The implementation of SPAM over Internet telephony and a defence against this attack

被引:0
|
作者
Voznak, M. [1 ]
Rezac, F. [1 ]
机构
[1] CESNET, Prague 16000, Czech Republic
关键词
IP telephony; Security; Spam; SPIT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Attacks on Internet services become a very frequent issue in the global IP network and next threat is coming with IP telephony. The threat is called SPIT and the acronym represents Spam over Internet Telephony (SPIT). This paper is focused on an implementation of Spam over Internet Telephony and a defence against this type of threat. If you take the fact that Spam takes up 80-90% of the total number of attacks on Internet services, the threat of SPIT in the future is very real and dangerous. This view is also shared by many security experts. We can say that the only reason why the SPIT has no globally impact yet is that it requires in comparison with Spam greater requirements on computing power, hardware and network connectivity. But this barrier will be soon removed by increasing technological development. SPIT also has a much greater annoying effect and impact on the victim than Spam. Just imagine, unlike an incoming emails with Spam, which you can easily ignore and delete, the new attack containing SPIT advertising message will ring again and again several times a day. Software generating SPIT attack was developed by authors at CESNET. This tool is called SPITFILE and it is based on well-known SIP packet generator Sipp. This paper deals with SPITFILE application, which is programmed in Python and it should show, how easy is to generate this type of attack. Of course, the defend methods against this attack are mentioned too. We also made a model of an effective defence against SPIT which we implemented into software IP PBX Asterisk. Our model is based on a call rating factor and blacklist table, together it provides a good protection against SPIT.
引用
收藏
页码:200 / 203
页数:4
相关论文
共 50 条
  • [31] Gastrointestinal stress as innate defence against microbial attack
    Panwar, H.
    Rokana, N.
    Aparna, S. V.
    Kaur, J.
    Singh, A.
    Singh, J.
    Singh, K. S.
    Chaudhary, V.
    Puniya, A. K.
    JOURNAL OF APPLIED MICROBIOLOGY, 2021, 130 (04) : 1035 - 1061
  • [32] Prophage-mediated defence against viral attack and viral counter-defence
    Dedrick, Rebekah M.
    Jacobs-Sera, Deborah
    Bustamante, Carlos A. Guerrero
    Garlena, Rebecca A.
    Mavrich, Travis N.
    Pope, Welkin H.
    Reyes, Juan C. Cervantes
    Russell, Daniel A.
    Adair, Tamarah
    Alvey, Richard
    Bonilla, J. Alfred
    Bricker, Jerald S.
    Brown, Bryony R.
    Byrnes, Deanna
    Cresawn, Steven G.
    Davis, William B.
    Dickson, Leon A.
    Edgington, Nicholas P.
    Findley, Ann M.
    Golebiewska, Urszula
    Grose, Julianne H.
    Hayes, Cory F.
    Hughes, Lee E.
    Hutchison, Keith W.
    Isern, Sharon
    Johnson, Allison A.
    Kenna, Margaret A.
    Klyczek, Karen K.
    Mageeney, Catherine M.
    Michael, Scott F.
    Molloy, Sally D.
    Montgomery, Matthew T.
    Neitzel, James
    Page, Shallee T.
    Pizzorno, Marie C.
    Poxleitner, Marianne K.
    Rinehart, Claire A.
    Robinson, Courtney J.
    Rubin, Michael R.
    Teyim, Joseph N.
    Vazquez, Edwin
    Ware, Vassie C.
    Washington, Jacqueline
    Hatfull, Graham F.
    NATURE MICROBIOLOGY, 2017, 2 (03):
  • [33] Prophage-mediated defence against viral attack and viral counter-defence
    Rebekah M. Dedrick
    Deborah Jacobs-Sera
    Carlos A. Guerrero Bustamante
    Rebecca A. Garlena
    Travis N. Mavrich
    Welkin H. Pope
    Juan C. Cervantes Reyes
    Daniel A. Russell
    Tamarah Adair
    Richard Alvey
    J. Alfred Bonilla
    Jerald S. Bricker
    Bryony R. Brown
    Deanna Byrnes
    Steven G. Cresawn
    William B. Davis
    Leon A. Dickson
    Nicholas P. Edgington
    Ann M. Findley
    Urszula Golebiewska
    Julianne H. Grose
    Cory F. Hayes
    Lee E. Hughes
    Keith W. Hutchison
    Sharon Isern
    Allison A. Johnson
    Margaret A. Kenna
    Karen K. Klyczek
    Catherine M. Mageeney
    Scott F. Michael
    Sally D. Molloy
    Matthew T. Montgomery
    James Neitzel
    Shallee T. Page
    Marie C. Pizzorno
    Marianne K. Poxleitner
    Claire A. Rinehart
    Courtney J. Robinson
    Michael R. Rubin
    Joseph N. Teyim
    Edwin Vazquez
    Vassie C. Ware
    Jacqueline Washington
    Graham F. Hatfull
    Nature Microbiology, 2
  • [34] Detecting Nuisance Calls over Internet Telephony Using Caller Reputation
    Javed, Ibrahim Tariq
    Toumi, Khalifa
    Alharbi, Fares
    Margaria, Tiziana
    Crespi, Noel
    ELECTRONICS, 2021, 10 (03) : 1 - 20
  • [35] An Analysis of a Defence Method against Slow HTTP DoS Attack
    Hirakawa, Tetsuya
    Ogura, Kanayo
    Bista, Bhed Bahadur
    Takata, Toyoo
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 316 - 320
  • [36] Lactoferrin: an important host defence against microbial and viral attack
    Valenti, P
    Antonini, G
    CELLULAR AND MOLECULAR LIFE SCIENCES, 2005, 62 (22) : 2576 - 2587
  • [37] LactoferrinLactoferrin: an important host defence against microbial and viral attack
    P. Valenti
    G. Antonini
    Cellular and Molecular Life Sciences, 2005, 62
  • [38] Unusual thermal defence by a honeybee against mass attack by hornets
    Ono, M.
    Igarashi, T.
    Ohno, E.
    Sasaki, M.
    Nature, 1995, 377 (6547):
  • [39] A Lightweight Defence against the Packet in Packet Attack in ZigBee Networks
    Biswas, Anshuman
    Alkhalid, Abdulaziz
    Kunz, Thomas
    Lung, Chung-Horng
    2012 IFIP WIRELESS DAYS (WD), 2012,
  • [40] Enhanced AODV protocol for defence against JellyFish Attack on MANETs
    Garg, Sakshi
    Chand, Satish
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 2279 - 2284