VoIP defender: highly scalable SIP-based security architecture
Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications
Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding
Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications
Two layer Denial of Service prevention on SIP VoIP infrastructures
Computer Communications
A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
A Self-learning System for Detection of Anomalous SIP Messages
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
VoIP: A comprehensive survey on a promising technology
Computer Networks: The International Journal of Computer and Telecommunications Networking
Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks
International Journal of Security and Networks
A SIP security testing framework
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Design and analysis of SIP-based mobile VPN for real-time applications
IEEE Transactions on Wireless Communications
Sketch-based SIP flooding detection using Hellinger distance
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Evaluating DOS attacks against SIP-based VoIP systems
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A first order logic security verification model for SIP
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A call conference room interception attack and its detection
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
DoS attacks exploiting signaling in UMTS and IMS
Computer Communications
Principles, Systems and Applications of IP Telecommunications
SIP proxy robustness against DoS attacks
ACC'11/MMACTEE'11 Proceedings of the 13th IASME/WSEAS international conference on Mathematical Methods and Computational Techniques in Electrical Engineering conference on Applied Computing
A new authenticated key agreement for session initiation protocol
International Journal of Communication Systems
SIPA: generic and secure accounting for SIP
Security and Communication Networks
Characteristics of real open SIP-Server traffic
PAM'13 Proceedings of the 14th international conference on Passive and Active Measurement
Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography
Computer Standards & Interfaces
Hi-index | 0.00 |
In this article we address the issue of denial of service attacks targeting the hardware and software of voice over IP servers or by misusing specific signaling protocol features. As a signaling protocol we investigate here the session initiation protocol. In this context we mainly identify attacks based on exhaustion of the memory of VoIP servers, or attacks that incur high CPU load. We deliver an overview of different attack possibilities and explain some attacks in more detail, including attacks utilizing the DNS system and those targeting the parser. A major conclusion of the work is the knowledge that SIP provides a wide range of features that can be used to mount DoS attacks. Discovering these attacks is inherently difficult, as is the case with DoS attacks on other IP components. However, with adequate server design, efficient implementation, and appropriate hardware, the effects of a large portion of attacks can be reduced