE/IFIP Symposium on Integrated Management, June 2007.Google ScholarGoogle ScholarCross RefCross Ref
  8. S. Niccolini. SPIT and SPIM. In Third annual security workshop (VSW'06). ACM Press, June 2006.Google ScholarGoogle Scholar
  9. J. Quittek. Detecting SPIT calls by checking communication patterns. In IEEE ICC 2007, Jun 2007.Google ScholarGoogle ScholarCross RefCross Ref
  10. J. P. Rouillard. Real-tile Logfile Analysis Using the Simple Event Correlator (SEC). In 18th USENIX System Administration Conference (LISA '04) Proccedings, pages 133--149, November 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Shin and C. Shim. Voice SPAM Control with Gray Leveling. In 2nd Workshop on Securing Voice over IP, June 2005.Google ScholarGoogle Scholar
  12. R. Vaarandi. SEC - A Lightweight Event Correltion Tool. In Proceedings of the 2002 IEEE Workshop on IP operations and Management, number 0-7803-7658-7, pages 111--115, October 2002.Google ScholarGoogle Scholar
  13. VoIPSA. VoIP security and privacy threat taxonomy. Public Realease 1.0, Oct 2005. http://www.voipsa.org/Activities/VOIPSA_Threat_Taxonomy_0.1.pdf.Google ScholarGoogle Scholar
  14. Y. Wu, S. Bagchi, S. Garg, N. Singh, and T. K. Tsai. SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. In International Conference on Dependable Systems and Networks (DSN 2004), pages 433--442. IEEE Computer Society, Jun 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H. Yan, K. Sripanidkulchai, H. Zhang, Z. Shae, and D. Saha. Incorporating Active Fingerprinting into SPIT Prevention Systems. In Third annual security workshop (VSW'06). ACM Press, June 2006.Google ScholarGoogle Scholar

Index Terms

(auto-classified)
  1. Holistic VoIP intrusion detection and prevention system

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IPTComm '07: Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications
          July 2007
          107 pages
          ISBN:9781605580067
          DOI:10.1145/1326304

          Copyright © 2007 ACM

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 19 July 2007

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate18of62submissions,29%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!