A Study of SIP Trunk Security and Challenges

被引:0
|
作者
Jaber, Aws Naser [1 ]
Manickam, Selvakumar [1 ]
Ramdas, Surerswaran [1 ]
机构
[1] Univ Sains Malaysia, Natl Adv IPv6 Ctr NAv6, George Town 11800, Malaysia
关键词
SIP trunk; SBC; VoIP firewalls; cryptographic algorithms; VOICE;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Several voice over internet protocol (VoIP) providers migrate to their services to session initiation protocol (SIP). SIP is a lightweight signaling protocol used to implement in wiled VoIP services. However, with the global spread of this service, we can see how VoIP is affected by the stealing of SIP trunk services. Thus, the VoIP Trade Company will exhaust it effort and income. Our survey shows how much SIP security is enforced when somebody cracks the SIP server, and looks for any VoIP process trunk IP to use the server as a legitimate user, or to try to harm the trunk by injecting it with a forged source code that will lead to a road map for the hacker. The latter will make it deny the server, or inject it with the SQL script effect to come with DDos attacks. Our study shows the interest of researchers and students on VoIP security. It also provides a road map between the hypotheses and implementation, particularly on how SIP is affected by the variety of attacks from the outside world and from inside the local network.
引用
收藏
页码:239 / 243
页数:5
相关论文
共 50 条
  • [41] A First Order Logic Security Verification Model for SIP
    Geneiatakis, Dimitris
    Lambrinoudakis, Costas
    Kambourakis, Georgios
    Kafkalas, Aggelos
    Ehlert, Sven
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 937 - +
  • [42] Security Aspects of SIP based VoIP Networks: A Survey
    Srihari, V.
    Kalpana, P.
    Anitha, R.
    SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 143 - 150
  • [43] A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network
    Yoon, Seokung
    Jung, Hyuncheol
    Lee, Kyung-Seok
    SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 165 - +
  • [44] Security and redundancy in trunk main distribution networks
    Wallen, A
    Woodward, T
    Powell, R
    3RD WORLD WATER CONGRESS: WATER SERVICES MANAGEMENT, OPERATIONS AND MONITORING, 2003, 3 (1-2): : 103 - 109
  • [45] Challenges in implementing a SIP-Based application server
    Herceg, Sasa
    Weber, Mario
    Macan, Tvrtko
    CONTEL 2007: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, 2007, : 333 - +
  • [46] Challenges and opportunities in System-in-Package (SiP) business
    Sham, M. L.
    Chen, Y. C.
    Leung, T. W.
    Lin, J. R.
    Chung, T.
    ICEPT: 2006 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS PACKAGING TECHNOLOGY, PROCEEDINGS, 2006, : 26 - +
  • [47] Worldwide perspectives on SiP markets: Technology trends and challenges
    Lenihan, Timothy G.
    Vardaman, E. Jan
    ICEPT: 2006 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS PACKAGING TECHNOLOGY, PROCEEDINGS, 2006, : 31 - +
  • [49] Personalized service mobility and security in SIP-based communications
    Lou, DF
    Jiang, DM
    Yeap, T
    O'Brian, W
    2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 113 - 117
  • [50] SECURITY MECHANISM AND REALIZATION FOR SIP-BASED NETWORK TELEPHONE
    Liu, Gang
    Zhang, Jing
    Qin, Jia
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 587 - 589