2015
DOI: 10.1002/sec.1328
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP)

Abstract: Session Initiation Protocol (SIP) is widely used as a signaling protocol to support voice and video communication in addition to other multimedia applications. However, it is vulnerable to several types of attacks because of its open nature and lack of a clear defense line against the increasing spectrum of security threats. Among these threats, flooding attack, known by its destructive impact, targets both of SIP User Agent Server (UAS) and User Agent Client (UAC), leading to a denial of service in Voice over… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 39 publications
0
9
0
Order By: Relevance
“…The attacker could be a legitimate user if such attacker has an account in the SIP server, or even an intruder who has violated the authentication requirements. Furthermore, this attack can be launched using a single source (i.e., DoS attack) or multiple sources (i.e., DDoS attack) to send INVITE messages to the end-user or the server [ 38 ].…”
Section: Datasetmentioning
confidence: 99%
“…The attacker could be a legitimate user if such attacker has an account in the SIP server, or even an intruder who has violated the authentication requirements. Furthermore, this attack can be launched using a single source (i.e., DoS attack) or multiple sources (i.e., DDoS attack) to send INVITE messages to the end-user or the server [ 38 ].…”
Section: Datasetmentioning
confidence: 99%
“…Moreover, they analyzed four articles and evaluated them according to their advantages and limitations. Hussain et al [14] introduced a comprehensive study of SIP flooding DoS attacks. They classified the research work reviewed (consisting of 26 publications) according to attack behavior, attack type (internal or external), and attack target (proxy server or end-user).…”
Section: Related Workmentioning
confidence: 99%
“…From the previous discussion, it can be noted that published surveys are either limited in their scope to a specific type of DoS attacks [13,14] or examined them with limited aspects of comparison [15] or did not provide a review of the recently published articles [16]. Hence there is a need for a recent and in-depth survey.…”
Section: Related Workmentioning
confidence: 99%
“…A comprehensive survey paper on VoIP security research indicates that half of DoS-related vulnerabilities are on the endpoints [10]. Hussain et al (2015) in their comprehensive study of flooding attack wrote that SIP INVITE message is considered as one of the major root causes [7], and applicationlevel DDoS flooding attacks like SIP remain to be an open problems [12]. Some of the related works that use destinationbased as well as source-based approach are as follows: Ormazabal et al (2008) [5] introduced carrier class, CAMaccelerated solution for SIP DoS defense called "Secure SIP."…”
Section: A Related Workmentioning
confidence: 99%