The implementation of SPAM over Internet telephony and a defence against this attack

被引:0
|
作者
Voznak, M. [1 ]
Rezac, F. [1 ]
机构
[1] CESNET, Prague 16000, Czech Republic
关键词
IP telephony; Security; Spam; SPIT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Attacks on Internet services become a very frequent issue in the global IP network and next threat is coming with IP telephony. The threat is called SPIT and the acronym represents Spam over Internet Telephony (SPIT). This paper is focused on an implementation of Spam over Internet Telephony and a defence against this type of threat. If you take the fact that Spam takes up 80-90% of the total number of attacks on Internet services, the threat of SPIT in the future is very real and dangerous. This view is also shared by many security experts. We can say that the only reason why the SPIT has no globally impact yet is that it requires in comparison with Spam greater requirements on computing power, hardware and network connectivity. But this barrier will be soon removed by increasing technological development. SPIT also has a much greater annoying effect and impact on the victim than Spam. Just imagine, unlike an incoming emails with Spam, which you can easily ignore and delete, the new attack containing SPIT advertising message will ring again and again several times a day. Software generating SPIT attack was developed by authors at CESNET. This tool is called SPITFILE and it is based on well-known SIP packet generator Sipp. This paper deals with SPITFILE application, which is programmed in Python and it should show, how easy is to generate this type of attack. Of course, the defend methods against this attack are mentioned too. We also made a model of an effective defence against SPIT which we implemented into software IP PBX Asterisk. Our model is based on a call rating factor and blacklist table, together it provides a good protection against SPIT.
引用
收藏
页码:200 / 203
页数:4
相关论文
共 50 条
  • [21] Risk Management for Spam over IP Telephony using Combined Countermeasures
    Ben Chikha, R. Jabeur
    Abbes, Tarek
    Bouhoula, Adel
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 240 - 246
  • [22] Spam Over IP Telephony prevention using Dendritic Cell Algorithm
    Srihari, V.
    Kalpana, P.
    Anitha, R.
    2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
  • [23] Risk Management for Spam over IP Telephony using Optimal Countermeasure
    Ben Chikha, Randa Jabeur
    Abbes, Tarek
    Bouhoula, Adel
    2016 INTERNATIONAL CONFERENCE ON DIGITAL ECONOMY (ICDEC), 2016, : 53 - 59
  • [24] Trust Based Defence System for DDoS Attack Detection in RPL over Internet of Things
    Kiran, Vidhu
    Rani, Shaveta
    Singh, Paramjeet
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (12): : 239 - 245
  • [25] Keen hearing: Defence against an attack
    Dubrovskii, NA
    VESTNIK ROSSIISKOI AKADEMII NAUK, 1996, 66 (11): : 1036 - 1039
  • [26] Behavior-based approach to detect spam over IP telephony attacks
    Randa Jabeur Ben Chikha
    Tarek Abbes
    Wassim Ben Chikha
    Adel Bouhoula
    International Journal of Information Security, 2016, 15 : 131 - 143
  • [27] Behavior-based approach to detect spam over IP telephony attacks
    Ben Chikha, Randa Jabeur
    Abbes, Tarek
    Ben Chikha, Wassim
    Bouhoula, Adel
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (02) : 131 - 143
  • [28] Securing the Internet against attack
    Goth, G
    IEEE INTERNET COMPUTING, 2003, 7 (01) : 8 - 10
  • [29] Fuzzy queries against a crisp database over the internet: An implementation
    Kacprzyk, J
    Zadrozny, S
    KES'2000: FOURTH INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED INTELLIGENT ENGINEERING SYSTEMS & ALLIED TECHNOLOGIES, VOLS 1 AND 2, PROCEEDINGS, 2000, : 704 - 707
  • [30] Network Performance Analysis of Internet Telephony on SIP in ENUM Implementation
    Prihatini, Yudha Indah
    Permadi, Adi
    Murwanto, Wahyu Novian Condro
    Munadi, Rendy
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT, VOL 2, 2009, : 268 - +