Locks – Special application – For control and machine elements
Reexamination Certificate
2006-09-28
2008-10-28
Tsang, Fan (Department: 2614)
Locks
Special application
For control and machine elements
C370S230000, C370S231000, C370S232000, C370S237000, C709S224000, C709S225000, C709S226000
Reexamination Certificate
active
07441429
ABSTRACT:
With the widespread adoption of SIP-based VoIP, understanding the characteristics of SIP traffic behavior is critical to problem diagnosis and security protection of VoIP services. A general methodology is provided for profiling SIP-based VoIP traffic behavior at several levels: SIP server host, server entity (e.g., registrar and call proxy) and individual user levels. Using SIP traffic traces captured in a production VoIP network, the characteristics of SIP-based VoIP traffic behavior in an operational environment is illustrated and the effectiveness of the general profiling methodology is demonstrated. In particular, the profiling methodology identifies anomalies due to performance problems and/or implementation flaws through a case study. The efficacy of the methodology in detecting potential VoIP attacks is also demonstrated through a test bed experimentation.
REFERENCES:
patent: 5835490 (1998-11-01), Park et al.
patent: 2006/0087973 (2006-04-01), Huang
patent: 2007/0206579 (2007-09-01), Voith et al.
patent: 2007/0233896 (2007-10-01), Hilt et al.
patent: 2007/0255828 (2007-11-01), Paradise
patent: 2008/0016157 (2008-01-01), Sahraie et al.
Pesch, Pous and Foster, Performance Evaluation of SIP-based multimedia services in UMTS, Oct. 19, 2005, Computer Networks, vol. 49, Issue 3, pp. 385-403.
R. Dantu and P. Kolan. Detecting spam in VoIP networks. In Proc. of USENIX, Steps for Reducing Unwanted Traffic on the Internet (SRUTI) Workshop, pp. 31-37, Cambridge, MA. Jul. 2005.
D. Geneiatakis, T. Dagiuklas, C. Lambrinoudakis, G. Kambourakis, and S. Gritzalis. Novel protecting mechanism for SIP-based infrastructure against malformed message attacks: Performance evaluation study. In Proc. of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP'06), Patras, Greece, Jul. 2006.
D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis, and S. Gritzalis. SIP message tampering: TheSQL code injection attack. In Proc. IEEE of the 13th IEEE International Conference on Software, Telecommunications and Computer Networks (SoftCOM'05), Split, Croatia, Sep. 2005.
A. R. Hickey. For VoIP, too many threats to count, 2005. <http://searchsecurity.techtarget.com/orginalContent/0,289142,sid14—gci1153718,00.html?SEevlg65>, retrieved Dec. 21, 2006.
S. McGann and D. C. Sicker. An analysis of security threats and tools in SIP-based VoIP systems. In 2nd Workshop on Securing Voice over IP, Washington, DC, USA, Jun. 2005.
B. Reynolds and D. Ghosal. Secure IP telephony using multi-layered protection. In Proc. of Network and Distributed System Security Symposium(NDSS'03), San Diego,CA, Feb. 2003.
B. Reynolds, D. Ghosal, C.-N. Chuah, and S. F.Wu. Vulnerability analysis and a security architecture for IP telephony. In IEEE GlobeCom Workshop on VoIP Security: Challenges and Solutions, San Diego, CA, Nov. 2004.
J. Rosenberg, H. Schulzrinne, G. Camarillo, P. J. Johnston, A., R. Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol. RFC 3261, Jun. 2002. <www.ietf.org/rfc/rfc3261.txt> retrieved Dec. 21, 2006.
N. Wosnack. A Vonage VoIP 3-way call CID spoofing vulnerability, 2003, <www.hackcanada.com/canadian/phreaking/voip-vonage-vulnerability.html>, retrieved Dec. 21, 2006.
Y.-S. Wu, S. Bagchi, S. Garg, and N. Singh. SCIDIVE: A stateful and cross protocol intrusion detection architecture for Voice-over-IP environments. In Proc. of the 2004 International Conference on Dependable Systems and Networks (DSN'04), pp. 433-442, Split, Croatia, Jun. 2004.
Nucci Antonio
Ranjan Supranamaya
Zhang Zhi-Li
Fernandez & Associates LLP
Narus, inc.
Nguyen Phung-Hoang J
Tsang Fan
LandOfFree
SIP-based VoIP traffic behavior profiling does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with SIP-based VoIP traffic behavior profiling, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and SIP-based VoIP traffic behavior profiling will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3992358