Overview of SIP Attacks and Countermeasures

被引:0
|
作者
El-moussa, Fadi [1 ]
Mudhar, Parmindher [2 ]
Jones, Andy [1 ,3 ]
机构
[1] Ctr Informat & Secur Res, Adastral Pk, Ipswich IP5 3RE, Suffolk, England
[2] Secur Design & Oper, Ipswich IP5 3RE, Suffolk, England
[3] Edith Cowan Univ, Ipswich IP5 3RE, Suffolk, England
关键词
SIP; Denial of Service; Authentication; Buffer overflow; SIP Injection; SPIT; Internet Telephony;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Security threats to current circuit switched networks dedicated to a single voice application such as the Public Switched Telephone Network (PSTN) are considered minimal. However, in open environments such as the Internet, conducting an attack on voice applications such as Voice over IP (VoIP) is much simpler. This is because VoIP services such as Session Initiation Protocol (SIP) are using servers that are reachable through the Internet. The aim of SIP is to provide the same functionality as traditional PSTN over the Internet. SIP service is implemented in either software or hardware and can suffer similar security threats as HTTP or any publicly available service on the Internet such as buffer overflow, injection attack, hijacking, etc. These attacks are simple to mount, with minimal charges or no cost to the attacker. This paper describes various possible security threats that a VoIP provider could encounter and the impact of these threats on the VoIP infrastructure. In addition, this paper investigates current solutions and mitigation techniques for VoIP attacks in order to provide more reliable VoIP services. The SIP taxonomy presented in the paper can be used as a baseline model to evaluate a SIP product against current and future vulnerabilities and gives a number of possible countermeasures that can be used to mitigate the threats.
引用
收藏
页码:82 / +
页数:3
相关论文
共 50 条
  • [1] An Overview of Content Poisoning in NDN Attacks, Countermeasures, and Direction
    Im, Hyeonseung
    Kim, Dohyung
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (07): : 2904 - 2918
  • [2] An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities
    Demertzi, Vasiliki
    Demertzis, Stavros
    Demertzis, Konstantinos
    APPLIED SCIENCES-BASEL, 2023, 13 (02):
  • [3] Unregister attacks in SIP
    Bremler-Barr, Anat
    Halachmi-Bekel, Ronit
    Kangasharju, Jussi
    2006 SECOND WORKSHOP ON SECURE NETWORK PROTOCOLS (NPSEC), 2006, : 32 - +
  • [4] Combined Attacks and Countermeasures
    Vetillard, Eric
    Ferrari, Anthony
    SMART CARD RESEARCH AND ADVANCED APPLICATION, PROCEEDINGS, 2010, 6035 : 133 - 147
  • [5] Countermeasures to Security Threats/Attacks on Different Protocol Layers in Cognitive Radio Networks: An Overview
    Raj, Shekhar
    Sahu, O. P.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 1076 - 1082
  • [6] Attacks and countermeasures in the internet of vehicles
    Sun, Yunchuan
    Wu, Lei
    Wu, Shizhong
    Li, Shoupeng
    Zhang, Tao
    Zhang, Li
    Xu, Junfeng
    Xiong, Yongping
    Cui, Xuegang
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (5-6) : 283 - 295
  • [8] Power analysis attacks and countermeasures
    Popp, Thomas
    Mangard, Stefan
    Oswald, Elisabeth
    IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 535 - 543
  • [9] DDoS Attacks and Countermeasures in Cyberspace
    Zeb, Khan
    Baig, Owais
    Asif, Muhammad Kamran
    2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [10] Securing MAODV: Attacks and countermeasures
    Roy, S
    Addada, VG
    Setia, S
    Jajodia, S
    2005 SECOND ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2005, : 521 - 532