Wednesday, September 18, 2019

SIP Security Essay -- Information Technology

Abstract The session initiation protocol (SIP) is emerging as standard protocol for session control in Next generation voice over internet protocol (VoIP) As it is based on IP it is vulnerable to all IP related threats . Among all the attacks, flood-based denial of service DoS attack is one of the main threats to SIP. Several solutions regarding prevention of DoS are discussed. Efficient Security scheme is proposed for batter performance. I. INTRODUCTION Session Initiation Protocol (SIP) [1] is signaling protocol given by the Internet Engineering Task Force (IETF) for IP telephony. Moreover, the 3rd generation partnership program (3GPP) has chosen SIP as a signaling protocol in IP multimedia subsystem (IMS). With more and more multimedia applications and the digital audio/video transport over IP-based networks, SIP is becoming the de-facto signaling protocol. In fact, SIP is a session control protocol that can establish, modify, and terminate multimedia sessions such as Internet telephone calls (VoIP). SIP users are indicated by Uniform Resource Identifiers (URI), consisting of a pair of user name and domain name, e.g. sip:ali@abc.co.uk , which is similar to the email format. SIP signaling between multiple users consists of requests and responses .A call is set up in SIP by the three-way handshake composed of INVITE, 200 OK and ACK messages. The INVITE request asks the cal lee to join or establish a call. If the cal lee’s response indicates that he/she accepts the call by sending the 200 OK response message, the caller confirms that it has received the response by sending the ACK message. When the caller or cal lee wishes to terminate a call, they send a BYE request. ... ... June 2001. [8] T. Peng, C. Leckie, and K. Ramamohanarao, â€Å"Protection from distributed denial of service attacks using history-based IP 108 filtering,† Communications, 2003. ICC'03. IEEE International Conference on, vol. 1, 2003 [9] S. D. D'Souza, and D. Vinokurov, â€Å"Queuing methods for mitigation of packet spoofing†, US Patent App, 2004 [10] M.A. Akbar, M.Farooq, â€Å"Application of Evolutionary Algorithms in Detection of SIP based Flooding Attacks†GECCO’09, July 8–12,2009, Montrà ©al Quà ©bec, Canada.ACM. [11] M.A. Akbar, Z.Tariq and M.Farooq, â€Å"A Comparative Study of Anomaly Detection Algorithms for Detection of SIP Flooding in IMS†, Next Generation Intelligent Networks Research Center (nexGIN RC), 2009.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.