Review of SIP based DoS attacks

The Voice over Internet Protocol (VoIP). The VoIP is relatively new and is gaining more and more popularity as it offers a wide range of features and is much more cost effective as compared to the traditional PSTN. But the VoIP brings with it certain security threats which need to be resolved in o...

Full description

Bibliographic Details
Main Authors: Jama, Abdirisaq M., Khalifa, Othman Omran
Format: Article
Language:English
Published: ATS (Association of Technology and Science, India) 2016
Subjects:
Online Access:http://irep.iium.edu.my/54044/
http://irep.iium.edu.my/54044/
http://irep.iium.edu.my/54044/
http://irep.iium.edu.my/54044/1/Review%20of%20SIP%20based%20DoS%20attacks.pdf
id iium-54044
recordtype eprints
spelling iium-540442017-03-10T19:32:31Z http://irep.iium.edu.my/54044/ Review of SIP based DoS attacks Jama, Abdirisaq M. Khalifa, Othman Omran T Technology (General) The Voice over Internet Protocol (VoIP). The VoIP is relatively new and is gaining more and more popularity as it offers a wide range of features and is much more cost effective as compared to the traditional PSTN. But the VoIP brings with it certain security threats which need to be resolved in order to make it a more reliable source of communication. Session Initiation Protocol (SIP) today is considered the standard protocol for multimedia signaling, and the result is a very generic protocol. SIP is specified by the IETF in RFC 3261. From a structural and functional perspective, SIP is application layer signaling text-based protocol used for creating, modifying, and terminating multimedia communications sessions among Internet endpoints. Unfortunately, SIP-based application services can suffer from various security threats as Denial of Service (DoS). attacks on a SIP based VoIP infrastructure that can severely compromise its reliability. In contrast, little work is done to analyze the robustness and reliability of SIP severs under DoS attacks. In this survey, we are discussing the DoS flooding attack on SIP server. Firstly, we present a brief overview about the SIP protocol. Then, security attacks related to SIP protocol. After that, detection techniques of SIP flooding attack and various exploited resources due to attack were discussed and finally the paper reviews previous work done on SIP based DoS attacks ATS (Association of Technology and Science, India) 2016 Article PeerReviewed application/pdf en http://irep.iium.edu.my/54044/1/Review%20of%20SIP%20based%20DoS%20attacks.pdf Jama, Abdirisaq M. and Khalifa, Othman Omran (2016) Review of SIP based DoS attacks. International Journal of Computer Applications Technology and Research, 5 (12). pp. 775-781. ISSN 2319-8656 http://ijcat.com/archives/volume5/issue12/ijcatr05121007.pdf 10.7753/IJCATR0512.1007
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic T Technology (General)
spellingShingle T Technology (General)
Jama, Abdirisaq M.
Khalifa, Othman Omran
Review of SIP based DoS attacks
description The Voice over Internet Protocol (VoIP). The VoIP is relatively new and is gaining more and more popularity as it offers a wide range of features and is much more cost effective as compared to the traditional PSTN. But the VoIP brings with it certain security threats which need to be resolved in order to make it a more reliable source of communication. Session Initiation Protocol (SIP) today is considered the standard protocol for multimedia signaling, and the result is a very generic protocol. SIP is specified by the IETF in RFC 3261. From a structural and functional perspective, SIP is application layer signaling text-based protocol used for creating, modifying, and terminating multimedia communications sessions among Internet endpoints. Unfortunately, SIP-based application services can suffer from various security threats as Denial of Service (DoS). attacks on a SIP based VoIP infrastructure that can severely compromise its reliability. In contrast, little work is done to analyze the robustness and reliability of SIP severs under DoS attacks. In this survey, we are discussing the DoS flooding attack on SIP server. Firstly, we present a brief overview about the SIP protocol. Then, security attacks related to SIP protocol. After that, detection techniques of SIP flooding attack and various exploited resources due to attack were discussed and finally the paper reviews previous work done on SIP based DoS attacks
format Article
author Jama, Abdirisaq M.
Khalifa, Othman Omran
author_facet Jama, Abdirisaq M.
Khalifa, Othman Omran
author_sort Jama, Abdirisaq M.
title Review of SIP based DoS attacks
title_short Review of SIP based DoS attacks
title_full Review of SIP based DoS attacks
title_fullStr Review of SIP based DoS attacks
title_full_unstemmed Review of SIP based DoS attacks
title_sort review of sip based dos attacks
publisher ATS (Association of Technology and Science, India)
publishDate 2016
url http://irep.iium.edu.my/54044/
http://irep.iium.edu.my/54044/
http://irep.iium.edu.my/54044/
http://irep.iium.edu.my/54044/1/Review%20of%20SIP%20based%20DoS%20attacks.pdf
first_indexed 2023-09-18T21:16:28Z
last_indexed 2023-09-18T21:16:28Z
_version_ 1777411595475877888