Overview of SIP Attacks and Countermeasures

被引:0
作者
El-moussa, Fadi [1 ]
Mudhar, Parmindher [2 ]
Jones, Andy [1 ,3 ]
机构
[1] Ctr Informat & Secur Res, Adastral Pk, Ipswich IP5 3RE, Suffolk, England
[2] Secur Design & Oper, Ipswich IP5 3RE, Suffolk, England
[3] Edith Cowan Univ, Ipswich IP5 3RE, Suffolk, England
来源
INFORMATION SECURITY AND DIGITAL FORENSICS | 2010年 / 41卷
关键词
SIP; Denial of Service; Authentication; Buffer overflow; SIP Injection; SPIT; Internet Telephony;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Security threats to current circuit switched networks dedicated to a single voice application such as the Public Switched Telephone Network (PSTN) are considered minimal. However, in open environments such as the Internet, conducting an attack on voice applications such as Voice over IP (VoIP) is much simpler. This is because VoIP services such as Session Initiation Protocol (SIP) are using servers that are reachable through the Internet. The aim of SIP is to provide the same functionality as traditional PSTN over the Internet. SIP service is implemented in either software or hardware and can suffer similar security threats as HTTP or any publicly available service on the Internet such as buffer overflow, injection attack, hijacking, etc. These attacks are simple to mount, with minimal charges or no cost to the attacker. This paper describes various possible security threats that a VoIP provider could encounter and the impact of these threats on the VoIP infrastructure. In addition, this paper investigates current solutions and mitigation techniques for VoIP attacks in order to provide more reliable VoIP services. The SIP taxonomy presented in the paper can be used as a baseline model to evaluate a SIP product against current and future vulnerabilities and gives a number of possible countermeasures that can be used to mitigate the threats.
引用
收藏
页码:82 / +
页数:3
相关论文
共 50 条
  • [21] Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony
    Akbar, Muhammad Ali
    Farooq, Muddassar
    KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 38 (02) : 491 - 510
  • [22] Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes
    Wu, Yongdong
    Weng, Jian
    Wang, Zhengxia
    Wei, Kaimin
    Wen, Jinming
    Lai, Junzuo
    Li, Xin
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1744 - 1755
  • [23] Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony
    Muhammad Ali Akbar
    Muddassar Farooq
    Knowledge and Information Systems, 2014, 38 : 491 - 510
  • [24] A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects
    Kuang, Boyu
    Fu, Anmin
    Susilo, Willy
    Yu, Shui
    Gao, Yansong
    COMPUTERS & SECURITY, 2022, 112
  • [25] Hijacking of unmanned surface vehicles: A demonstration of attacks and countermeasures in the field
    Solnor, Petter
    Volden, Oystein
    Gryte, Kristoffer
    Petrovic, Slobodan
    Fossen, Thor, I
    JOURNAL OF FIELD ROBOTICS, 2022, 39 (05) : 631 - 649
  • [26] Security of SIP-Based Infrastructure against Malicious Message Attacks
    Shrestha, Ajay Kumar
    8TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT AND APPLICATIONS (SKIMA 2014), 2014,
  • [27] Survey of Countering DoS/DDoS Attacks on SIP Based VoIP Networks
    Nazih, Waleed
    Elkilani, Wail S.
    Dhahri, Habib
    Abdelkader, Tamer
    ELECTRONICS, 2020, 9 (11) : 1 - 21
  • [28] A Distributed Cooperative Detection Scheme for SPIT Attacks in SIP Based Systems
    Gazdar, Achraf
    Langar, Zeineb
    Belghith, Abdelfettah
    2012 THIRD INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2012, : 125 - 129
  • [29] A Survey on Security of Unmanned Aerial Vehicle Systems: Attacks and Countermeasures
    Wei, Xiaomin
    Ma, Jianfeng
    Sun, Cong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (21): : 34826 - 34847
  • [30] Simulation Analysis of DoS, MITM and CDP Security Attacks and Countermeasures
    Tanceska, Biljana
    Bogdanoski, Mitko
    Risteski, Aleksandar
    FUTURE ACCESS ENABLERS FOR UBIQUITOUS AND INTELLIGENT INFRASTRUCTURES, 2015, 159 : 197 - 203