SIP-based VoIP traffic behavior profiling

Locks – Special application – For control and machine elements

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C370S230000, C370S231000, C370S232000, C370S237000, C709S224000, C709S225000, C709S226000

Reexamination Certificate

active

07441429

ABSTRACT:
With the widespread adoption of SIP-based VoIP, understanding the characteristics of SIP traffic behavior is critical to problem diagnosis and security protection of VoIP services. A general methodology is provided for profiling SIP-based VoIP traffic behavior at several levels: SIP server host, server entity (e.g., registrar and call proxy) and individual user levels. Using SIP traffic traces captured in a production VoIP network, the characteristics of SIP-based VoIP traffic behavior in an operational environment is illustrated and the effectiveness of the general profiling methodology is demonstrated. In particular, the profiling methodology identifies anomalies due to performance problems and/or implementation flaws through a case study. The efficacy of the methodology in detecting potential VoIP attacks is also demonstrated through a test bed experimentation.

REFERENCES:
patent: 5835490 (1998-11-01), Park et al.
patent: 2006/0087973 (2006-04-01), Huang
patent: 2007/0206579 (2007-09-01), Voith et al.
patent: 2007/0233896 (2007-10-01), Hilt et al.
patent: 2007/0255828 (2007-11-01), Paradise
patent: 2008/0016157 (2008-01-01), Sahraie et al.
Pesch, Pous and Foster, Performance Evaluation of SIP-based multimedia services in UMTS, Oct. 19, 2005, Computer Networks, vol. 49, Issue 3, pp. 385-403.
R. Dantu and P. Kolan. Detecting spam in VoIP networks. In Proc. of USENIX, Steps for Reducing Unwanted Traffic on the Internet (SRUTI) Workshop, pp. 31-37, Cambridge, MA. Jul. 2005.
D. Geneiatakis, T. Dagiuklas, C. Lambrinoudakis, G. Kambourakis, and S. Gritzalis. Novel protecting mechanism for SIP-based infrastructure against malformed message attacks: Performance evaluation study. In Proc. of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP'06), Patras, Greece, Jul. 2006.
D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis, and S. Gritzalis. SIP message tampering: TheSQL code injection attack. In Proc. IEEE of the 13th IEEE International Conference on Software, Telecommunications and Computer Networks (SoftCOM'05), Split, Croatia, Sep. 2005.
A. R. Hickey. For VoIP, too many threats to count, 2005. <http://searchsecurity.techtarget.com/orginalContent/0,289142,sid14—gci1153718,00.html?SEevlg65>, retrieved Dec. 21, 2006.
S. McGann and D. C. Sicker. An analysis of security threats and tools in SIP-based VoIP systems. In 2nd Workshop on Securing Voice over IP, Washington, DC, USA, Jun. 2005.
B. Reynolds and D. Ghosal. Secure IP telephony using multi-layered protection. In Proc. of Network and Distributed System Security Symposium(NDSS'03), San Diego,CA, Feb. 2003.
B. Reynolds, D. Ghosal, C.-N. Chuah, and S. F.Wu. Vulnerability analysis and a security architecture for IP telephony. In IEEE GlobeCom Workshop on VoIP Security: Challenges and Solutions, San Diego, CA, Nov. 2004.
J. Rosenberg, H. Schulzrinne, G. Camarillo, P. J. Johnston, A., R. Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol. RFC 3261, Jun. 2002. <www.ietf.org/rfc/rfc3261.txt> retrieved Dec. 21, 2006.
N. Wosnack. A Vonage VoIP 3-way call CID spoofing vulnerability, 2003, <www.hackcanada.com/canadian/phreaking/voip-vonage-vulnerability.html>, retrieved Dec. 21, 2006.
Y.-S. Wu, S. Bagchi, S. Garg, and N. Singh. SCIDIVE: A stateful and cross protocol intrusion detection architecture for Voice-over-IP environments. In Proc. of the 2004 International Conference on Dependable Systems and Networks (DSN'04), pp. 433-442, Split, Croatia, Jun. 2004.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

SIP-based VoIP traffic behavior profiling does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with SIP-based VoIP traffic behavior profiling, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and SIP-based VoIP traffic behavior profiling will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3992358

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.