2020
DOI: 10.1016/j.comnet.2020.107250
|View full text |Cite
|
Sign up to set email alerts
|

A survey on registration hijacking attack consequences and protection for session initiation protocol (SIP)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…To create and manage multimedia sessions, signaling protocols are implemented. There are currently two standard protocols on the market that are commonly used, SIP and H.323 [19]. Our research went through the behavior of two VoIP protocols modulated, and the performance will be evaluated through building scenarios on a QualNet simulator, using the Random Waypoint Mobility Model (RWP) the random nodes will choose the direction and its constant speed in each movement randomly and then after shortstop period it will choose another destination and another constant speed, therefore, it considers close to reality and better than choose various steady scenarios [20].…”
Section: Methodsmentioning
confidence: 99%
“…To create and manage multimedia sessions, signaling protocols are implemented. There are currently two standard protocols on the market that are commonly used, SIP and H.323 [19]. Our research went through the behavior of two VoIP protocols modulated, and the performance will be evaluated through building scenarios on a QualNet simulator, using the Random Waypoint Mobility Model (RWP) the random nodes will choose the direction and its constant speed in each movement randomly and then after shortstop period it will choose another destination and another constant speed, therefore, it considers close to reality and better than choose various steady scenarios [20].…”
Section: Methodsmentioning
confidence: 99%
“…As a result, most organisations find PBX security to be a difficult task. PBX is still vulnerable to brute-force attacks on SIP accounts with weak passwords [4]. In addition, hackers attempt to gain unauthorised use of telephony system 978-1-6654-0722-9/21/$31.00 ©2021 IEEE to hijack calls, steal users' information, or perform denial of service attacks to prevent the user from accessing services.…”
Section: A Problem Statementmentioning
confidence: 99%
“…Finally, the shortcomings of existing solutions and future research directions were outlined. Naeem et al [12] provided a thorough analysis of the SIP's registration attack. They categorized the surveyed solutions based on their approaches, targets, and types.…”
Section: Related Workmentioning
confidence: 99%