The implementation of SPAM over Internet telephony and a defence against this attack

被引:0
|
作者
Voznak, M. [1 ]
Rezac, F. [1 ]
机构
[1] CESNET, Prague 16000, Czech Republic
关键词
IP telephony; Security; Spam; SPIT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Attacks on Internet services become a very frequent issue in the global IP network and next threat is coming with IP telephony. The threat is called SPIT and the acronym represents Spam over Internet Telephony (SPIT). This paper is focused on an implementation of Spam over Internet Telephony and a defence against this type of threat. If you take the fact that Spam takes up 80-90% of the total number of attacks on Internet services, the threat of SPIT in the future is very real and dangerous. This view is also shared by many security experts. We can say that the only reason why the SPIT has no globally impact yet is that it requires in comparison with Spam greater requirements on computing power, hardware and network connectivity. But this barrier will be soon removed by increasing technological development. SPIT also has a much greater annoying effect and impact on the victim than Spam. Just imagine, unlike an incoming emails with Spam, which you can easily ignore and delete, the new attack containing SPIT advertising message will ring again and again several times a day. Software generating SPIT attack was developed by authors at CESNET. This tool is called SPITFILE and it is based on well-known SIP packet generator Sipp. This paper deals with SPITFILE application, which is programmed in Python and it should show, how easy is to generate this type of attack. Of course, the defend methods against this attack are mentioned too. We also made a model of an effective defence against SPIT which we implemented into software IP PBX Asterisk. Our model is based on a call rating factor and blacklist table, together it provides a good protection against SPIT.
引用
收藏
页码:200 / 203
页数:4
相关论文
共 50 条
  • [41] EPTI: Efficient Defence against Meltdown Attack for Unpatched VMs
    Hua, Zhichao
    Du, Dong
    Xia, Yubin
    Chen, Haibo
    Zang, Binyu
    PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, 2018, : 255 - 266
  • [42] Senators attack Pentagon over weak state of defence research
    Geoff Brumfiel
    Nature, 2002, 418 : 711 - 711
  • [43] Senators attack Pentagon over weak state of defence research
    Brumfiel, G
    NATURE, 2002, 418 (6899) : 711 - 711
  • [44] A Textual Clean-Label Backdoor Attack Strategy against Spam Detection
    Yerlikaya, Fahri Anil
    Bahtiyar, Serif
    2021 14TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2021), 2021,
  • [45] Research and Implementation of Experimental Platform for Network Attack and Defence Based on Honeynet
    Zhang Ting
    Guo Lin-hong
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 2221 - 2224
  • [46] Content-based Detection and Prevention of Spam over IP Telephony - System Design, Prototype and First Results
    Lentzen, Dirk
    Grutzek, Gary
    Knospe, Heiko
    Poerschmann, Christoph
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [47] Design and implementation of a measurement and alert system of QoS parameters in SIP based Internet Telephony
    Rios, Andre
    Alcober, Jesus
    Oller, Antoni
    Sempere, Victor
    2006 2ND CONFERENCE ON NEXT GENERATION INTERNET DESIGN AND ENGINEERING, 2006, : 117 - +
  • [48] Practical Defence against WEP and WPA-PSK Attack for WLAN
    Wang, Ying
    Jin, Zhigang
    Zhao, Ximan
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [49] DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN
    Hou, Jianwei
    Zhang, Ziqi
    Shi, Wenchang
    Qin, Bo
    Bin, Liang
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 503 - 520
  • [50] DIO Suppression Attack Against Routing in the Internet of Things
    Perazzo, Pericle
    Vallati, Carlo
    Anastasi, Giuseppe
    Dini, Gianluca
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (11) : 2524 - 2527