suite. Furthermore we have developed our own
specific malformed message attack tool. We
measure the overhead, during an attack, in terms of
the introduced latency for the users. Moreover, we
assess the memory consumption on the server side.
Test results confirm that the open IMS platform is
robust against attacks launched through the
PROTOS testing suite, while it is not for attacks
launched through the developed tool. The end-to-
end delay increases in a range between 300% and
4000%, while there is additional memory
consumption of approximately 25%.
The rest of the paper is structured as follows. In
Section 2 we present background information with
regard to IMS architecture, and malformed message
attacks. In Section 3 we evaluate the robustness of
Open IMS system against malformed message
attacks and we discuss the evaluation results.
Finally, in Section 4 we conclude the paper
providing some pointers for future work.
2 BACKGROUND
2.1 IP Multimedia Subsystem
The core of IMS architecture according to (3GPP
2008) consists of the following network elements:
• Proxy Call Session Control Function (CSCF)
(P-CSCF) that handles and routes all signaling
information (requests and responses) to the
appropriate network element for additional
processing depending on the type of signaling
information and the kind of the service.
• Interrogating CSCF (I-CSCF) ensures
communication with users’ home network,
acting as a proxy at the edge of the service
provider network. It communicates with the
Home Subscriber Server (HSS), over the
diameter protocol in order to assign a Serving
CSCF responsible to serve the corresponding
UE.
• Serving CSCF (S-CSCF) manages (statefully)
multimedia sessions and handles users’
authentication: It contacts the HSS to retrieve
the authentication vectors and user profiles.
• Home Subscriber Server administers users’
profile, location, security and any additional
information required for the service provision.
Considering that IMS network elements are logical
entities they can be deployed under the same
physical network element. The communication
amongst IMS network elements is based on SIP.
Figure 1 illustrates a high level IMS network
architecture.
2.2 Malformed Message Attacks in
IMS
Protocols, among others, define specific rules and
grammars for their messages. For the scope of this
work any message violating the protocol’s
definitions is defined as ‘malformed’. As already
mentioned, IMS relies on SIP for session
management. Consequently, malicious users may try
to exploit SIP messages in order to launch a
malformed message attack, similar to the
conventional SIP-based services (Wieser and
Laakso, 2003), (Dimitris Geneiatakis et al., 2007).
Figure 1: IMS core network architecture. Users contact P-
CSCF in every request, which is responsible to contact I-
CSCF to locate user’s home network.
The freedom of SIP message structure (according
to the SIP grammar) and its text format, offer to
malicious users the chance to develop numerous non
SIP conformed messages. For instance, a malicious
user might not include values in the mandatory
fields of a SIP message, or include inappropriate
values, or even craft a message composed of lengthy
optional information in order to cause buffer
overflow.
In another example a malicious user may insert
multiple or NULL headers, in order to introduce
delays in routing decisions or other unexpected
incidents affecting system’s availability.
Furthermore, the latter user may also craft such a
message by inserting malformed UTF8 sequences in
header fields or by overflowing the messages with
special characters. Figure 2 depicts different
examples of malformed messages. Note that the
target of a malicious user can be any of the IMS
components or even a traditional networking
communication component that IMS interconnects
with NGN.
SECRYPT 2011 - International Conference on Security and Cryptography
276