2006
DOI: 10.1109/comst.2006.253270
|View full text |Cite
|
Sign up to set email alerts
|

Survey of security vulnerabilities in session initiation protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
100
0
4

Year Published

2011
2011
2018
2018

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 174 publications
(104 citation statements)
references
References 25 publications
0
100
0
4
Order By: Relevance
“…These are alarming trends since such vulnerabilities can potentially give attackers the ability to listen-in on confidential voice communications or launch denial of service attacks as reported in previous studies [15,16].…”
Section: Prevalence Of Malicious Traffic In the Cellular Networkmentioning
confidence: 99%
“…These are alarming trends since such vulnerabilities can potentially give attackers the ability to listen-in on confidential voice communications or launch denial of service attacks as reported in previous studies [15,16].…”
Section: Prevalence Of Malicious Traffic In the Cellular Networkmentioning
confidence: 99%
“…The selection of these symbols reflects the different parts of a SIP message that an attacker could craft in order to launch a resource consumption or other type of attack. In fact, this method of assault is well-documented and evaluated in various researches so far [7,8,9,31]. For instance, a malicious actor could fabricate different SIP messages by modifying some of their parts 135 such as <Via>, <From>, <To>, <Call-ID> headers or even the First Line (corresponding to symbols S2 -S5, and S1 in Figure 1) depending on the situation at hand.…”
Section: Symbol Definitionmentioning
confidence: 99%
“…Despite the advantages users enjoy due to SIP flexibility, various attacks have been 10 identified against SIP-based VoIP services [7,8,9]. To alleviate, if not eliminate, such security flaws a diversity of detection and prevention solutions have been proposed in the literature [10,11,12,13,14].…”
mentioning
confidence: 99%
“…Fig. 2 shows a classification of attack mechanisms targeting the corresponding TCP/IP layers, and the resulting violations of the CIA security mechanism [4].…”
Section: Sip Threats Taxonomy and Attacksmentioning
confidence: 99%
“…Since VoIP uses the Internet Protocol (IP) to transfer voice data, so it inherits same threats, risks and vulnerabilities of the Internet, added to threats targeting the SIP signaling protocol [4]. SIP is a text based client-server protocol similar to the HTTP, and this text-based nature can cause weakness and arising vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%