Overview of SIP Attacks and Countermeasures

被引:0
|
作者
El-moussa, Fadi [1 ]
Mudhar, Parmindher [2 ]
Jones, Andy [1 ,3 ]
机构
[1] Ctr Informat & Secur Res, Adastral Pk, Ipswich IP5 3RE, Suffolk, England
[2] Secur Design & Oper, Ipswich IP5 3RE, Suffolk, England
[3] Edith Cowan Univ, Ipswich IP5 3RE, Suffolk, England
关键词
SIP; Denial of Service; Authentication; Buffer overflow; SIP Injection; SPIT; Internet Telephony;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Security threats to current circuit switched networks dedicated to a single voice application such as the Public Switched Telephone Network (PSTN) are considered minimal. However, in open environments such as the Internet, conducting an attack on voice applications such as Voice over IP (VoIP) is much simpler. This is because VoIP services such as Session Initiation Protocol (SIP) are using servers that are reachable through the Internet. The aim of SIP is to provide the same functionality as traditional PSTN over the Internet. SIP service is implemented in either software or hardware and can suffer similar security threats as HTTP or any publicly available service on the Internet such as buffer overflow, injection attack, hijacking, etc. These attacks are simple to mount, with minimal charges or no cost to the attacker. This paper describes various possible security threats that a VoIP provider could encounter and the impact of these threats on the VoIP infrastructure. In addition, this paper investigates current solutions and mitigation techniques for VoIP attacks in order to provide more reliable VoIP services. The SIP taxonomy presented in the paper can be used as a baseline model to evaluate a SIP product against current and future vulnerabilities and gives a number of possible countermeasures that can be used to mitigate the threats.
引用
收藏
页码:82 / +
页数:3
相关论文
共 50 条
  • [21] semantic web attacks and countermeasures
    Kumar, Sumit
    Kumar, Suresh
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,
  • [22] Detecting DoS attacks on SIP systems
    Chen, Eric Y.
    VoIP MaSe 06: 1st IEEE Workshop on VoIP Management and Security: SECURING AND MANAGING VOIP COMMUNICATIONS, 2006, : 53 - 58
  • [23] Leakuidator: Leaky Resource Attacks and Countermeasures
    Zaheri, Mojtaba
    Curtmola, Reza
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT II, 2021, 399 : 143 - 163
  • [24] DoS Attacks and Countermeasures on Network Devices
    Wang, Qian
    Dunlap, Timothy
    Cho, Youngho
    Qu, Gang
    2017 26TH WIRELESS AND OPTICAL COMMUNICATION CONFERENCE (WOCC), 2017,
  • [25] Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures
    Zhang, Menghao
    Li, Guanyu
    Xu, Lei
    Bi, Jun
    Gu, Guofei
    Bai, Jiasong
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 : 161 - 183
  • [26] Analysis of Cloud Computing Attacks and Countermeasures
    Jabir, Raja Mohamed
    Khanji, Salam Ismail Rasheed
    Ahmad, Liza Abdallah
    Alfandi, Omar
    Said, Huwida
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 117 - 123
  • [27] Attacks on digital audio watermarks and countermeasures
    Arnold, M
    THIRD INTERNATIONAL CONFERENCE ON WEB DELIVERING OF MUSIC, PROCEEDINGS, 2003, : 55 - 62
  • [28] DDoS attacks in WSNs: detection and countermeasures
    Abidoye, Ademola P.
    Obagbuwa, Ibidun C.
    IET WIRELESS SENSOR SYSTEMS, 2018, 8 (02) : 52 - 59
  • [29] Advances in Side Channel Attacks and Countermeasures
    Wang Y.-J.
    Fan H.-P.
    Dai Z.-Y.
    Yuan Q.-J.
    Wang X.-B.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (01): : 202 - 228
  • [30] Cache attacks and countermeasures: The case of AES
    Osvik, DA
    Shamir, A
    Tromer, E
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 1 - 20