A Study of SIP Trunk Security and Challenges

被引:0
|
作者
Jaber, Aws Naser [1 ]
Manickam, Selvakumar [1 ]
Ramdas, Surerswaran [1 ]
机构
[1] Univ Sains Malaysia, Natl Adv IPv6 Ctr NAv6, George Town 11800, Malaysia
关键词
SIP trunk; SBC; VoIP firewalls; cryptographic algorithms; VOICE;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Several voice over internet protocol (VoIP) providers migrate to their services to session initiation protocol (SIP). SIP is a lightweight signaling protocol used to implement in wiled VoIP services. However, with the global spread of this service, we can see how VoIP is affected by the stealing of SIP trunk services. Thus, the VoIP Trade Company will exhaust it effort and income. Our survey shows how much SIP security is enforced when somebody cracks the SIP server, and looks for any VoIP process trunk IP to use the server as a legitimate user, or to try to harm the trunk by injecting it with a forged source code that will lead to a road map for the hacker. The latter will make it deny the server, or inject it with the SQL script effect to come with DDos attacks. Our study shows the interest of researchers and students on VoIP security. It also provides a road map between the hypotheses and implementation, particularly on how SIP is affected by the variety of attacks from the outside world and from inside the local network.
引用
收藏
页码:239 / 243
页数:5
相关论文
共 50 条
  • [31] Security issues in SIP signaling in wireless networks and services
    Lakay, ET
    Agbinya, JI
    ICMB 2005: INTERNATIONAL CONFERENCE ON MOBILE BUSINESS, 2005, : 639 - 642
  • [32] SIP-based IM and Its Security Solutions
    Cui, Xin
    Zhang, Yuan
    Lee, Woo Jin
    Koh, Seok Joo
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [33] Mobile Intelligent Network security with SIP Authentication Procedure
    Abdallah, Handoura
    Daniel, Bourget
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2638 - 2643
  • [34] SIP signaling security for end-to-end communication
    Ono, K
    Tachimoto, S
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1042 - 1046
  • [35] A Security Approach using SIP Protocol in Imbedded Systems
    Nogueira, Toniclay Andrade
    Menezes, Adauto Cavalcante
    Lima Ribeiro, Admilson De Ribamar
    Moreno Ordonez, Edward David
    WEBIST: PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, 2017, : 352 - 355
  • [36] SIP Server Security with TLS: Relative Performance Evaluation
    Kulin, Merima
    Kazaz, Tarik
    Mrdovic, Sasa
    2012 IX INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (BIHTEL), 2012,
  • [37] An effective SIP security solution for heterogeneous mobile networks
    Zhang, Liang
    Miyajima, Haruya
    Hayashi, Hideki
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 4826 - 4830
  • [38] A Study of Key Technologies for IoT and associated Security Challenges
    Daud, Maryam
    Khan, Quratulain
    Saleem, Yasir
    2017 INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS AND NETWORKS (ISWSN), 2017,
  • [39] Cyber Security Challenges in Organisations: A Case Study in Malaysia
    Teoh, Chooi Shi
    Mahmood, Ahmad Kamil
    Dzazali, Suhazimah
    2018 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2018,
  • [40] Security Operations Center: A Systematic Study and Open Challenges
    Vielberth, Manfred
    Boehm, Fabian
    Fichtinger, Ines
    Pernul, Guenther
    IEEE ACCESS, 2020, 8 : 227756 - 227779