Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/11760
Title: | Analysis and Deterrence of Threats on SIP |
Researcher: | Shekokar Narendra M. |
Guide(s): | Dr. Devane Satish R. |
Keywords: | VoIP System,Protocols,SIP |
Upload Date: | 7-Oct-2013 |
University: | Narsee Monjee Institute of Management Studies |
Completed Date: | 30/05/2013 |
Abstract: | Voice over IP (VoIP) is gaining more popularity in today s communication because of its rich multimedia feature and it is more economical compared to traditional PSTN (Public Telephone Switching System). SIP and RTP are two major protocols in VoIP system, which are responsible to initializing, establishing connection and communicating between two parties. SIP becomes one of the dominant signaling protocols because of its light weight nature but is more prone to attacks and security threats as it uses HTTP digest for authentication and all messages are exchanged in open text. Integrity, service and availability threats are amongst most important threats on VoIP system causing over billing, force teardown and denial of service attacks. An attempt has been made to classify all VoIP and SIP threats as confidentiality, availability, integrity and social threats category, we have focused our work on Force teardown, Billing and DoS attacks by providing innovative and unique solutions. newlineForce teardown attack is a result of interception of credential message from early communication and used later by attacker to send malformed message to victim machine it results in four types of billing attacks. These attacks are result of poor authentication, lack of confidentiality and integrity of SIP messages. In Billing attacks, attacker s objective is to prolong or terminate ongoing call by sending various malformed messages causing excess bill to the user. In addition to above attack, attacker also attempts DoS with intention of unavailability of service and resource to legitimate user. Lastly DoS attacks are caused by flooding of INVITE messages and by sending CANCLE, BYE message during session initiation and real time communication. newlineTo deter Force teardown attack confidentiality is provided to all signaling message by using well known symmetric encryption as well as designing a secured encryption algorithms to reduce the memory and CPU utilization. |
Pagination: | |
URI: | http://hdl.handle.net/10603/11760 |
Appears in Departments: | Department of Computer Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title page.pdf | Attached File | 403.08 kB | Adobe PDF | View/Open |
02_table of content.pdf | 316.37 kB | Adobe PDF | View/Open | |
03_abbreviations list of figures & tables.pdf | 345.85 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 219.67 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 215.12 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 575.45 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 297.9 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 221.24 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 969.6 kB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 485.37 kB | Adobe PDF | View/Open | |
11_chapter 7.pdf | 344.76 kB | Adobe PDF | View/Open | |
12_chapter 8.pdf | 483.21 kB | Adobe PDF | View/Open | |
13_chapter 9.pdf | 155.64 kB | Adobe PDF | View/Open | |
14_appendix.pdf | 258.38 kB | Adobe PDF | View/Open | |
15_references.pdf | 248.02 kB | Adobe PDF | View/Open | |
16_list of research publication.pdf | 214.99 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: