Title :
Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP
Author :
Chen, Zhe ; Guo, Shize ; Zheng, Kangfeng ; Li, Haitao
Author_Institution :
Key Lab. of Network & Inf. Attack & Defence Technol. of MOE, Beijing Univ. of Posts & Telecommun., Beijing
Abstract :
As the number of VoIP users increase and as the deployment of SIP devices gains ground, security has risen as a potential issue worthy of our consideration. VoIP is an application running on the data network and as such, inherits the security issues common to IP. The man-in-the-middle (MitM) attacks and the denial of service (DoS) attacks are the hackneyed and evil cyber attacks in the IP which can be easily implemented in the SIP VoIP. In this paper, a unified communication model of SIP VoIP infrastructure is established to analyze the DoS attacks launched by the MitM (MitM-DoS). Then we use the set theory to research the models of MitM-DoS attacks formally.
Keywords :
IP networks; Internet telephony; protocols; security of data; set theory; telecommunication security; DoS attacks; MitM-DoS; SIP VoIP infrastructure; SIP devices; VoIP users; communication model; cyber attacks; data network; man-in-the-middle attacks; man-in-the-middle denial of service attack; set theory; Communication switching; Computer crime; Data security; IP networks; Information security; Internet telephony; Laboratories; National security; Protocols; Web and internet services; MitM-DoS; P-model; Q-model; SIP; VoIP;
Conference_Titel :
Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-1-4244-4223-2
DOI :
10.1109/NSWCTC.2009.326