Leveraging countermeasures as a service for VoIP security in the cloud Oussema Dabbebi, * Remi Badonnel and Olivier Festor INRIA Nancy Grand Est, LORIAUniversity of Lorraine, Technopôle de Nancy Brabois, 54506 Vandœuvre-lès-Nancy, France SUMMARY The emergence of cloud computing is contributing to the integration of multiple services, in particular VoIP services. While the cloud has recently been used for performing security attacks targeting IP telephony, it also provides new opportunities for supporting the security of this service. In that context, we propose a risk management strategy for VoIP cloud based on security countermeasures that may be outsourced as services. We present the architecture of our solution and its components in the context of services implementing the SIP protocol. We describe the mathematical modelling supporting our approach and detail different treatment strategies for the application of countermeasures. Finally, we quantify the benets and limits of these strategies based on extensive simulation results. When a counter- measure fails, these strategies allow us to maintain the risk level low at an additional cost of up to 7%, or to accept an additional risk of up to 12%. They can also be combined to obtain a trade-off between cost and performance. Copyright © 2013 John Wiley & Sons, Ltd. Received 3 November 2012; Revised 2 September 2013; Accepted 22 October 2013 1. INTRODUCTION Cloud computing constitutes a new paradigm for supporting the delivery and access of computer resources in a virtual manner. It provides these resources as services at a large scale that are commitment-free and on-demand. The cloud offers a sufciently high abstraction level for allowing users to dynamically deploy and exploit elaborate infrastructures, platforms and applications based on these services. The development of high-speed broadband Internet access has contributed to the emergence of cloud computing. The growing interest and support of companies and organizations is motivated by the scalability, interoperability and exibility properties that enable cloud computing with respect to computer resources [1]. Four main deployment models are typically considered for cloud computing in the literature [2,3]. The rst model corresponds to private clouds which are exclusively provisioned for a single organization. The second model stands for community clouds where the infrastructure is restricted to a community of consumers. The third model corresponds to public clouds which are open to the general public. The last deployment model, hybrid clouds, is obtained by a composition of the preceding models. All these deployment models typically support a large variety of services and pose security challenges at various degree levels. Amongst these services, IP telephony has known an important development with the standardization of signalling protocols, such as the Session Initiation Protocol (SIP). It enables the establishment and transmission of voice communications directly over the IP layer. The cloud integration of this service increases its scalability and improves its maintenance [4]. VoIP services are, however, exposed to multiple security threats. These threats can be specic to the application layer (such as SIP malformed messages) or they can be inherited from the IP layer (such as ARP-based denial of service). They are *Correspondence to: Oussema Dabbebi, INRIA Nancy Grand Est, LORIAUniversity of Lorraine, Campus Scientique, BP 239, Technopôle de Nancy Brabois, 54506 Vandœuvre-lès-Nancy, France. E-mail: dabbebi@loria.fr INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2014; 24: 7084 Published online 25 December 2013 in Wiley Online Library (wileyonlinelibrary.com) DOI: 10.1002/nem.1853 Copyright © 2013 John Wiley & Sons, Ltd.