Abstract:
PURPOSE: A SIP(Session Initiation Protocol) cancel flooding attack detection method and an apparatus thereof are provided to performing SIP(Session Initiation Protocol) cancel flooding attack detection that reflects a network situation in real time. CONSTITUTION: A threshold value generating unit(10) obtains a possible threshold value of a cancel message number at a present unit time. A weighted average generating unit(11) obtains a weighted cancel message number at the present unit time using a number of weight average cancel messages before the present unit time. An attack decision unit(12) compares the threshold value of the cancel message number to weighted cancel message number at the present unit time. The attack decision unit determines cancel message flooding at the present unit time.
Abstract:
Disclosed are an apparatus and a method for counteracting against SIP service denial attack using a bloom filter. An apparatus for counteracting against SIP service denial attack according to an embodiment of the present invention comprises a whitelist management unit for forming a whitelist by recording session information of a corresponding session in a bloom filter when the session is normally constructed using a session initiation protocol (SIP) server; an attack detection unit for detecting the occurrence of the SIP service denial attack based on how many times the whitelist does not include the session information included in each of SIP messages loaded into the SIP server from a network in a unit time period; and a filtering unit for filtering the SIP message loaded into the SIP server after the attack is occurred according to the existence of the session information in the SIP message loaded into the SIP server after the SIP service denial attack is occurred in the whitelist. [Reference numerals] (10) SIP service denial attack counteracting device; (11) White list management unit; (12) White list configuration unit; (13) White list; (14) Attack detection unit; (15) Calculation unit; (16) Attack determination unit; (17) Selecting operation control unit; (18) Selecting unit; (19) White list request unit; (20) Attack message determination unit; (21) Selection control unit; (30) SIP server; (AA) SIP message
Abstract:
PURPOSE: A SIP(Session Initiation Protocol) BYE flooding attack detection method and apparatus thereof are provided to perform SIP BYE flooding attack detection by reflecting a network situation in real time. CONSTITUTION: A threshold generating unit(10) obtains a possible threshold value of a BYE message number from a present unit time. A weighted average generating unit obtains the average BYE message numbers at the present unit time by using a weighted average BYE message number at a previous unit time of the present unit time and the number of deduced BYE messages. An attack decision unit(12) determines whether or not to compare the threshold value of the BYE message number to the following weighting average BYE message number at the present unit time. The attack decision unit determines a BYE message flooding attack at the present unit time.
Abstract:
SIP BYE 플러딩 공격 탐지 방법 및 장치가 개시된다. 본 발명의 실시예에 따른 SIP BYE 플러딩 공격 탐지 방법은, 현재 단위시간에서 진행중인 SIP 세션 INVITE 요청 수를 이용하여 현재 단위시간에서 발생 가능한 BYE 메시지 수를 도출하는 단계; 설정 시간 내에 SIP 세션 INVITE 요청에 대한 응답을 받지 못해 SIP 세션 요청을 재전송하는 비율과 상기 도출된 BYE 메시지 수를 이용하여 현재 단위시간에서 발생 가능한 BYE 메시지 수의 임계치 값을 구하는 단계; 상기 도출된 BYE 메시지의 수와 현재 단위 시간의 이전 단위시간에서의 가중평균 BYE 메시지 수를 이용하여 현재 단위 시간에서의 가중 평균 BYE 메시지 수를 구하는 단계; 및 상기 현재 단위 시간의 가중 평균 BYE 메시지 수와 현재 단위시간에서 BYE 메시지 수의 임계치 값을 비교하여, 현재 단위시간에서의 BYE 메시지 플로딩 공격 여부를 결정하는 단계를 포함한다. SIP BYE 플러딩 공격
Abstract:
PURPOSE: A maximum value determination method of a generation message and SIP INVITE flooding attacks detection method are provided to accurately detect SIP INVITE flooding attack by using the maximum value of a generation message. CONSTITUTION: The number of weighted average basis messages is calculated by determined message maximum value(S20). The number of weighted average basis messages is compared with the maximum value of generable messages. A critical value which indicates an attack state is compared with threshold value which indicates an alarm state(S31, S32). A normal state, the attack state, and the alarm state are detected according to a comparison result.