by sending the prover a challenge which the prover is
expected to return back. Cookies (Aura and Nikander,
1997) could be used here to dispense the verifier from
maintaining state.
In all the authentication mechanisms defined in
H.235 there is an asymmetry between the minimal ef-
fort required of the attacker to commit the receiving
process to a greater amount of work. One general ap-
proach to address this asymmetry lies in increasing
the resources that the attacker must commit before
the receiving process commits processing or storage
resources of its own (Aura et al., 2000).
7 SUMMARY
In this paper we have identified the types of host be-
haviour that may indicate a susceptibility to various
denial of service attacks. The broad categories of
flooding and non-flooding attacks allow us to classify
the behaviours which lead to these types of attack. In
each case, attacks are most likely when the host re-
ceiving a message performs actions without authenti-
cating it. However authentication mechanisms must
be carefully designed so as not introduce new vulner-
abilities themselves.
Network level vulnerabilities present a range of se-
rious threats to VoIP system availability. Flooding
attacks are particularly potent due to the source ad-
dress spoofing vulnerability in IPv4. Source spoofing
in private networks can be addressed in a number of
ways including careful IP network design combined
with filtering, and providing trusted MAC address to
IP address binding. Where this binding is present,
flooding attacks may be filtered at the transport layer,
potentially the most efficient point to perform filter-
ing. Transport layer filtering combined with intrusion
detection is proposed as an area of future research.
This approach allows H.323 entities to be self defend-
ing against both network and application layer flood-
ing attacks.
Importantly, this paper has also identified vulnera-
bilities in application level protocol messages that are
exchanged between H.323 entities. We have investi-
gated the problems associated with the weak or non-
existent authentication mechanisms present in unse-
cured H.323 implementations. We have also de-
scribed how the security mechanisms specified in the
H.235 standard (optionally implemented by H.323
entities) assist in preventing DoS activities which rely
on weak or non-existent authentication. These au-
thentication mechanisms specified in H.235, however,
introduce new vulnerabilities. We have discussed
such vulnerabilities as well as promising research di-
rections that may help in mitigating them.
REFERENCES
Aura, T. (2000). Authorization and Availability: Aspects of
Open Network Security. PhD thesis, Helsinki Univer-
sity of Technology.
Aura, T. and Nikander, P. (1997). Stateless connec-
tions. In Proc. International Conference on Informa-
tion and Communications Security (ICICS’97), LNCS
1334:87–97. Springer.
Aura, T., Nikander, P., and Leiwo, J. (2000). DOS-resistant
authentication with client puzzles. In Proc. Secu-
rity Protocols Workshop 2000, LNCS 2133:170–181.
Springer.
Bernstein, D. (1996). Syn cookies.
http://cr.yp.to/syncookies.html. Last access date:
10 June, 2004.
Center, C. C. (1997). Denial of Service Attacks.
http://www.cert.org/tech
tips/denial of service.html.
Last accessed: 10 June 2004.
Harris, B. and Hunt, R. (1999). TCP/IP security threats and
attack methods. Computer Communications, 22:885–
897. Elsevier Science.
Hussain, A., Heidemann, J., and Papadopoulos, C. (2003).
A framework for classifying denial of service attacks.
In Applications, technologies, architectures, and pro-
tocols for computer communications, pages 99–110.
ACM Press.
ITU-T (2003a). Call signalling protocols and media stream
packetization for packet-based multimedia communi-
cation systems. Recommendation H.225.0, ITU.
ITU-T (2003b). Control protocol for multimedia communi-
cation. Recommendation H.245, ITU.
ITU-T (2003c). Packet-based multimedia communications
systems. Recommendation H.323, ITU.
ITU-T (2003d). Security and encryption for H-series
(H.323 and other H.245-based) multimedia terminals.
Recommendation H.235, ITU.
Leiwo, J., Nikander, P., and Aura, T. (2000). Towards net-
work denial of service resistant protocols. In Inter-
national Information Security Conference (IFIP/SEC
2000).
Meadows, C. (1999). A formal framework and evaluation
method for network denial of service. In PCSFW:
Proceedings of The 12th Computer Security Founda-
tions Workshop. IEEE Computer Society Press.
Millen, J. K. (1992). A resource allocation model for denial
of service. In Proceedings of the IEEE Symposium on
Security and Privacy, pages 137–147.
Needham, R. M. (1994). Denial of service: an example.
Communications of the ACM, 37(11):42–46.
Schuba, C. L., Krsul, I. V., Kuhn, M. G., Spafford, E. H.,
Sundaram, A., and Zamboni, D. (1997). Analysis of a
denial of service attack on TCP. In Proceedings IEEE
Symposium on Security and Privacy, pages 208–223.
IEEE Computer Society Press.
DENIAL OF SERVICE ISSUES IN VOICE OVER IP NETWORKS
237