A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment

被引:28
|
作者
Geneiatakis, Dimitris [1 ]
Lambrinoudakis, Costas [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Lab Informat & Commun Syst Secur, Karlovassi 83200, Samos, Greece
关键词
Session Initiation Protocol (SIP); signaling attacks; Voice over IP (VoIP); security;
D O I
10.1007/s11235-008-9065-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The advent of Voice over IP (VoIP) has offered numerous advantages but, at the same time, it has introduced security threats not previously encountered in networks with a closed architecture like the Public Switch Telephone Networks (PSTN). One of these threats is that of signaling attacks. This paper examines the signaling attacks in VoIP environments based on the Session Initiation Protocol (SIP), focusing on the design of a robust lightweight protection mechanism against them. The proposed scheme introduces a new SIP header, namely the Integrity-Auth header, which is utilized for protecting the SIP-based VoIP services from signaling attacks while ensuring authenticity and integrity.
引用
收藏
页码:153 / 159
页数:7
相关论文
共 50 条
  • [1] A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment
    Dimitris Geneiatakis
    Costas Lambrinoudakis
    [J]. Telecommunication Systems, 2007, 36 : 153 - 159
  • [2] Evaluating DoS Attacks Against SIP-Based VoIP Systems
    Rafique, M. Zubair
    Akbar, M. Ali
    Farooq, Muddassar
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 6130 - 6135
  • [3] Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony
    Akbar, Muhammad Ali
    Farooq, Muddassar
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 38 (02) : 491 - 510
  • [4] Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony
    Muhammad Ali Akbar
    Muddassar Farooq
    [J]. Knowledge and Information Systems, 2014, 38 : 491 - 510
  • [5] Demonstration of Spam and Security Mechanism in SIP-based VoIP Services
    Choi, Jaesic
    Chae, Kangseok
    Choi, Jaeduck
    Jung, Souhwan
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 52 - 53
  • [6] A New Security Mechanism for SIP-Based VoIP over WMNs
    Lin, Hui
    Xu, Li
    Gao, Jianliang
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 330 - 333
  • [7] Audio CAPTCHA for SIP-Based VoIP
    Soupionis, Yannis
    Tountas, George
    Gritzalis, Dimitris
    [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 25 - 38
  • [8] VoIP Shield: A Transparent Protection of Deployed VoIP Systems from SIP-based Exploits
    Farley, Ryan
    Wang, Xinyuan
    [J]. 2012 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2012, : 486 - 489
  • [9] A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP
    Zhang, Liping
    Tang, Shanyu
    Zhu, Shaohui
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (01) : 108 - 126
  • [10] Detection of Resource-Drained Attacks on SIP-Based Wireless VoIP Networks
    Tang, Jin
    Hao, Yong
    Cheng, Yu
    Zhou, Chi
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,