A Novel SIP Based Distributed Reflection Denial-of-Service Attack and an Effective Defense Mechanism
We introduce a novel SIP based attack, named as the SR-DRDoS attack, that exploits some less known SIP features by using the IP-spoofing technique, the reflection based attack logic and the DDoS attack logic.
I. Melih Tas +2 more
doaj +3 more sources
SIP security issues: the SIP authentication procedure and its processing load
Session Initiation Protocol (SIP) is currently receiving much attention and seems to be the most promising candidate as a signaling protocol for the current and future IP telephony services, also becoming a real competitor to the plain old telephone service.
S. Salsano, D. Papalilo, VELTRI, Luca
openaire +4 more sources
Stateful SIP Protocol with Enhanced Security for Proactive Response on SIP Attack [PDF]
The user valence of VoIP services with SIP protocol is increasing rapidly because of cheap communication cost and its conveniency. But attacker can easily modify the packet contents of SIP protocol as SIP header is transmitted by using UDP methods in text form.
Ha-Na Yun, Hyung-Woo Lee
openaire +3 more sources
A robust ECC based mutual authentication protocol with anonymity for session initiation protocol. [PDF]
Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services.
Zahid Mehmood +4 more
doaj +1 more source
A SIP Security Testing Framework [PDF]
Session Initiation Protocol (SIP) has emerged as the predominant protocol for setting up, maintaining, and terminating Voice over Internet Protocol (VoIP) sessions. In spite of the security mechanisms that it offers, several attacks are being made on the SIP architecture.
Hemanth Srinivasan, Kamil Sarac
openaire +1 more source
SecSip: A Stateful Firewall for SIP-based Networks [PDF]
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches
Festor, Olivier, Lahmadi, Abdelkader
core +5 more sources
A real-time SIP network simulation and monitoring system
In this work we present a real time SIP network simulation and monitoring system. The SIP network simulator is based on a probabilistic generative model that mimics a social network of VoIP subscribers calling each other at random times.
Çağatay Yıldız +4 more
doaj +1 more source
A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP [PDF]
Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is
Tang, Shanyu +2 more
core +1 more source
An Improved Three-Factor Session Initiation Protocol Using Chebyshev Chaotic Map
Session Initiation Protocol (SIP) is the most widely used signalling protocol for controlling communication, establishing, maintaining, and terminating sessions on the Internet.
Xiang-Yu Guo, Da-Zhi Sun, Ying Yang
doaj +1 more source
An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy. [PDF]
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al.
Shuming Qiu +3 more
doaj +1 more source

