Detect and prevent SIP flooding attacks in VoLTE by utilizing a two-tier PFilter design
Ruan N.1; Wu M.1; Ma S.1; Zhu H.1; Jia W.1; Wu S.2
Source PublicationIEICE Transactions on Information and Systems
AbstractAs a new generation voice service, Voice over LTE (VoLTE) has attracted worldwide attentions in both the academia and industry. Different from the traditional voice call based on circuit-switched (CS), VoLTE evolves into the packet-switched (PS) field, which has long been open to the public. Though designed rigorously, similar to VoIP services, VoLTE also suffers from SIP (Session Initiation Protocal) flooding attacks. Due to the high performance requirement, the SIP flooding attacks in VoLTE is more difficult to defend than that in traditional VoIP service. In this paper, enlightened by Counting Bloom Filter (CBF), we design a versatile CBF-like structure, PFilter, to detect the flooding anomalies. Compared with previous relevant works, our scheme gains advantages in many aspects including detection of low-rate flooding attack and stealthy flooding attack. Moreover, not only can our scheme detect the attacks with high accuracy, but also find out the attackers to ensure normal operation of VoLTE by eliminating their negative effects. Extensive experiments are performed to well evaluate the performance of the proposed scheme.
KeywordCount Filter PFilter SIP flooding attack
URLView the original
Fulltext Access
Citation statistics
Cited Times [WOS]:0   [WOS Record]     [Related Records in WOS]
Document TypeConference paper
CollectionUniversity of Macau
Affiliation1.Shanghai Jiao Tong University
2.Ministry of Public Security of the People's Republic of China
Recommended Citation
GB/T 7714
Ruan N.,Wu M.,Ma S.,et al. Detect and prevent SIP flooding attacks in VoLTE by utilizing a two-tier PFilter design[C],2017:2287-2294.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Ruan N.]'s Articles
[Wu M.]'s Articles
[Ma S.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Ruan N.]'s Articles
[Wu M.]'s Articles
[Ma S.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Ruan N.]'s Articles
[Wu M.]'s Articles
[Ma S.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.