Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP

被引:4
|
作者
Chen, Zhe [1 ,2 ]
Guo, Shize [1 ,2 ]
Zheng, Kangfeng [1 ,2 ]
Li, Haitao [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, MOE, Key Lab Network & Informat Attack & Def Technol, Natl Engn Lab Disaster Backup & Recovery, Beijing 100088, Peoples R China
[2] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching, Natl Engn Lab Disaster Backup & Recovery, Beijing 100088, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
SIP; VoIP; MitM-DoS; Q-model; P-model;
D O I
10.1109/NSWCTC.2009.326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the number of VoIP users increase and as the deployment of SIP devices gains ground, security has risen as a potential issue worthy of our consideration. VoIP is an application running on the data network and as such, inherits the security issues common to IP. The Man-in-the-Middle (MitM) attacks and the denial of service (DoS) attacks are the hackneyed and evil cyberattacks in the IP which can be easily implemented in the SIP VoIP. In this paper, a unified communication model of SIP VoIP infrastructure is established to analyze the DoS attacks launched by the MUM (MitM-DoS). Then we use the set theory to research the models of MitM-DoS attacks formally.
引用
收藏
页码:263 / +
页数:2
相关论文
共 50 条
  • [1] Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation
    Mitev, Miroslav
    Chorti, Arsenia
    Belmega, E. Veronica
    Reed, Martin
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [2] Man-in-the-middle and denial of service attacks in wireless secret key generation
    Mitev, Miroslav
    Chorti, Arsenia
    Belmega, E. Veronica
    Reed, Martin
    Proceedings - IEEE Global Communications Conference, GLOBECOM, 2019,
  • [3] Research on User Authentication Scheme against the Man-in-the-Middle Attack
    Zhou, Xiancun
    Xiong, Yan
    Liu, Renjin
    INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 1 - 8
  • [4] Optimal Man-In-The-Middle Stealth Attack
    Faramondi, Luca
    Oliva, Gabriele
    Setola, Roberto
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2021, 2021, 13139 : 44 - 59
  • [5] Man-in-the-Middle Attack in HTTP/2
    Patni, Parth
    Iyer, Kartik
    Sarode, Rohan
    Mali, Amit
    Nimkar, Anant
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [6] Man-in-the-Middle Attack to the HTTPS Protocol
    Callegati, Franco
    Cerroni, Walter
    Ramilli, Marco
    IEEE SECURITY & PRIVACY, 2009, 7 (01) : 78 - 81
  • [7] Two layer denial of service prevention on SIP VoIP infrastructures
    Ehlert, Sven
    Zhang, Ge
    Geneiatakis, Dimitris
    Kambourakis, Georgios
    Dagiuklas, Tasos
    Markl, Jiri
    Sisalem, Dorgham
    COMPUTER COMMUNICATIONS, 2008, 31 (10) : 2443 - 2456
  • [8] Modeling of Man-in-the-Middle Attack in the Wireless Networks
    Chen, Zhe
    Guo, Shize
    Zheng, Kangfeng
    Yang, Yixian
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2255 - 2258
  • [9] Using SIP Identity to prevent Man-in-the-Middle Attacks on ZRTP
    Jung, Oliver
    Petraschek, Martin
    Hoeher, Thomas
    Gojmerac, Ivan
    2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 480 - 484
  • [10] On the Security of HB# against a Man-in-the-Middle Attack
    Ouafi, Khaled
    Overbeck, Raphael
    Vaudenay, Serge
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124