Skip to main content

A Call Conference Room Interception Attack and Its Detection

  • Conference paper
Trust, Privacy and Security in Digital Business (TrustBus 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6264))

Abstract

The IP Multimedia Subsystem (IMS) infrastructure is currently considered to be the main core of Next Generation Networks (NGNs), integrating IP and other network types under one common infrastructure. Consequently, IMS inherits security flaws and vulnerabilities residing in all those technologies. Besides, the protection against unauthorized access in NGN services is of great importance. In this paper we present a call conference room interception attack and we propose a new cross layer architecture to shield IMS against it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rosenberg, J., Schulzrinne, H., Camarillo, G., et al.: RFC 3261: SIP: Session Initiation Protocol (2002)

    Google Scholar 

  2. I. T. Union: H323 Packet Based Multimedia Communications Systems, Telecommunication Standardization Sector of ITU (1998)

    Google Scholar 

  3. 3GPP, TS 23.228: IP Multimedia Subsystems (IMS), Third Generation Partnership Project, Technical Specification Group Services and System Aspects (2008)

    Google Scholar 

  4. Geneiatakis, D., Dagiouklas, A., Kambourakis, G., et al.: Survey of security vulnerabilities in Session Initiation Protocol. IEEE Communications Surveys and Tutorials 8, 68–81 (2006)

    Article  Google Scholar 

  5. Sisalem, D., Kuthan, J., Ehlert, S., et al.: Denial of Service Attacks Targeting a SIP VoIP Infrastructure: Attack Scenarios and Prevention Mechanisms. IEEE Network 20(5), 26 (2006)

    Article  Google Scholar 

  6. Geneiatakis, D., Lambrinoudakis, C.: A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment. Telecommunication Systems 36(4), 153–159 (2007)

    Article  Google Scholar 

  7. Ramsdell, B.: RFC 2633: S/MIME version 3 message specification (1999)

    Google Scholar 

  8. 3GPP, TS 33.203: 3G security; Access security for IP-based services (Release 9), Third Generation Partnership Project, Technical Specification Group Services and System Aspects (2009)

    Google Scholar 

  9. 3GPP, TS 24.229: IP Multimedia Call Control Based on SIP and SDP, Techincal Specification Group Core Network and Terminals (2009)

    Google Scholar 

  10. 3GPP, TR 33.978 Security aspects of early IP Multimedia Subsystem (IMS), Third Generation Partnership Project, Technical Specification Group Services and System Aspects (2008)

    Google Scholar 

  11. ETSI, TS 187 003: Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN): Security Architecture (2008)

    Google Scholar 

  12. Sparks, R.: RFC 3515: The Session Initiation Protocol (SIP) Refer Method (2003)

    Google Scholar 

  13. Johnston, A.B.: SIP: Understanding the Session Initiation Protocol. Artech House (2004)

    Google Scholar 

  14. Klein, A.: BIND 9 DNS cache poisoning, http://www.trusteer.com/docs/bind9dns.html

  15. Zhang, R., Wang, X., Farley, R., et al.: On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers, pp. 61–69

    Google Scholar 

  16. Wagner, R.: Address resolution protocol spoofing and man-in-the-middle attacks. The SANS Institute (2001)

    Google Scholar 

  17. 3GPP, TS 24.147: Conferencing using the IP Multimedia (IM) Core Network (CN) subsystem, Technical Specification Group Core Network and Terminals (2009)

    Google Scholar 

  18. Kent, S., Atkinson, R.: RFC 2401: Security Architecture for the Internet Protocol. Network Working Group (1998)

    Google Scholar 

  19. Dierks, T., Allen, C.: RFC 2246: The TLS Protocol Version 1.0, RFC Editor (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vrakas, N., Geneiatakis, D., Lambrinoudakis, C. (2010). A Call Conference Room Interception Attack and Its Detection. In: Katsikas, S., Lopez, J., Soriano, M. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2010. Lecture Notes in Computer Science, vol 6264. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15152-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15152-1_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15151-4

  • Online ISBN: 978-3-642-15152-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics