Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Detection and Prevention of SIP REGISTER Injection Attack on a VoLTE Network

View through CrossRef
Recent technological advances have indicated widespread use of Voice Over Long-Term Evolution (VoLTE) networks based on developing 5G networks. Despite its ease of design and deployment, VoLTE is vulnerable to many sorts of attacks at the control plane's Session Initiation Protocol (SIP), which exchanges signaling messages for calls via starting call setups, management, and termination. These SIP attacks may take the form of modified SIP messages that force the SIP devices to restart, or they may take the form of flooding the SIP devices with invite messages, register requests that cause the device to run out of memory, and denying genuine users access to the device. These attacks are commonly known as Distributed Denial of Service (DDoS) attacks. The SIP register injection attack, which might be injected during the commencement step by SIP equipped devices (SIP smartphones), prior to setting up the Secured Internet Protocol (IPsec) tunnel for the remaining SIP sessions, is of particular relevance, due to its characteristics of exhausting the available bandwidth, memory, and CPU resources, resulting in SIP device failure. Consequently, there is a need to address this difficulty by building an SIP register injection attack detection and mitigation technique. Prior to being processed by the Proxy Call Session Control Function. The proposed scheme verifies each initial register request from User Equipment (UE) at the home network of Internet Protocol Multimedia Subsystems (IMS) and compares it to the incoming SIP register request pattern with those stored on the scheme's table (P-CSCF). The proposed technique detects and drops every SIP register request with an abnormal pattern that is associated with an attack. The method proved promising with detection accuracy of over 96.67 percent, which is a solid potential as a preliminary setup towards the creation of a robust Real-time SIP detection and mitigation scheme for 5G networks.
Title: Detection and Prevention of SIP REGISTER Injection Attack on a VoLTE Network
Description:
Recent technological advances have indicated widespread use of Voice Over Long-Term Evolution (VoLTE) networks based on developing 5G networks.
Despite its ease of design and deployment, VoLTE is vulnerable to many sorts of attacks at the control plane's Session Initiation Protocol (SIP), which exchanges signaling messages for calls via starting call setups, management, and termination.
These SIP attacks may take the form of modified SIP messages that force the SIP devices to restart, or they may take the form of flooding the SIP devices with invite messages, register requests that cause the device to run out of memory, and denying genuine users access to the device.
These attacks are commonly known as Distributed Denial of Service (DDoS) attacks.
The SIP register injection attack, which might be injected during the commencement step by SIP equipped devices (SIP smartphones), prior to setting up the Secured Internet Protocol (IPsec) tunnel for the remaining SIP sessions, is of particular relevance, due to its characteristics of exhausting the available bandwidth, memory, and CPU resources, resulting in SIP device failure.
Consequently, there is a need to address this difficulty by building an SIP register injection attack detection and mitigation technique.
Prior to being processed by the Proxy Call Session Control Function.
The proposed scheme verifies each initial register request from User Equipment (UE) at the home network of Internet Protocol Multimedia Subsystems (IMS) and compares it to the incoming SIP register request pattern with those stored on the scheme's table (P-CSCF).
The proposed technique detects and drops every SIP register request with an abnormal pattern that is associated with an attack.
The method proved promising with detection accuracy of over 96.
67 percent, which is a solid potential as a preliminary setup towards the creation of a robust Real-time SIP detection and mitigation scheme for 5G networks.

Related Results

Dynamic contrast-enhanced MRI can quantitatively identify malignant transformation of sinonasal inverted papilloma
Dynamic contrast-enhanced MRI can quantitatively identify malignant transformation of sinonasal inverted papilloma
Objective: To investigate the diagnostic performance of quantitative and semi-quantitative parameters derived from dynamic contrast-enhanced MRI (DCE-MRI) in diff...
Overview of Key Zonal Water Injection Technologies in China
Overview of Key Zonal Water Injection Technologies in China
Abstract Separated layer water injection is the important technology to realize the oilfield long-term high and stable yield. Through continuous researches and te...
A Comparative Study of SIP Overload Control Algorithms
A Comparative Study of SIP Overload Control Algorithms
Recent collapses of SIP servers in the carrier networks indicates two potential problems of SIP: (1) the current SIP design does not easily scale up to large network sizes, and (2)...
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Signaling in Next Generation IP-based networks heavily relies in the family of multimedia signaling protocols defined by IETF. Two of these signaling protocols are RTSP and SIP, wh...
Design of P2P-SIP System Network Structure Based on JXTA
Design of P2P-SIP System Network Structure Based on JXTA
Session Initiation Protocol (SIP) is one of the most important signaling connection protocols in the field of VoIP (Voice over Internet Protocol). However, the existing SIP network...
Application of Novel Techniques to Fractured Injection Diagnostics in Waterflood Developments
Application of Novel Techniques to Fractured Injection Diagnostics in Waterflood Developments
Abstract Controlled injection at high rates predominantly under fracture regime has been identified at the onset of most waterflood field developments as being cruci...
Implementation of School Improvement Program in Secondary Schools in Assosa zone
Implementation of School Improvement Program in Secondary Schools in Assosa zone
Abstract Purpose: The purpose of this study was to assess the implementation of school improvement program (SIP) in secondary schools of Assosa zone. Methods: Descriptive s...
Control of Water Injection into a Layered Formation
Control of Water Injection into a Layered Formation
Abstract In previously published work, we have analyzed transient injection of water from a growing vertical hydrofracture into a low-permeability compressible rock ...

Back to Top