Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP

被引:4
|
作者
Chen, Zhe [1 ,2 ]
Guo, Shize [1 ,2 ]
Zheng, Kangfeng [1 ,2 ]
Li, Haitao [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, MOE, Key Lab Network & Informat Attack & Def Technol, Natl Engn Lab Disaster Backup & Recovery, Beijing 100088, Peoples R China
[2] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching, Natl Engn Lab Disaster Backup & Recovery, Beijing 100088, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
SIP; VoIP; MitM-DoS; Q-model; P-model;
D O I
10.1109/NSWCTC.2009.326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the number of VoIP users increase and as the deployment of SIP devices gains ground, security has risen as a potential issue worthy of our consideration. VoIP is an application running on the data network and as such, inherits the security issues common to IP. The Man-in-the-Middle (MitM) attacks and the denial of service (DoS) attacks are the hackneyed and evil cyberattacks in the IP which can be easily implemented in the SIP VoIP. In this paper, a unified communication model of SIP VoIP infrastructure is established to analyze the DoS attacks launched by the MUM (MitM-DoS). Then we use the set theory to research the models of MitM-DoS attacks formally.
引用
收藏
页码:263 / +
页数:2
相关论文
共 50 条
  • [21] Deniable Authentication Protocol Resisting Man-in-the-Middle Attack
    Han, Song
    Liu, Wanquan
    Chang, Elizabeth
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 161 - 164
  • [22] Analyzing the technique of a man-in-the-middle attack based on Bluetooth
    Qin, Xiang-Lin
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (08): : 1159 - 1162
  • [23] Detecting Man-in-the-Middle Attack in Fog Computing for Social Media
    Aliyu, Farouq
    Sheltami, Tarek
    Mahmoud, Ashraf
    Al-Awami, Louai
    Yasar, Ansar
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1159 - 1181
  • [24] Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution
    Alhazmi, Shatha
    Kandel, Prashanna
    Sabovik, Jayne
    Matondo-Mvula, Nadine
    Elleithy, Khaled
    2023 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, LISAT, 2023,
  • [25] Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack
    Arnaldy, Defiana
    Perdana, Audhika Rahmat
    2019 2ND INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2019): ARTIFICIAL INTELLIGENCE ROLES IN INDUSTRIAL REVOLUTION 4.0, 2019, : 188 - 192
  • [26] Nino Man-In-The-Middle attack on Bluetooth Secure Simple Pairing
    Hypponen, Konstantin
    Haataja, Keijo M. J.
    2007 THIRD IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET, 2007, : 64 - 68
  • [27] Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing
    Hao, Guo
    Tao, Guo
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2009, 5 (03): : 131 - 134
  • [28] A self-confirming engine for preventing man-in-the-middle attack
    Kanamori, M
    Kobayashi, T
    Yamaguchi, S
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (03) : 530 - 538
  • [29] Comprehensive Demonstration of Man-in-the-Middle Attack in PDC and PMU Network
    Swain, Kamakshi Prashadini
    Tiwari, Amit
    Sharma, Ankush
    Chakrabarti, Saikat
    Karkare, Amey
    2022 22ND NATIONAL POWER SYSTEMS CONFERENCE, NPSC, 2022,
  • [30] Live Demonstration: Man-in-the-Middle Attack on Edge Artificial Intelligence
    Hu, Bowen
    He, Weiyang
    Wang, Si
    Liu, Wenye
    Chang, Chip-Hong
    2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,