4th International ICST Conference on Security and Privacy in Communication Networks

Research Article

On The Performance of a Hybrid Intrusion Detection Architecture for Voice over IP Systems

  • @INPROCEEDINGS{10.1145/1460877.1460902,
        author={Bazara Barry and H. Chan},
        title={On The Performance of a Hybrid Intrusion Detection Architecture for Voice over IP Systems},
        proceedings={4th International ICST Conference on Security and Privacy in Communication Networks},
        publisher={ACM},
        proceedings_a={SECURECOMM},
        year={2008},
        month={9},
        keywords={Intrusion detection VoIP hybrid detection performance evaluation},
        doi={10.1145/1460877.1460902}
    }
    
  • Bazara Barry
    H. Chan
    Year: 2008
    On The Performance of a Hybrid Intrusion Detection Architecture for Voice over IP Systems
    SECURECOMM
    ACM
    DOI: 10.1145/1460877.1460902
Bazara Barry1,*, H. Chan1,*
  • 1: University of Cape Town Department of Electrical Engineering Rondebosch, 7701 +27216502813
*Contact email: barry@crg.ee.uct.ac.za, h.a.chan@ieee.org

Abstract

Voice over IP (VoIP) environments pose challenging threats to Intrusion Detection Systems (IDSs). Services over VoIP systems are provided by multiple interacting protocols, each with its own vulnerabilities. This scheme could result in novel and more complex attacks, and requires cross-protocol aware IDSs. Furthermore, VoIP devices may suffer a full or partial service loss if the syntax or semantics of the aforementioned protocols are violated. Usually, a single detection approach is suited to identify a subset of the security violations to which a system is subject in VoIP environments. Therefore, a hybrid approach that combines the strengths and avoids the weaknesses of various approaches is needed. In this paper, we discuss the performance and the detection accuracy of a hybrid, host-based intrusion detection system suitable for VoIP environments. Our system has two combined detection modules, namely, a specification-based and a signature-based module. Both modules use State Machines and State Transition Analysis Techniques to model proper protocols’ behaviors and potential attacks. Both modules address the issues related to syntax and semantics anomaly detection for the monitored protocols. In addition, our architecture provides a cross-protocol framework for various protocols to exchange useful detection information in real time. We implement our proposed architecture in a network simulator, alongside implementing a variety of attacks to test the credibility of the design. The implemented IDS shows an excellent detection accuracy, and low runtime impact on the performance of the VoIP system.