2012 11th International Conference on Machine Learning and Applications 2012
DOI: 10.1109/icmla.2012.109
|View full text |Cite
|
Sign up to set email alerts
|

On the Use of SVMs to Detect Anomalies in a Stream of SIP Messages

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…firewalls) [18], learning techniques [19], and/or identification of deviations from a priori statistics [9]. In [10] supportvector-machine classifiers were adopted to label incoming SIP messages as good or bad. A SIP message lexical analysis was developed to filter the messages that are not formed according to the standard and in a second stage a semantic filter was applied to the stream of the surviving messages to remove syntactic errors.…”
Section: B Sip Vulnerabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…firewalls) [18], learning techniques [19], and/or identification of deviations from a priori statistics [9]. In [10] supportvector-machine classifiers were adopted to label incoming SIP messages as good or bad. A SIP message lexical analysis was developed to filter the messages that are not formed according to the standard and in a second stage a semantic filter was applied to the stream of the surviving messages to remove syntactic errors.…”
Section: B Sip Vulnerabilitiesmentioning
confidence: 99%
“…Machine learning has also being adopted in the telecommunications arena [7], [8], as it can bring many advantages in the processing of bulks of data that are generated by a plethora of different sources. Multiple tools have already been proposed to prevent SIP attacks caused by SIP message payload tampering [9], [10], and SIP message flooding [11], [12]. However, the attacks caused by SIP message flow tampering, a.k.a.…”
Section: Introductionmentioning
confidence: 99%
“…Tang et al [21] also use the Hellinger distance in conjunction with the sketch data structure to detect flooding attacks. Ferdous et al [11] present a two-stage filter wherein the first stage runs a lexical analyzer to determine the validity of the SIP message and the second stage identifies messages that differ in structure or content from previously known good messages.…”
Section: Related Workmentioning
confidence: 99%
“…However, the features used in these systems will not detect mimicry attacks launched by carefully crafted anomalous SIP messages of the form we study in this paper. Ferdous et al [19] use support vector machines to classify SIP messages, but their definition of anomalous messages consists of fairly coarse deviations from normal messages such that IDS are capable of filtering such anomalous messages. As we show in Section III, our anomalous messages bypass intrusion detection systems.…”
Section: Related Workmentioning
confidence: 99%