The implementation of SPAM over Internet telephony and a defence against this attack

被引:0
|
作者
Voznak, M. [1 ]
Rezac, F. [1 ]
机构
[1] CESNET, Prague 16000, Czech Republic
关键词
IP telephony; Security; Spam; SPIT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Attacks on Internet services become a very frequent issue in the global IP network and next threat is coming with IP telephony. The threat is called SPIT and the acronym represents Spam over Internet Telephony (SPIT). This paper is focused on an implementation of Spam over Internet Telephony and a defence against this type of threat. If you take the fact that Spam takes up 80-90% of the total number of attacks on Internet services, the threat of SPIT in the future is very real and dangerous. This view is also shared by many security experts. We can say that the only reason why the SPIT has no globally impact yet is that it requires in comparison with Spam greater requirements on computing power, hardware and network connectivity. But this barrier will be soon removed by increasing technological development. SPIT also has a much greater annoying effect and impact on the victim than Spam. Just imagine, unlike an incoming emails with Spam, which you can easily ignore and delete, the new attack containing SPIT advertising message will ring again and again several times a day. Software generating SPIT attack was developed by authors at CESNET. This tool is called SPITFILE and it is based on well-known SIP packet generator Sipp. This paper deals with SPITFILE application, which is programmed in Python and it should show, how easy is to generate this type of attack. Of course, the defend methods against this attack are mentioned too. We also made a model of an effective defence against SPIT which we implemented into software IP PBX Asterisk. Our model is based on a call rating factor and blacklist table, together it provides a good protection against SPIT.
引用
收藏
页码:200 / 203
页数:4
相关论文
共 50 条
  • [1] Spam over Internet Telephony: Prototype Implementation
    Rebahi, Yacine
    Farres, C. S.
    2008 International Conference on Telecommunications, Vols 1 and 2, 2008, : 73 - 78
  • [2] SPAM over Internet telephony
    Voznak, M.
    Rezac, F.
    RTT 2009: 11TH INTERNATIONAL CONFERENCE RTT 2009 RESEARCH IN TELECOMMUNICATION TECHNOLOGY, CONFERENCE PROCEEDINGS, 2009, : 119 - 121
  • [3] Analysis of techniques for protection against spam over Internet telephony
    Quinten, Vincent M.
    van de Meent, Remco
    Pras, Aiko
    DEPENDABLE AND ADAPTABLE NETWORKS AND SERVICES, PROCEEDINGS, 2007, 4606 : 70 - +
  • [4] Cure for Spam Over Internet Telephony
    Lindqvist, Janne
    Komu, Miika
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 896 - +
  • [5] On spam over Internet telephony (SPIT) prevention
    Quittek, Juergen
    Niccolini, Saverio
    Tartarelli, Sandra
    Schlegel, Roman
    IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (08) : 80 - 86
  • [6] A Prevention System for Spam over Internet Telephony
    Su, Ming-Yang
    Tsai, Chen-Han
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (02): : 579S - 585S
  • [7] SPam over Internet Telephony (SPIT) Prevention Framework
    Schlegel, Roman
    Niccolini, Saverio
    Tartarelli, Sandra
    Brunner, Marcus
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [8] Identification of Spam over Internet Telephony through Acoustic Fingerprint Technique
    Thakare, Nitikesh S.
    Wadhe, Avinash P.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (05): : 87 - 90
  • [9] Efficient Detection of Spam Over Internet Telephony by Machine Learning Algorithms
    Behan, Ladislav
    Rozhon, Jan
    Safarik, Jakub
    Rezac, Filip
    Voznak, Miroslav
    IEEE ACCESS, 2022, 10 : 133412 - 133426
  • [10] Spam DIS Attack Against Routing Protocol in the Internet of Things
    Pu, Cong
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 73 - 77