• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism


Hyung-Woo Lee, Journal of Internet Computing and Services, Vol. 9, No. 6, pp. 37-48, Dec. 2008
Full Text:
Keywords: SIP, VoIP

Abstract

VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Lee, H. (2008). Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism. Journal of Internet Computing and Services, 9(6), 37-48.

[IEEE Style]
H. Lee, "Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism," Journal of Internet Computing and Services, vol. 9, no. 6, pp. 37-48, 2008.

[ACM Style]
Hyung-Woo Lee. 2008. Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism. Journal of Internet Computing and Services, 9, 6, (2008), 37-48.