skip to main content
10.1145/1269880.1269891acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free Access

SIP-based VoIP traffic behavior profiling and its applications

Published:12 June 2007Publication History

ABSTRACT

With the widespread adoption of SIP-based VoIP, understanding the characteristics of SIP traffic behavior is critical to problem diagnosis and security protection of IP Telephony. In this paper, we propose a general methodology for profiling SIP-based VoIP traffic behavior at multiple levels: SIP server host, server entity and individual user levels. Using SIP traffic traces captured in a production VoIP service, we illustrate the characteristics of SIP-based VoIP traffic behavior in an operational network and demonstrate the effectiveness of our general profiling methodology. In particular, we show how our profiling methodology can help identify performance anomalies through a case study.

References

  1. J. Rosenberg, H. Schulzrinne, G. Camarillo, P. J. Johnston, A. R. Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol. RFC 3261, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. N. Wosnack. A Vonage VoIP 3-way call CID spooning vulnerability, 2003. http://www.hackcanada.com/canadian/phreaking/voip-vonage-vulnerability.html.Google ScholarGoogle Scholar
  3. S. McGann and D. C. Sicker. An analysis of security threats and tools in SIP-Based VoIP Systems. In 2nd Workshop on Securing Voice over IP, June 2005.Google ScholarGoogle Scholar
  4. D. Geneiatakis, T. Dagiuklas, C. Lambrinoudakis, G. Kambourakis, and S. Gritzalis. Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study. In Proc. of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP'06), July 2006.Google ScholarGoogle Scholar
  5. D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis, and S. Gritzalis. SIP message tampering: The SQL code injection attack. In Proc. IEEE of SoftCOM, Sept. 2005.Google ScholarGoogle Scholar
  6. B. Reynolds, D. Ghosal, C. -N. Chuah, and S. F. Wu. Vulnerability analysis and a security architecture for IP telephony. In IEEE GlobeCom Workshop on VoIP Security: Challenges and Solutions, Nov. 2004.Google ScholarGoogle Scholar
  7. B. Reynolds and D. Ghosal. Secure IP telephony using multi-layered protection. In Proc. of Network and Distributed System Security Symposium(NDSS'03), Feb. 2003.Google ScholarGoogle Scholar
  8. Y.-S. Wu, S. Bagchi, S. Garg, and N. Singh. SCIDIVE: a stateful and cross protocol intrusion detection architecture for Voice-over-IP environments. In Proc. of the 2004 International Conference on Dependable Systems and Networks (DSN'04), pages 433--442, June 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Dantu and P. Kolan. Detecting spam in VoIP networks. In Proc. of USENIX, SRUTI Workshop, pages 31--37, July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. H. J. Kang, Z.-L. Zhang, S. Ranjan, and A. Nucci. SIP-based VoIP traffic behavior profiling and its applications. Technical report, NARUS, July 2006.Google ScholarGoogle Scholar

Index Terms

  1. SIP-based VoIP traffic behavior profiling and its applications

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MineNet '07: Proceedings of the 3rd annual ACM workshop on Mining network data
        June 2007
        58 pages
        ISBN:9781595937926
        DOI:10.1145/1269880

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 June 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader