Overview of SIP Attacks and Countermeasures

被引:0
作者
El-moussa, Fadi [1 ]
Mudhar, Parmindher [2 ]
Jones, Andy [1 ,3 ]
机构
[1] Ctr Informat & Secur Res, Adastral Pk, Ipswich IP5 3RE, Suffolk, England
[2] Secur Design & Oper, Ipswich IP5 3RE, Suffolk, England
[3] Edith Cowan Univ, Ipswich IP5 3RE, Suffolk, England
来源
INFORMATION SECURITY AND DIGITAL FORENSICS | 2010年 / 41卷
关键词
SIP; Denial of Service; Authentication; Buffer overflow; SIP Injection; SPIT; Internet Telephony;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Security threats to current circuit switched networks dedicated to a single voice application such as the Public Switched Telephone Network (PSTN) are considered minimal. However, in open environments such as the Internet, conducting an attack on voice applications such as Voice over IP (VoIP) is much simpler. This is because VoIP services such as Session Initiation Protocol (SIP) are using servers that are reachable through the Internet. The aim of SIP is to provide the same functionality as traditional PSTN over the Internet. SIP service is implemented in either software or hardware and can suffer similar security threats as HTTP or any publicly available service on the Internet such as buffer overflow, injection attack, hijacking, etc. These attacks are simple to mount, with minimal charges or no cost to the attacker. This paper describes various possible security threats that a VoIP provider could encounter and the impact of these threats on the VoIP infrastructure. In addition, this paper investigates current solutions and mitigation techniques for VoIP attacks in order to provide more reliable VoIP services. The SIP taxonomy presented in the paper can be used as a baseline model to evaluate a SIP product against current and future vulnerabilities and gives a number of possible countermeasures that can be used to mitigate the threats.
引用
收藏
页码:82 / +
页数:3
相关论文
共 50 条
[41]   Blockchain-Based Caller-ID Authentication (BBCA): A Novel Solution to Prevent Spoofing Attacks in VoIP/SIP Networks [J].
Tas, I. Melih ;
Baktir, Selcuk .
IEEE ACCESS, 2024, 12 :60123-60137
[42]   Identification of PPG Measurement Sites Toward Countermeasures Against Biometric Presentation Attacks [J].
Hinatsu, Shun ;
Matsuda, Nori ;
Ishizuka, Hiroki ;
Ikeda, Sei ;
Oshiro, Osamu .
IEEE ACCESS, 2022, 10 :118736-118746
[43]   Man-In-The-Middle attacks on Bluetooth:: A comparative analysis, a novel attack, and countermeasures [J].
Haataja, Keijo M. J. ;
Hypponen, Konstantin .
2008 3RD INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS, CONTROL AND SIGNAL PROCESSING, VOLS 1-3, 2008, :1096-1102
[44]   A Survey on Contactless Smart Cards and Payment System: Technologies, Policies, Attacks and Countermeasures [J].
Gupta, Brij B. ;
Narayan, Shaifali .
JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2020, 28 (04) :135-159
[45]   A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks [J].
Department of Computer Science and Software Engineering, University of Canterbury, Christchurch, New Zealand .
Int. J. Internet Protoc. Technol., 2008, 2 (128-135) :128-135
[46]   Recent Cyber Security Attacks and Their Mitigation Approaches - An Overview [J].
Chowdhury, Abdullahi .
APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 :54-65
[47]   Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision [J].
Shokry, Mostafa ;
Awad, Ali Ismail ;
Abd-Ellah, Mahmoud Khaled ;
Khalaf, Ashraf A. M. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 136 :358-377
[48]   MiteS: Software-based Microarchitectural Attacks and Countermeasures in networked AP SoC Platforms [J].
Silitonga, Arthur ;
Gassoumi, Hassen ;
Becker, Juergen .
2020 IEEE 14TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2020, :62-68
[49]   Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications [J].
Abosata, Nasr ;
Al-Rubaye, Saba ;
Inalhan, Gokhan ;
Emmanouilidis, Christos .
SENSORS, 2021, 21 (11)
[50]   Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints [J].
Dassouki, Khaled ;
Safa, Haidar ;
Nassar, Mohamed ;
Hijazi, Abbas .
COMPUTERS & SECURITY, 2017, 70 :618-633