Topic > SIP Security - 2500

AbstractSession Initiation Protocol (SIP) is emerging as the standard protocol for session control in the next generation Voice over Internet Protocol (VoIP). Since it is IP based, it is vulnerable to all IP related threats. Among all attacks, Flood-based Denial of Service attack is one of the major threats to SIP. Several solutions regarding DoS prevention are discussed. An efficient safety scheme for battery performance is proposed.I. INTRODUCTIONSession Initiation Protocol (SIP) [1] is a signaling protocol provided by the Internet Engineering Task Force (IETF) for IP telephony. Additionally, the Third Generation Partnership Program (3GPP) has chosen SIP as the signaling protocol in the IP Multimedia Subsystem (IMS). With the growing number of multimedia and digital audio/video transport applications over IP-based networks, SIP is becoming the de facto signaling protocol. In fact, SIP is a session control protocol capable of establishing, modifying and terminating multimedia sessions such as Internet telephone calls (VoIP). SIP users are referred to by Uniform Resource Identifiers (URIs), consisting of a username and domain name pair, such as sip:[email protected] , which is similar to the email format. SIP signaling between multiple users consists of requests and responses. A call is set up in SIP by the three-way handshake consisting of INVITE, 200 OK and ACK messages. The INVITE request asks the call recipient to join or establish a call. If the callee's response indicates that he accepts the call by sending the response message 200 OK, the caller confirms that he has received the response by sending the ACK message. When the caller or person being called wants to end a call, they send a BYE request....... middle of paper... June 2001.[8] T. Peng, C. Leckie, and K. Ramamohanarao, “Protection against distributed denial-of-service attacks using history-based IP 108 filtering,” Communications, 2003. ICC'03. IEEE International Conference on, vol. 1, 2003[9] SD D'Souza and D. Vinokurov, “Queuingmethods for mitigation of packet spoofing”, US Patent App, 2004[10] MA Akbar, M.Farooq, “Application of Evolutionary Algorithms in Detection of SIPbased Flooding Attacks " GECCO'09, 8–12 July 2009, Montréal Québec, Canada.ACM.[11] M.A. Akbar, Z.Tariq and M.Farooq, “A Comparative Study on Anomaly Detection Algorithms for SIP Flooding Detection in IMS” , Next Generation Intelligent Grid Research Center (nexGIN RC), 2009.