SIP Security

2500 Words5 Pages

Abstract

The session initiation protocol (SIP) is emerging as standard protocol for session control in Next generation voice over internet protocol (VoIP) As it is based on IP it is vulnerable to all IP related threats . Among all the attacks, flood-based denial of service DoS attack is one of the main threats to SIP. Several solutions regarding prevention of DoS are discussed. Efficient Security scheme is proposed for batter performance.

I. INTRODUCTION

Session Initiation Protocol (SIP) [1] is signaling protocol given by the Internet Engineering Task Force (IETF) for IP telephony. Moreover, the 3rd generation partnership program (3GPP) has chosen SIP as a signaling protocol in IP multimedia subsystem (IMS). With more and more multimedia applications and the digital audio/video transport over IP-based networks, SIP is becoming the de-facto signaling protocol. In fact, SIP is a session control protocol that can establish, modify, and terminate multimedia sessions such as Internet telephone calls (VoIP). SIP users are indicated by Uniform Resource Identifiers (URI), consisting of a pair of user name and domain name, e.g. sip:ali@abc.co.uk , which is similar to the email format.

SIP signaling between multiple users consists of requests and responses .A call is set up in SIP by the three-way handshake composed of INVITE, 200 OK and ACK messages. The INVITE request asks the cal lee to join or establish a call. If the cal lee’s response indicates that he/she accepts the call by sending the 200 OK response message, the caller confirms that it has received the response by sending the ACK message. When the caller or cal lee wishes to terminate a call, they send a BYE request.

...

... middle of paper ...

... June 2001.

[8] T. Peng, C. Leckie, and K. Ramamohanarao,

“Protection from distributed denial of service

attacks using history-based IP 108 filtering,”

Communications, 2003. ICC'03. IEEE

International Conference on, vol. 1, 2003

[9] S. D. D'Souza, and D. Vinokurov, “Queuing

methods for mitigation of packet spoofing”,

US Patent App, 2004

[10] M.A. Akbar, M.Farooq, “Application of

Evolutionary Algorithms in Detection of SIP

based Flooding Attacks”GECCO’09, July

8–12,2009, Montréal Québec, Canada.ACM.

[11] M.A. Akbar, Z.Tariq and M.Farooq,

“A Comparative Study of Anomaly Detection

Algorithms for Detection of SIP Flooding in

IMS”, Next Generation Intelligent Networks

Research Center (nexGIN RC), 2009.

Open Document