Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP

被引:4
作者
Chen, Zhe [1 ,2 ]
Guo, Shize [1 ,2 ]
Zheng, Kangfeng [1 ,2 ]
Li, Haitao [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, MOE, Key Lab Network & Informat Attack & Def Technol, Natl Engn Lab Disaster Backup & Recovery, Beijing 100088, Peoples R China
[2] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching, Natl Engn Lab Disaster Backup & Recovery, Beijing 100088, Peoples R China
来源
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS | 2009年
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
SIP; VoIP; MitM-DoS; Q-model; P-model;
D O I
10.1109/NSWCTC.2009.326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the number of VoIP users increase and as the deployment of SIP devices gains ground, security has risen as a potential issue worthy of our consideration. VoIP is an application running on the data network and as such, inherits the security issues common to IP. The Man-in-the-Middle (MitM) attacks and the denial of service (DoS) attacks are the hackneyed and evil cyberattacks in the IP which can be easily implemented in the SIP VoIP. In this paper, a unified communication model of SIP VoIP infrastructure is established to analyze the DoS attacks launched by the MUM (MitM-DoS). Then we use the set theory to research the models of MitM-DoS attacks formally.
引用
收藏
页码:263 / +
页数:2
相关论文
共 6 条
[1]  
ARANGO M, 1999, 2705 RFC
[2]  
CHEN Z, 2007, 3 INT C WIR COMM NET, V1, P2255
[3]  
*ITU, 2003, DRAFT REV REC H 323
[4]  
Johnston A., 2004, SIP UNDERSTANDING SE, V2nd
[5]  
MAO WB, 2004, MODEM CRYPTOGRAPHY T
[6]  
Rosenberg J, 2002, 3261 IETF RFC