Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP

被引:4
|
作者
Chen, Zhe [1 ,2 ]
Guo, Shize [1 ,2 ]
Zheng, Kangfeng [1 ,2 ]
Li, Haitao [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, MOE, Key Lab Network & Informat Attack & Def Technol, Natl Engn Lab Disaster Backup & Recovery, Beijing 100088, Peoples R China
[2] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching, Natl Engn Lab Disaster Backup & Recovery, Beijing 100088, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
SIP; VoIP; MitM-DoS; Q-model; P-model;
D O I
10.1109/NSWCTC.2009.326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the number of VoIP users increase and as the deployment of SIP devices gains ground, security has risen as a potential issue worthy of our consideration. VoIP is an application running on the data network and as such, inherits the security issues common to IP. The Man-in-the-Middle (MitM) attacks and the denial of service (DoS) attacks are the hackneyed and evil cyberattacks in the IP which can be easily implemented in the SIP VoIP. In this paper, a unified communication model of SIP VoIP infrastructure is established to analyze the DoS attacks launched by the MUM (MitM-DoS). Then we use the set theory to research the models of MitM-DoS attacks formally.
引用
收藏
页码:263 / +
页数:2
相关论文
共 50 条
  • [31] Different Flavours of Man-In-The-Middle Attack, Consequences and Feasible Solutions
    Nayak, Gopi Nath
    Samaddar, Shefalika Ghosh
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 491 - 495
  • [32] 论Man-in-the-Middle Attack对“云”资源威胁
    王天明
    网络安全技术与应用, 2012, (02) : 37 - 39
  • [33] On Man-in-the-Middle Attack Risks of the VPN Gate Relay System
    Sun, Yunxiao
    Wang, Bailing
    Wang, Chao
    Wei, Yuliang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [34] Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack
    Li, Xiaohong
    Li, Shuxin
    Hao, Jianye
    Feng, Zhiyong
    An, Bo
    THIRTY-FIRST AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 593 - 599
  • [35] Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System
    Oh, Sangkyo
    Chung, Hyunji
    Lee, Sangjin
    Lee, Kyungho
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 1 - 8
  • [36] A Mutation-Enabled Proactive Defense Against Service-Oriented Man-in-The-Middle Attack in Kubernetes
    Ma, Tengchao
    Xu, Changqiao
    Yang, Shujie
    Huang, Yiting
    An, Qingzhao
    Kuang, Xiaohui
    Grieco, Luigi Alfredo
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (07) : 1843 - 1856
  • [37] The Man-in-the-Middle Defence
    Anderson, Ross
    Bond, Mike
    SECURITY PROTOCOLS, 2009, 5087 : 153 - 156
  • [38] Man-in-the-Middle Attack on "Quantum Dialogue with Authentication Based on Bell States"
    Lin, Tzu-Han
    Lin, Ching-Ying
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52 (09) : 3199 - 3203
  • [39] Quantum man-in-the-middle attack on the calibration process of quantum key distribution
    Fei, Yang-Yang
    Meng, Xiang-Dong
    Gao, Ming
    Wang, Hong
    Ma, Zhi
    SCIENTIFIC REPORTS, 2018, 8
  • [40] Man-in-the-middle Attack on BB84 Protocol and its Defence
    Wang Yong
    Wang Huadeng
    Li Zhaohong
    Huang Jinxiang
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 433 - 434