2010
DOI: 10.1007/978-3-642-13241-4_14
|View full text |Cite
|
Sign up to set email alerts
|

SIP Proxies: New Reflectors in the Internet

Abstract: Abstract. To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificate distribution in this mechanism yields some vulnerabilities. In this paper, we investigate an attack which exploits SIP infrastructures as reflectors to bring down a web server. Our experiments demonstrate that the attacks can be easily mounted. Finally, we discuss some potential methods to prevent this vulnerability.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…This protocol offers no confidentiality protection for conveying a session key and, as for S/MIME, requires that network intermediaries do not alter the message content. It is also subject to DoS attacks because of signature processing and certificate recovering by the responder, as explained in [57].…”
Section: Security Protocols For Voip Signallingmentioning
confidence: 99%
“…This protocol offers no confidentiality protection for conveying a session key and, as for S/MIME, requires that network intermediaries do not alter the message content. It is also subject to DoS attacks because of signature processing and certificate recovering by the responder, as explained in [57].…”
Section: Security Protocols For Voip Signallingmentioning
confidence: 99%