期刊文献+

基于扩展状态机的SIP洪泛攻击自适应检测

Self-adaptive Detection for SIP Flooding Attacks Based on Extended State Machine
在线阅读 下载PDF
导出
摘要 IP多媒体子系统(IMS)中现有的会话初始协议(SIP)洪泛检测方法不能根据网络状况进行自适应检测。针对该问题,提出一种基于扩展状态机的SIP洪泛自适应检测方法。通过增加描述网络受到攻击或出现异常时的状态,构造IMS网络中的SIP扩展状态机,基于卡尔曼滤波设计自适应阈值调整算法,对SIP洪泛攻击进行自适应检测。实验结果表明,该方法比固定阈值的检测方法具有更好的检测性能,更适用于真实网络。 In order to solve the problem that recent researches on detection of Session Initiation Protocol(SIP) flooding attacks in IP Multimedia Subsystem(IMS) can not adapt the network environment,this paper puts forward a self-adaptive detection method for SIP flooding attacks based on extended state machine.It builds the extended SIP state machine according to adding a state which described that the network is being attacked or abnormal,then adaptive adjusts the threshold through the introduction of adaptive algorithm based on Kalman filtering.Experimental results prove that this method has better detection performance than detection methods using fixed threshold,and it is more available in the real network.
出处 《计算机工程》 CAS CSCD 2012年第23期10-14,共5页 Computer Engineering
基金 国家"863"计划基金资助项目(2011AA010604 2008AA011003)
关键词 IP多媒体子系统 会话初始协议 洪泛攻击 状态机 卡尔曼滤波 IP Multimedia Subsystem(IMS) Session Initiation Protocol(SIP) flooding attack state machine Kalman filtering
  • 相关文献

参考文献9

  • 1Poikselka M.The IMS:IP Multimedia Concepts and Services inthe Mobile Domain[M].[S.l.]:John Wiley&Sons,2004.
  • 2Rosenberg J,Schulzrinne H,Camanilo G.SIP:Session InitiationProtocol[S].RFC 3261,2002.
  • 3Awais A,Farooq M,Javed M Y.Attack Analysis Bio-inspiredSecurity Framework for IP Multimedia Subsystem[C]//Proc.ofGECCO’08.[S.l.]:ACM Press,2008.
  • 4Farooqi A H,Munir A.Intrusion Detection System for IP Multi-media Subsystem Using K-nearest Neighbor Classifier[C]//Proc.of INMIC’08.[S.l.]:IEEE Press,2008.
  • 5Tang Jin,Cheng Yu.Quick Detection of Stealthy SIP FloodingAttacks in VoIP Networks[C]//Proc.of ICC’11.Kyoto,Japan:[S.l.],2011.
  • 6王尚广,孙其博,杨放春.IMS网络中的SIP洪泛攻击检测[J].软件学报,2011,22(4):761-772. 被引量:12
  • 7Sher M.Secure Service Provisioning(SSP)Framework for IPMultimedia Subsystem(IMS)[D].Berlin,Germany:TechnicalUniversity of Berlin,2007.
  • 8田园,李建斌,张振.一种逆向分析协议状态机模型的有效方法[J].计算机工程与应用,2011,47(19):63-67. 被引量:5
  • 9Narendra K S,Xiang Cheng.Adaptive Control of Discrete-timeSystems Using Multiple Models[J].IEEE Trans.on AutomaticControl,2000,45(9):1669-1686.

二级参考文献24

  • 1司端锋,韩心慧,龙勤,潘爱民.SIP标准中的核心技术与研究进展[J].软件学报,2005,16(2):239-250. 被引量:96
  • 2Borisov N, Brumley D, Wang H J, et al.A generic applica- tion-level protocol analyzer and its language[C]//Proceedings of the 14th Anuual Network & Distributed System Security Sym- posium, NDSS, 2007.
  • 3Pang R, Paxson V, Somer R, et al.Binpac: A YACC for writing application protocol parzers[C]//Proceedings of the 2006 Inter- net Measurement Conference,2006.
  • 4Dreger H, Feldmann A, Mai M, et al.Dynamic application-layer protocol analysis for network intrusion detection[C]//-tSSENIX Security Symposium, Vancouver, Canada, 2006.
  • 5Cui W,Paxson V,Weaver C,et al.Protocol independent adaptivereplay of application dialog[C]//Proceedings of Network and Distributed System Security Symposium, San Diago,CA,2006.
  • 6Cui W,Kannan J,Wang J H.Discoveror:Automatic protocol de- scription generation from network traces[C]//USENIX Security Symposium, Boston, MA, 2007.
  • 7Kannan J, Jung J, Paxson V, et al.Semi-automated discovery of application session structure[C]//Intemet Measurement Confer- ence,Rio de Janeiro,Brazil,2006.
  • 8Caballero J,Yin H,Liang Z, et al.Polyglot:Automatic extraction of protocol message format using dynamic binary analysis[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security,CCS,October 2007.
  • 9Newsome J, Brumley D, Franklin J, et al.Replayer: Automatic protocol replay by binary analysis[C]//Proc ACM CCS'06,Alex- andria, Virginia, 2006.
  • 10Venkataraman S,Blum A,Song D.Limits of learning-based signa- ture generation with adversaries[C]//Proc NDSS,2008.208-224.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部