2005
DOI: 10.17487/rfc4189
|View full text |Cite
|
Sign up to set email alerts
|

Requirements for End-to-Middle Security for the Session Initiation Protocol (SIP)

Abstract: Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2006
2006
2013
2013

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 15 publications
0
3
0
1
Order By: Relevance
“…With the signal protocol, DoS attack can assault any part of the VoIP system because every VoIP component must process signaling. As most VoIP components rarely use strong [4,10,11] authentication mechanisms, the probability of an application level attack is rather high. Moreover, most network firewalls do not (by default) inspect higher layer communication which further increases chances of an application DoS attack to succeed.…”
Section: A Denial Of Service (Dos) Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…With the signal protocol, DoS attack can assault any part of the VoIP system because every VoIP component must process signaling. As most VoIP components rarely use strong [4,10,11] authentication mechanisms, the probability of an application level attack is rather high. Moreover, most network firewalls do not (by default) inspect higher layer communication which further increases chances of an application DoS attack to succeed.…”
Section: A Denial Of Service (Dos) Attackmentioning
confidence: 99%
“…x SIP Refer Attack -The REFER extension [11] provides a mechanism where the referrer provides the referee with an arbitrary URI to reference. Now, assuming that this URI is a SIP URI, the referee will send a SIP request (usually a SIP INVITE), to that URI (the refer target).…”
Section: A Denial Of Service (Dos) Attackmentioning
confidence: 99%
“…SIP messages can be protected with S/MIME in an end-to-end fashion. Extensions to the S/MIME protection scheme will allow to encrypt messages between end-systems and proxy servers as well as between proxies on a hop-by-hop basis [13].…”
Section: Privacy Issuesmentioning
confidence: 99%
“…Αυτό συμβαίνει κυρίως λόγω του ότι η ορθή εφαρμογή των υπαρχόντων μηχανισμών ασφάλειας επιτυγχάνει ένα ικανοποιητικό επίπεδο εμπιστευτικότητας. Με στόχο, λοιπόν, την ορθή εφαρμογή των υπαρχόντων μηχανισμών ασφαλείας προσδιορίστηκαν οι απαιτήσεις που πρέπει να ικανοποιούνται σε κάθε περίπτωση [97], όπως περιγράφονται στη συνέχεια:…”
Section: προστασία από επιθέσεις υποκλοπώνunclassified