A Study of SIP Trunk Security and Challenges

被引:0
|
作者
Jaber, Aws Naser [1 ]
Manickam, Selvakumar [1 ]
Ramdas, Surerswaran [1 ]
机构
[1] Univ Sains Malaysia, Natl Adv IPv6 Ctr NAv6, George Town 11800, Malaysia
关键词
SIP trunk; SBC; VoIP firewalls; cryptographic algorithms; VOICE;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Several voice over internet protocol (VoIP) providers migrate to their services to session initiation protocol (SIP). SIP is a lightweight signaling protocol used to implement in wiled VoIP services. However, with the global spread of this service, we can see how VoIP is affected by the stealing of SIP trunk services. Thus, the VoIP Trade Company will exhaust it effort and income. Our survey shows how much SIP security is enforced when somebody cracks the SIP server, and looks for any VoIP process trunk IP to use the server as a legitimate user, or to try to harm the trunk by injecting it with a forged source code that will lead to a road map for the hacker. The latter will make it deny the server, or inject it with the SQL script effect to come with DDos attacks. Our study shows the interest of researchers and students on VoIP security. It also provides a road map between the hypotheses and implementation, particularly on how SIP is affected by the variety of attacks from the outside world and from inside the local network.
引用
收藏
页码:239 / 243
页数:5
相关论文
共 50 条
  • [1] Security of Connecting SIP Trunk Via SBC on IMS Network
    Pantunn, Soraya
    Pattaramalai, Suwat
    2017 INTERNATIONAL ELECTRICAL ENGINEERING CONGRESS (IEECON), 2017,
  • [2] Security challenges for-peer-to-peer SIP
    Seedorf, Jan
    IEEE NETWORK, 2006, 20 (05): : 38 - 45
  • [3] Design and implementation of SIP security
    Chang, CC
    Lu, YF
    Pang, AC
    Kuo, TW
    INFORMATION NETWORKING: CONVERGENCE IN BROADBAND AND MOBILE NETWORKING, 2005, 3391 : 669 - 678
  • [4] Improvement of a SIP Security Mechanism
    Liu, Longtao
    Tang, Wen
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2929 - 2932
  • [5] A SIP Security Testing Framework
    Srinivasan, Hemanth
    Sarac, Kamil
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1056 - 1060
  • [6] Security and test environment for SIP
    Lee, Geuk
    Kim, Seok Tae
    Han, In Kyu
    Lee, Chang Yong
    Park, Seon Ho
    Yi, Do Won
    Oh, Jung Min
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 157 - 165
  • [7] SIP Trunk网关穿越NAT的研究
    文银娟
    姜惠娟
    甘肃高师学报, 2013, 18 (05) : 60 - 63
  • [8] SiP technologies: Perspectives and challenges
    Cauvet, P.
    IEEE DTIS: 2006 International Conference on Design & Test of Integrated Systems in Nanoscale Technology, Proceedings, 2006, : 4 - 4
  • [9] Study on Security Authentication Mechanism for P2P-SIP
    Shen, Min
    Cai, Jing
    He, He Haipeng
    ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 756 - 760
  • [10] SIP security issues: The SIP authentication procedure and its processing load
    Salsano, S
    Veltri, L
    Papalilo, D
    IEEE NETWORK, 2002, 16 (06): : 38 - 44