Overview of SIP Attacks and Countermeasures

被引:0
作者
El-moussa, Fadi [1 ]
Mudhar, Parmindher [2 ]
Jones, Andy [1 ,3 ]
机构
[1] Ctr Informat & Secur Res, Adastral Pk, Ipswich IP5 3RE, Suffolk, England
[2] Secur Design & Oper, Ipswich IP5 3RE, Suffolk, England
[3] Edith Cowan Univ, Ipswich IP5 3RE, Suffolk, England
来源
INFORMATION SECURITY AND DIGITAL FORENSICS | 2010年 / 41卷
关键词
SIP; Denial of Service; Authentication; Buffer overflow; SIP Injection; SPIT; Internet Telephony;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Security threats to current circuit switched networks dedicated to a single voice application such as the Public Switched Telephone Network (PSTN) are considered minimal. However, in open environments such as the Internet, conducting an attack on voice applications such as Voice over IP (VoIP) is much simpler. This is because VoIP services such as Session Initiation Protocol (SIP) are using servers that are reachable through the Internet. The aim of SIP is to provide the same functionality as traditional PSTN over the Internet. SIP service is implemented in either software or hardware and can suffer similar security threats as HTTP or any publicly available service on the Internet such as buffer overflow, injection attack, hijacking, etc. These attacks are simple to mount, with minimal charges or no cost to the attacker. This paper describes various possible security threats that a VoIP provider could encounter and the impact of these threats on the VoIP infrastructure. In addition, this paper investigates current solutions and mitigation techniques for VoIP attacks in order to provide more reliable VoIP services. The SIP taxonomy presented in the paper can be used as a baseline model to evaluate a SIP product against current and future vulnerabilities and gives a number of possible countermeasures that can be used to mitigate the threats.
引用
收藏
页码:82 / +
页数:3
相关论文
共 50 条
  • [31] Survey of Countering DoS/DDoS Attacks on SIP Based VoIP Networks
    Nazih, Waleed
    Elkilani, Wail S.
    Dhahri, Habib
    Abdelkader, Tamer
    [J]. ELECTRONICS, 2020, 9 (11) : 1 - 21
  • [32] A Systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords
    Por, Lip Yee
    Ng, Ian Ouii
    Chen, Yen-Lin
    Yang, Jing
    Ku, Chin Soon
    [J]. IEEE ACCESS, 2024, 12 : 53408 - 53423
  • [33] Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
    Bicakci, Kemal
    Tavli, Bulent
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 931 - 941
  • [34] Analysis of Informed Attacks and Appropriate Countermeasures for Cyber-Physical Systems
    Saglietti, Francesca
    Meitner, Matthias
    von Wardenburg, Lars
    Richthammer, Valentina
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2016, 2016, 9923 : 222 - 233
  • [35] A taxonomy of various attacks on smart card-based applications and countermeasures
    Gupta, B. B.
    Quamara, Megha
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (07)
  • [36] Survey of DoS Attacks on LTE infrastructure used in AMI System and Countermeasures
    Pedramnia, Kiyana
    Rahmani, Masoomeh
    [J]. 2018 SMART GRID CONFERENCE (SGC), 2018, : 18 - 23
  • [37] The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and Countermeasures
    Xie, Tian
    Tu, Guan-Hua
    Yin, Bangjie
    Li, Chi-Yu
    Peng, Chunyi
    Zhang, Mi
    Liu, Hui
    Liu, Xiaoming
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (11) : 3131 - 3147
  • [38] A Bayesian change point model for detecting SIP-based DDoS attacks
    Kurt, Baris
    Yildiz, Cagatay
    Ceritli, Taha Yusuf
    Sankur, Bulent
    Cemgil, Ali Taylan
    [J]. DIGITAL SIGNAL PROCESSING, 2018, 77 : 48 - 62
  • [39] Utilizing bloom filters for detecting flooding attacks against SIP based services
    Geneiatakis, Dimitris
    Vrakas, Nikos
    Lambrinoudakis, Costas
    [J]. COMPUTERS & SECURITY, 2009, 28 (07) : 578 - 591
  • [40] On robustness and countermeasures of Reliable Server Pooling systems against denial of service attacks
    Dreibholz, Thomas
    Rathgeb, Erwin P.
    Zhou, Xing
    [J]. NETWORKING 2008: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2008, 4982 : 586 - +