A survey on registration hijacking attack consequences and protection for session initiation protocol (SIP)

被引:6
|
作者
Naeem, Makhdoom Muhammad [1 ]
Hussain, Intesab [2 ]
Missen, Malik Muhammad Saad [3 ]
机构
[1] NFC Inst Engn & Technol, Dept Elect Engn, Multan, Punjab, Pakistan
[2] Quaid E Awam Univ Engn, Dept Telecommun Engn Sci & Technol, Nawabshah, Pakistan
[3] Islamia Univ Bahawalpur, Dept Comp Sci & IT, Bahawalpur, Pakistan
关键词
Voip; SIP; Network security; Sip security; AUTHENTICATION; COMMUNICATION; SECURE;
D O I
10.1016/j.comnet.2020.107250
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Today, many organizations are transforming their traditional telephone services into Voice over Internet Protocol (VoIP) systems. These services are simple to implement, but they are often vulnerable to attacks because they are packet-switched IP networks to support the circuit-switched used for voice communication. SIP is widely used as a signaling protocol to facilitate video and voice communication, as well as for more multimedia applications. However, it is not protected against various types of attacks because of its open nature and lack of a clear line of defense against the growing number of security threats. Among these risks, registration hijacking assaults, known by its harmful effect, attack both the User Agent Server (UAS) and the User Agent Client (UAC). In particular, the REGISTER message is evaluated as one of the main reasons of registration hijacking assaults in SIP. An attacker who deactivates the SIP registration of a valid user and replaces it with the logical address of the hacker. This allows the hacker to block incoming calls as well as redirect, replay or end calls at will. In this survey, we present a complete study of the registration attack against SIP, communicating its different alternatives and analyzing its consequences. We have also categorized current solutions based on the different registration hijacking attack approaches they face, their types, and their targets. In addition, We conduct an in-depth review of the robustness and inefficiency of these solutions, as well as an in-depth analysis of each one's basic assumptions to better understand their limitations. Finally, we recommend protecting the UAC registration method against registration-hijacking by using the Media Access Control (MAC) address to improve the efficiency of the studied solutions.
引用
收藏
页数:14
相关论文
共 31 条
  • [1] A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP)
    Hussain, Intesab
    Djahel, Soufiene
    Zhang, Zonghua
    Nait-Abdesselam, Farid
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4436 - 4451
  • [2] Benchmarking the Session Initiation Protocol (SIP)
    Zhang, Yueqing
    Clouet, Arthur
    Awotayo, Oluseyi S.
    Davids, Carol
    Gurbani, Vijay K.
    2015 IEEE INTERNATIONAL WORKSHOP TECHNICAL COMMITTEE ON COMMUNICATIONS QUALITY AND RELIABILITY (CQR), 2015,
  • [3] A Survey and Analysis of Media Keying Techniques in the Session Initiation Protocol (SIP)
    Gurbani, Vijay K.
    Kolesnikov, Vladimir
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (02): : 183 - 198
  • [4] The session initiation protocol (SIP): An evolutionary study
    Baset, Salman Abdul
    Gurbani, Vijay K.
    Johnston, Alan B.
    Kaplan, Hadriel
    Rosen, Brian
    Rosenberg, Jonathan D.
    Journal of Communications, 2012, 7 (02): : 89 - 105
  • [5] Using SAML to protect the session initiation protocol (SIP)
    Tschofenig, Hannes
    Falk, Rainer
    Peterson, Jon
    Hodges, Jeff
    Sicker, Douglas
    Polk, James
    IEEE NETWORK, 2006, 20 (05): : 14 - 17
  • [6] Cryptographically transparent Session Initiation Protocol (SIP) proxies
    Gurbani, Vijay K.
    Willis, Dean
    Audet, Francois
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1185 - +
  • [8] Characterizing session initiation protocol (SIP) network performance and reliability
    Gurbani, VK
    Jagadeesan, LJ
    Mendiratta, VB
    SERVICE AVAILABILITY, 2005, 3694 : 196 - 211
  • [9] Performance analysis of identity management in the Session Initiation Protocol (SIP)
    Rebahi, Yacine
    Pallares, Jordi Jaen
    Minh, Nguyen Tuan
    Ehlert, Sven
    Kovacs, Gergely
    Sisalem, Dorgharn
    2008 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2008, : 711 - +
  • [10] Colored Petri Net Model of the Session Initiation Protocol (SIP)
    Gehlot, Vijay
    Nigro, Carmen
    IECON 2010 - 36TH ANNUAL CONFERENCE ON IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2010,