2009 6th IEEE Consumer Communications and Networking Conference 2009
DOI: 10.1109/ccnc.2009.4784778
|View full text |Cite
|
Sign up to set email alerts
|

A SIP Security Testing Framework

Abstract: Abstract-Session Initiation Protocol (SIP) has emerged as the predominant protocol for setting up, maintaining, and terminating Voice over Internet Protocol (VoIP) sessions. In spite of the security mechanisms that it offers, several attacks are being made on the SIP architecture. In this paper we take a proactive approach and highlight the importance of testing SIP from a security perspective. We first give a brief introduction to some of the most common attacks on SIP. We then describe a framework to effecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Similarly, there are frameworks that address system atic methods of security testing for automotive Blue tooth, Vehicular Ad Hoc Networks (VANETS) in Intelli gent Transportation Systems (ITS) and road services [11], [12], [13]. Finally there are integrated security testing frameworks that improve the standardized methods [9], [14], [15], [16], [17]. All of these works, however, do not encompass a defined process for automated security testing of complete automotive systems in a holistic manner.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, there are frameworks that address system atic methods of security testing for automotive Blue tooth, Vehicular Ad Hoc Networks (VANETS) in Intelli gent Transportation Systems (ITS) and road services [11], [12], [13]. Finally there are integrated security testing frameworks that improve the standardized methods [9], [14], [15], [16], [17]. All of these works, however, do not encompass a defined process for automated security testing of complete automotive systems in a holistic manner.…”
Section: Related Workmentioning
confidence: 99%
“…state transition to achieve the goal) might have some adverse effects, especially in the case of complex goals. The fitness function defined in [9], though being similar in goal, may not be effective in detecting deeply rooted vulnerabilities. KiF [10] uses model inference with manually crafted inputs for state transitions, whereas we tried to automatize this step using GA and the attack grammar.…”
Section: Related Workmentioning
confidence: 99%
“…For that purpose the authors have used a customized analysis tool with the ability to synthesize and launch different types of attacks. The work in [20] analyzes several attacks that are being made on the SIP architecture. Within such purpose, the authors give a brief introduction to some of the most common attacks on SIP, and then describe a framework to effectively test several security aspects of a SIP network and thereby help mitigate such attacks.…”
Section: Introductionmentioning
confidence: 99%