SIP Flooding Attack Detection

  • Jin Tang
  • Yu Cheng
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)


In this chapter and the following chapter, we address the SIP layer attack detection. In this chapter we focus on the well-known flooding attack and develop an online scheme to detect and subsequently prevent the attack, by integrating a novel three-dimensional sketch design with the Hellinger distance detection technique.


Exponential Weighted Moving Average Proxy Server Attack Detection User Datagram Protocol Normal Traffic 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    F. Gustafson and M. Lindahl, “Evaluation of statistical distributions for VoIP traffic modelling,” University Essay from University West, Department of Economics and IT, 2009.Google Scholar
  2. 2.
    J. Kurose and K. Ross, Computer Networking: A Top-Down Approach (4th ed.), Addison Wiley, 2007.Google Scholar
  3. 3.
    S. Muthukrishnan, “Data Streams: Algorithms and Applications,” in Proc. the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2003.Google Scholar
  4. 4.
    W. Reed, “The Pareto, Zipf and Other Power Laws,” Economics Letters, vol. 74, no. 1, pp. 15–19, Dec. 2001.CrossRefzbMATHGoogle Scholar
  5. 5.
    J. Rosenberg, H. Schulzrinne and G. Camarillo, “SIP: Session Initiation Protocol,” IETF RFC 3261, Jun. 2002.Google Scholar
  6. 6.
    H. Sengar, H. Wang, D. Wijesekera and S. Jajodia, “Detecting VoIP Floods Using the Hellinger Distance,” IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 6, pp. 794–805, Jun. 2008.CrossRefGoogle Scholar
  7. 7.
    SIPp, [Online.] Available:
  8. 8.
    M. Thorup and Y. Zhang, “Tabulation Based 4-Universal Hashing with Applications to Second Moment Estimation,” in Proc. the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2004.Google Scholar
  9. 9.
    G. Yang and L. Le Cam, Asymptotics in Statistics: Some Basic Concepts, second edition, Wiley, Mar. 2006.Google Scholar

Copyright information

© The Author(s) 2013

Authors and Affiliations

  • Jin Tang
    • 1
  • Yu Cheng
    • 2
  1. 1.AT&T LabsWarrenvilleUSA
  2. 2.Department of Electrical and Computer EngineeringIllinois Institute of TechnologyChicagoUSA

Personalised recommendations