Overview of SIP Attacks and Countermeasures

被引:0
作者
El-moussa, Fadi [1 ]
Mudhar, Parmindher [2 ]
Jones, Andy [1 ,3 ]
机构
[1] Ctr Informat & Secur Res, Adastral Pk, Ipswich IP5 3RE, Suffolk, England
[2] Secur Design & Oper, Ipswich IP5 3RE, Suffolk, England
[3] Edith Cowan Univ, Ipswich IP5 3RE, Suffolk, England
来源
INFORMATION SECURITY AND DIGITAL FORENSICS | 2010年 / 41卷
关键词
SIP; Denial of Service; Authentication; Buffer overflow; SIP Injection; SPIT; Internet Telephony;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Security threats to current circuit switched networks dedicated to a single voice application such as the Public Switched Telephone Network (PSTN) are considered minimal. However, in open environments such as the Internet, conducting an attack on voice applications such as Voice over IP (VoIP) is much simpler. This is because VoIP services such as Session Initiation Protocol (SIP) are using servers that are reachable through the Internet. The aim of SIP is to provide the same functionality as traditional PSTN over the Internet. SIP service is implemented in either software or hardware and can suffer similar security threats as HTTP or any publicly available service on the Internet such as buffer overflow, injection attack, hijacking, etc. These attacks are simple to mount, with minimal charges or no cost to the attacker. This paper describes various possible security threats that a VoIP provider could encounter and the impact of these threats on the VoIP infrastructure. In addition, this paper investigates current solutions and mitigation techniques for VoIP attacks in order to provide more reliable VoIP services. The SIP taxonomy presented in the paper can be used as a baseline model to evaluate a SIP product against current and future vulnerabilities and gives a number of possible countermeasures that can be used to mitigate the threats.
引用
收藏
页码:82 / +
页数:3
相关论文
共 50 条
  • [1] Detecting Authentication Misuse Attacks Against SIP Entities
    Pourmohseni, Sajad
    Asgharian, Hassan
    Akbari, Ahmad
    2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
  • [2] Taxonomy of DoS Attacks and Their Countermeasures
    Ramanauskaite, Simona
    Cenys, Antanas
    OPEN COMPUTER SCIENCE, 2011, 1 (03) : 355 - 366
  • [3] A Distributed Infrastructure to Analyse SIP Attacks in the Internet
    Aziz, Adnan
    Hoffstadt, Dirk
    Rathgeb, Erwin
    Dreibholz, Thomas
    2014 IFIP NETWORKING CONFERENCE, 2014,
  • [4] RESEARCH ON DETECTING SIP MESSAGE FLOODING ATTACKS
    Sun, Qibo
    Qian, Shuang
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 278 - +
  • [5] Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems
    Ormazabal, Gaston
    Nagpal, Sarvesh
    Yardeni, Eilon
    Schulzrinne, Henning
    PRINCIPLES, SYSTEMS AND APPLICATIONS OF IP TELECOMMUNICATIONS: SERVICES AND SECURITY FOR NEXT GENERATION NETWORKS, 2008, 5310 : 107 - +
  • [6] A survey of attacks on web services: Classification and countermeasures
    Jensen, Meiko
    Gruschka, Nils
    Herkenhoener, Ralph
    COMPUTER SCIENCE-RESEARCH AND DEVELOPMENT, 2009, 24 (04): : 185 - 197
  • [7] Denial-of-service attacks and countermeasures on BitTorrent
    Lehmann, Matheus Brenner
    Santos, Flavio Roberto
    Gaspary, Luciano Paschoal
    Barcellos, Marinho Pilla
    COMPUTER NETWORKS, 2012, 56 (15) : 3479 - 3498
  • [8] Countermeasures against Distributed Denial of Service attacks
    Stefanidis, K.
    Serpanos, D. N.
    2005 IEEE INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2005, : 439 - 442
  • [9] Modeling Attacks and Efficient Countermeasures on Interpose PUF
    Adhithan, R. Raja
    Anandakumar, N. Nalla
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2020, 2021, 12637 : 149 - 162
  • [10] Attacks on Self-Driving Cars and Their Countermeasures: A Survey
    Chowdhury, Abdullahi
    Karmakar, Gour
    Kamruzzaman, Joarder
    Jolfaei, Alireza
    Das, Rajkumar
    IEEE ACCESS, 2020, 8 : 207308 - 207342