Protecting SIP against Very Large Flooding DoS Attacks

Honolulu, HI(2009)

引用 27|浏览2
暂无评分
摘要
The use of the Internet for VoIP communications has seen an important increase over the last few years, with the Session Initiation Protocol (SIP) as the most popular protocol used for signaling. Unfortunately, SIP devices are quite vulnerable to Denial-of-Service (DoS) attacks, many of them becoming unresponsive and even resetting with floods of only hundreds of packets per second. In this paper we introduce SIP Defender, a new distributed filtering architecture designed to protect SIP devices against large, flooding DoS attacks. In addition, we describe the implementation of the architecture's SIP Controllers, the network devices in charge of performing the actual filtering. We further present testbed performance figures for these, showing that a controller built on commodity hardware can forward an impressive 2.5 million packets per second for small SIP packets while applying one million filters as well as anti-spoofing mechanisms.
更多
查看译文
关键词
Internet telephony,computer network security,signalling protocols,Internet,VoIP communication,anti-spoofing mechanism,commodity hardware,denial-of-service attacks,distributed filtering architecture,session initiation protocol controllers,session initiation protocol defender,signalling protocol
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要