A survey on registration hijacking attack consequences and protection for session initiation protocol (SIP)

被引:6
|
作者
Naeem, Makhdoom Muhammad [1 ]
Hussain, Intesab [2 ]
Missen, Malik Muhammad Saad [3 ]
机构
[1] NFC Inst Engn & Technol, Dept Elect Engn, Multan, Punjab, Pakistan
[2] Quaid E Awam Univ Engn, Dept Telecommun Engn Sci & Technol, Nawabshah, Pakistan
[3] Islamia Univ Bahawalpur, Dept Comp Sci & IT, Bahawalpur, Pakistan
关键词
Voip; SIP; Network security; Sip security; AUTHENTICATION; COMMUNICATION; SECURE;
D O I
10.1016/j.comnet.2020.107250
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Today, many organizations are transforming their traditional telephone services into Voice over Internet Protocol (VoIP) systems. These services are simple to implement, but they are often vulnerable to attacks because they are packet-switched IP networks to support the circuit-switched used for voice communication. SIP is widely used as a signaling protocol to facilitate video and voice communication, as well as for more multimedia applications. However, it is not protected against various types of attacks because of its open nature and lack of a clear line of defense against the growing number of security threats. Among these risks, registration hijacking assaults, known by its harmful effect, attack both the User Agent Server (UAS) and the User Agent Client (UAC). In particular, the REGISTER message is evaluated as one of the main reasons of registration hijacking assaults in SIP. An attacker who deactivates the SIP registration of a valid user and replaces it with the logical address of the hacker. This allows the hacker to block incoming calls as well as redirect, replay or end calls at will. In this survey, we present a complete study of the registration attack against SIP, communicating its different alternatives and analyzing its consequences. We have also categorized current solutions based on the different registration hijacking attack approaches they face, their types, and their targets. In addition, We conduct an in-depth review of the robustness and inefficiency of these solutions, as well as an in-depth analysis of each one's basic assumptions to better understand their limitations. Finally, we recommend protecting the UAC registration method against registration-hijacking by using the Media Access Control (MAC) address to improve the efficiency of the studied solutions.
引用
收藏
页数:14
相关论文
共 31 条
  • [21] Session initiation protocol (SIP) and quality of service (QoS) interaction for Internet multimedia applications
    Goulart, AE
    Abler, RT
    CCCT 2003 VOL, 2, PROCEEDINGS: COMMUNICATIONS SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2003, : 393 - 398
  • [22] Design and Implementation of Mobile Applications for Military Personnel Based on SIP (Session Initiation Protocol)
    Sabila, Sandhya Hizrian
    Mustika, I. Wayan
    Sulistyo, Selo
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 870 - 875
  • [23] Mobility Support for Universal Plug and Play (UPnP) Devices Using Session Initiation Protocol (SIP)
    Kumar, Bryesh
    Rahman, Mahfuzur
    2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 788 - 792
  • [24] Efficient IP-based Voice & Video Communication Through Session Initiation Protocol (SIP)
    Nalawade, Namrata Rajendrasing
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [25] Performance measurements and modeling of a java-based Session Initiation Protocol (SIP) application server
    Department of Systems and Computer Engineering, Carleton University, Ottawa, ON K1S 5B6, Canada
    不详
    CompArch - Proc. Fed. Events Compon.-Based Softw. Eng. Soft. Archit. - QoSA+ISARCS, (63-72):
  • [26] SAS-SIP: A secure authentication scheme based on ECC and a fuzzy extractor for session initiation protocol
    Maitra, Tanmoy
    Giri, Debasis
    Mohapatra, Ram N.
    CRYPTOLOGIA, 2019, 43 (03) : 212 - 232
  • [27] Contacter:: an enhanced contact application for easy update and recovery of contacts using the Session Initiation Protocol (SIP)
    Matuszewski, Marcin
    Rantaptiska, Olli
    Garcia-Martin, Miguel A.
    2007 IEEE INTERNATIONAL CONFERENCE ON PORTABLE INFORMATION DEVICES, 2007, : 119 - 124
  • [28] A location management scheme for mobility support in wireless IP networks using Session Initiation Protocol (SIP)
    Zhou, S
    Seneviratne, A
    Percival, T
    NINTH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, PROCEEDINGS, 2001, : 486 - 491
  • [29] Timed Colored Petri Net (CPN) model of the Session Initiation Protocol (SIP) for formal verification of mobile applications
    Yim, Jaegeol
    Lee, Gyeyoung
    Shim, Kyubark
    ASIA LIFE SCIENCES, 2015, : 415 - 426
  • [30] The authentication and processing performance of session initiation protocol (SIP) based multi-party secure closed conference system
    Kim, JK
    Kim, HC
    Ahn, SJ
    Chung, JW
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2004, 3358 : 725 - 729