Skip to main content

Mechanism for Preventing Registration Flooding Attack in SIP

  • Conference paper
Book cover Intelligent Computing, Networking, and Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 243))

Abstract

The transition of voice communication from public switched telephone networks (PSTN) to IP network has offered numerous advantages, at the same time, myriad of security threats. Common among these threats is DoS attacks which was not possible in PSTN with closed architecture. This paper examines the denial-of-service (DoS) attacks on session initiation protocol (SIP) server using SIP particularly with REGISTER messages, focusing on the design of a framework to protect SIP server from such attacks. The proposed scheme introduces an intermediate server between SIP server and the User Agents, which is used to filter out attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley,M., Schooler, E.: SIP: Session Initiation Protocol, RFC 3261 (June 2002)

    Google Scholar 

  2. SANS Institute. SANS Top-20 2007 Security Risks, 2007. http://www.sans.org/top20/

  3. Seo, D., Lee, H., Nuwere, E.: Detecting more SIP attacks on VoIP services by combining rule matching and state transition models. In: Proceedings of the IFIP TC 11 23rd International Information Security Conference, vol. 278, pp. 397–411. (2008)

    Google Scholar 

  4. Chen, E.Y., Itoh, M.: A whitelist approach to protect SIP servers from flooding attacks. In: Communications Quality and Reliability (CQR), 2010 IEEE International Workshop Technical Committee, 8–10 June 2010

    Google Scholar 

  5. Peng, T., Leckie, C., Ramamohanarao, K.: Protection from distributed denial of service attacks using history-based IP filtering. Communications, 2003. ICC ‘03. IEEE International Conference, vol. 1, pp. 482–486. (2003)

    Google Scholar 

  6. Ormazabal, G., Nagpal, S., Yardeni, E., Schulzrinne, H., Secure SIP: a scalable prevention mechanism for DoS attacks on SIP based VoIP systems. In: Proceedings of 2nd International Conference on Principles, Systems and Applications of IP Telecommunications (IPTComm), pp. 107–132, July 2008

    Google Scholar 

  7. Deng, X., Shore, M.: Advanced flooding attack on a SIP server. Availability, Reliability and Security, 2009. ARES ‘09. International Conference, pp. 647–651, (2009)

    Google Scholar 

  8. OpenSIPS (OpenSIPS is the new name for the OpenSER project.): http://www.opensips.org

  9. Sipp, sipp.sourceforge.net

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bosco Sebastian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Sebastian, B., Choudhury, P., Jaidhar, C.D. (2014). Mechanism for Preventing Registration Flooding Attack in SIP. In: Mohapatra, D.P., Patnaik, S. (eds) Intelligent Computing, Networking, and Informatics. Advances in Intelligent Systems and Computing, vol 243. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1665-0_71

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1665-0_71

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1664-3

  • Online ISBN: 978-81-322-1665-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics