Please use this identifier to cite or link to this item:
Title: Analysis and Deterrence of Threats on SIP
Researcher: Shekokar Narendra M.
Guide(s): Dr. Devane Satish R.
Keywords: VoIP System,Protocols,SIP
Upload Date: 7-Oct-2013
University: Narsee Monjee Institute of Management Studies
Completed Date: 30/05/2013
Abstract: Voice over IP (VoIP) is gaining more popularity in today s communication because of its rich multimedia feature and it is more economical compared to traditional PSTN (Public Telephone Switching System). SIP and RTP are two major protocols in VoIP system, which are responsible to initializing, establishing connection and communicating between two parties. SIP becomes one of the dominant signaling protocols because of its light weight nature but is more prone to attacks and security threats as it uses HTTP digest for authentication and all messages are exchanged in open text. Integrity, service and availability threats are amongst most important threats on VoIP system causing over billing, force teardown and denial of service attacks. An attempt has been made to classify all VoIP and SIP threats as confidentiality, availability, integrity and social threats category, we have focused our work on Force teardown, Billing and DoS attacks by providing innovative and unique solutions. newlineForce teardown attack is a result of interception of credential message from early communication and used later by attacker to send malformed message to victim machine it results in four types of billing attacks. These attacks are result of poor authentication, lack of confidentiality and integrity of SIP messages. In Billing attacks, attacker s objective is to prolong or terminate ongoing call by sending various malformed messages causing excess bill to the user. In addition to above attack, attacker also attempts DoS with intention of unavailability of service and resource to legitimate user. Lastly DoS attacks are caused by flooding of INVITE messages and by sending CANCLE, BYE message during session initiation and real time communication. newlineTo deter Force teardown attack confidentiality is provided to all signaling message by using well known symmetric encryption as well as designing a secured encryption algorithms to reduce the memory and CPU utilization.
Appears in Departments:Department of Computer Engineering

Files in This Item:
File Description SizeFormat 
01_title page.pdfAttached File403.08 kBAdobe PDFView/Open
02_table of content.pdf316.37 kBAdobe PDFView/Open
03_abbreviations list of figures & tables.pdf345.85 kBAdobe PDFView/Open
04_abstract.pdf219.67 kBAdobe PDFView/Open
05_chapter 1.pdf215.12 kBAdobe PDFView/Open
06_chapter 2.pdf575.45 kBAdobe PDFView/Open
07_chapter 3.pdf297.9 kBAdobe PDFView/Open
08_chapter 4.pdf221.24 kBAdobe PDFView/Open
09_chapter 5.pdf969.6 kBAdobe PDFView/Open
10_chapter 6.pdf485.37 kBAdobe PDFView/Open
11_chapter 7.pdf344.76 kBAdobe PDFView/Open
12_chapter 8.pdf483.21 kBAdobe PDFView/Open
13_chapter 9.pdf155.64 kBAdobe PDFView/Open
14_appendix.pdf258.38 kBAdobe PDFView/Open
15_references.pdf248.02 kBAdobe PDFView/Open
16_list of research publication.pdf214.99 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: