Review of SIP based DoS attacks
The Voice over Internet Protocol (VoIP). The VoIP is relatively new and is gaining more and more popularity as it offers a wide range of features and is much more cost effective as compared to the traditional PSTN. But the VoIP brings with it certain security threats which need to be resolved in o...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
ATS (Association of Technology and Science, India)
2016
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/54044/ http://irep.iium.edu.my/54044/ http://irep.iium.edu.my/54044/ http://irep.iium.edu.my/54044/1/Review%20of%20SIP%20based%20DoS%20attacks.pdf |
id |
iium-54044 |
---|---|
recordtype |
eprints |
spelling |
iium-540442017-03-10T19:32:31Z http://irep.iium.edu.my/54044/ Review of SIP based DoS attacks Jama, Abdirisaq M. Khalifa, Othman Omran T Technology (General) The Voice over Internet Protocol (VoIP). The VoIP is relatively new and is gaining more and more popularity as it offers a wide range of features and is much more cost effective as compared to the traditional PSTN. But the VoIP brings with it certain security threats which need to be resolved in order to make it a more reliable source of communication. Session Initiation Protocol (SIP) today is considered the standard protocol for multimedia signaling, and the result is a very generic protocol. SIP is specified by the IETF in RFC 3261. From a structural and functional perspective, SIP is application layer signaling text-based protocol used for creating, modifying, and terminating multimedia communications sessions among Internet endpoints. Unfortunately, SIP-based application services can suffer from various security threats as Denial of Service (DoS). attacks on a SIP based VoIP infrastructure that can severely compromise its reliability. In contrast, little work is done to analyze the robustness and reliability of SIP severs under DoS attacks. In this survey, we are discussing the DoS flooding attack on SIP server. Firstly, we present a brief overview about the SIP protocol. Then, security attacks related to SIP protocol. After that, detection techniques of SIP flooding attack and various exploited resources due to attack were discussed and finally the paper reviews previous work done on SIP based DoS attacks ATS (Association of Technology and Science, India) 2016 Article PeerReviewed application/pdf en http://irep.iium.edu.my/54044/1/Review%20of%20SIP%20based%20DoS%20attacks.pdf Jama, Abdirisaq M. and Khalifa, Othman Omran (2016) Review of SIP based DoS attacks. International Journal of Computer Applications Technology and Research, 5 (12). pp. 775-781. ISSN 2319-8656 http://ijcat.com/archives/volume5/issue12/ijcatr05121007.pdf 10.7753/IJCATR0512.1007 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Jama, Abdirisaq M. Khalifa, Othman Omran Review of SIP based DoS attacks |
description |
The Voice over Internet Protocol (VoIP). The VoIP is relatively new and is gaining more and more popularity as it offers a
wide range of features and is much more cost effective as compared to the traditional PSTN. But the VoIP brings with it certain
security threats which need to be resolved in order to make it a more reliable source of communication. Session Initiation Protocol
(SIP) today is considered the standard protocol for multimedia signaling, and the result is a very generic protocol. SIP is specified by
the IETF in RFC 3261. From a structural and functional perspective, SIP is application layer signaling text-based protocol used for
creating, modifying, and terminating multimedia communications sessions among Internet endpoints. Unfortunately, SIP-based
application services can suffer from various security threats as Denial of Service (DoS). attacks on a SIP based VoIP infrastructure that
can severely compromise its reliability. In contrast, little work is done to analyze the robustness and reliability of SIP severs under
DoS attacks. In this survey, we are discussing the DoS flooding attack on SIP server. Firstly, we present a brief overview about the SIP
protocol. Then, security attacks related to SIP protocol. After that, detection techniques of SIP flooding attack and various exploited
resources due to attack were discussed and finally the paper reviews previous work done on SIP based DoS attacks |
format |
Article |
author |
Jama, Abdirisaq M. Khalifa, Othman Omran |
author_facet |
Jama, Abdirisaq M. Khalifa, Othman Omran |
author_sort |
Jama, Abdirisaq M. |
title |
Review of SIP based DoS attacks |
title_short |
Review of SIP based DoS attacks |
title_full |
Review of SIP based DoS attacks |
title_fullStr |
Review of SIP based DoS attacks |
title_full_unstemmed |
Review of SIP based DoS attacks |
title_sort |
review of sip based dos attacks |
publisher |
ATS (Association of Technology and Science, India) |
publishDate |
2016 |
url |
http://irep.iium.edu.my/54044/ http://irep.iium.edu.my/54044/ http://irep.iium.edu.my/54044/ http://irep.iium.edu.my/54044/1/Review%20of%20SIP%20based%20DoS%20attacks.pdf |
first_indexed |
2023-09-18T21:16:28Z |
last_indexed |
2023-09-18T21:16:28Z |
_version_ |
1777411595475877888 |