SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments

  • Authors:
  • Yu-Sung Wu;Saurabh Bagchi;Sachin Garg;Navjot Singh;Tim Tsai

  • Affiliations:
  • Purdue University;Purdue University;Avaya Labs;Avaya Labs;Sun Microsystems

  • Venue:
  • DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Voice over IP (VoIP) systems are gaining inpopularity as the technology for transmitting voice trafficover IP networks. As the popularity of VoIP systemsincreases, they are being subjected to different kinds ofintrusions some of which are specific to such systems andsome of which follow a general pattern. VoIP systemspose several new challenges to Intrusion DetectionSystem (IDS) designers. First, these systems employmultiple protocols for call management (e.g., SIP) anddata delivery (e.g., RTP). Second, the systems aredistributed in nature and employ distributed clients,servers and proxies. Third, the attacks to such systemsspan a large class, from denial of service to billing fraudattacks. Finally, the systems are heterogeneous andtypically under several different administrative domains.In this paper, we propose the design of an intrusiondetection system targeted to VoIP systems, called SCIDIVE(pronounced "Skydive"). SCIDIVE is structured to detectdifferent classes of intrusions, including, masquerading,denial of service, and media stream-based attacks. It canoperate with both classes of protocols that compose VoIPsystems - call management protocols (CMP), e.g., SIP,and media delivery protocols (MDP), e.g., RTP. SCIDIVEproposes two abstractions for VoIP IDS .Statefuldetection and Cross-protocol detection. Stateful detectiondenotes assembling state from multiple packets and usingthe aggregated state in the rule matching engine. Crossprotocol detection denotes matching rules that spanmultiple protocols. SCIDIVE is demonstrated on a sampleVoIP system that comprises SIP clients and SIP proxyservers with RTP as the data delivery protocol. Fourattack scenarios are created and the accuracy and theefficiency of the system evaluated with rules meant tocatch these attacks.