D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks

نویسندگان

  • Alexandros Kapravelos
  • Iasonas Polakis
  • Elias Athanasopoulos
  • Sotiris Ioannidis
  • Evangelos P. Markatos
چکیده

We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated Abuse of teLephones), or, in the simple form, Dial attack, to refer to this behavior. We develop a simulation environment for modeling a Dial attack in order to quantify its full potential and measure the effect of attack parameters. Based on the simulation’s results we perform the attack in the real-world. By using a Voice over IP (VoIP) provider as the attack medium, we manage to hold an existing landline device busy for 85% of the attack duration by issuing only 3 calls per second and, thus, render the device unusable. The attack has zero financial cost, requires negligible computational resources and cannot be traced back to the attacker. Furthermore, the nature of the attack is such that anyone can launch a Dial attack towards any telephone device. Our investigation of existing countermeasures in VoIP providers shows that they follow an all-or-nothing approach, but most importantly, that their anomaly detection systems react slowly against our attacks, as we managed to issue tens of thousands of calls before getting spotted. To cope with this, we propose a flexible anomaly detection system for VoIP calls, which promotes fairness for callers. With our system in place it is hard for an adversary to keep the device busy for more than 5% of the duration of the attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Digital is Calling the Analog: Robust Prevention of Dial Attacks

We carry out attacks using Internet platforms that aim on keeping telephone devices busy, denying users any access. We refer to this behavior using the term DIAL (Digital Initiated Abuse of teLephones), or, in the simple form, Dial attack. We develop an intuitive simulation environment for modeling a Dial attack in order to identify its critical characteristics. Based on the simulation’s result...

متن کامل

Two layer Denial of Service prevention on SIP VoIP infrastructures

0140-3664/$ see front matter 2008 Elsevier B.V. A doi:10.1016/j.comcom.2008.03.016 * Corresponding author. Tel.: +49 30 3463 7378; fa E-mail addresses: [email protected] fraunhofer.de (G. Zhang), [email protected] (D. Gen (G. Kambourakis), [email protected] (T. Dagiuklas), jiri. [email protected] (D. Sisalem). The emergence of Voice over IP (VoIP) has offered numerous advantag...

متن کامل

A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment

The advent of Voice over IP (VoIP) has offered numerous advantages but, at the same time, it has introduced security threats not previously encountered in networks with a closed architecture like the Public Switch Telephone Networks (PSTN). One of these threats is that of signaling attacks. This paper examines the signaling attacks in VoIP environments based on the Session Initiation Protocol (...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Detecting Denial of Service Message Flooding Attacks in SIP based Services

Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its ‎security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol ‎‎(SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation ‎deficiencies cause some security concerns in SIP based infra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010