DISSERTATION Denial-of-Service and Unsolicited Communication Protection in Global Voice-over-IP Infrastructures

نویسندگان

  • Peter Schartner
  • Michael Hirschbichler
  • Joachim Fabini
  • Bernhard Seifert
  • Christoph Egger
چکیده

The switch of future telecommunication infrastructures to packet switched communication using the Internet Protocol (IP) raises new issues and challenges regarding security. Telecom operators will likely face challenges similar to the ones encountered in the last years by operators of established IP services like World Wide Web (WWW) or Email. The first part of this thesis presents attack scenarios using theoretical discussions and practical examples. These examples demonstrate, how successful DoS attacks against VoIP-infrastructures can be done with little effort. The second part of this thesis proposes detection mechanisms for service disruptions using active and passive monitoring. State of the art standards by Internet Engineering Task Force (IETF) and 3rd Generation Partnership Project (3GPP) as well as own extensions for precise congestion rating are presented in this section. The last section of this thesis presents a novel perimeter protection node (Session Border Controller Advanced (SBC-A)) and validates the effectivity of this infrastructure using reference measurements from operative public IP networks. This infrastructure applies various techniques in fifteen consecutive stages to block malicious messages and to flag problematic ones. The latter are forwarded for further processing to the central VoIP infrastructure. In case of an unavoidable congestion, the markings can be used to drop requests with a high marking earlier than important messages. The effectiveness of this approach is validated using real traffic from A1 Telekom Austria and the VoIP-provider iptel.org.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Global experimental verification of Docker-based secured mVoIP to protect against eavesdropping and DoS attacks

The cloud-computing paradigm has been driving the cloud-leveraged refactoring of existing information and communications technology services, including voice over IP (VoIP). In this paper, we design a prototype secure mobile VoIP (mVoIP) service with the open-source Asterisk private branch exchange (PBX) software, using Docker lightweight virtualization for mobile devices with the immutable con...

متن کامل

Blocking attacks on SIP VoIP proxies caused by external processing

As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Telephone Network (PSTN). One of the reasons is that VoIP applications rely heavily on external Internet-based infrastructures (e.g., DNS server, web server), so that vulnerabilities of these external infrastructures ha...

متن کامل

Session 1B Security I ISPs: Who Else Can You Trust in the Internet?

The Internet today is the main communication infrastructure for private communication and business. A protection against unsolicited traffic such as DDoS attacks is therefore in the interest of all – but, at the same time, security has to be balanced with privacy issues. This paper proposes a collaborative effort against unsolicited traffic where ISPs and end users collaborate. Users define whi...

متن کامل

ISPs: Who Else Can You Trust in the Internet?

The Internet today is the main communication infrastructure for private communication and business. A protection against unsolicited traffic such as DDoS attacks is therefore in the interest of all – but, at the same time, security has to be balanced with privacy issues. This paper proposes a collaborative effort against unsolicited traffic where ISPs and end users collaborate. Users define whi...

متن کامل

Enabling Software Defined Networking Experiments in Networked Critical Infrastructures

Nowadays, the fact that Networked Critical Infrastructures (NCI), e.g., power plants, water plants, oil and gas distribution infrastructures, and electricity grids, are targeted by significant cyber threats is well known. Nevertheless, recent research has shown that specific characteristics of NCI can be exploited in the enabling of more efficient mitigation techniques, while novel techniques f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013