Loading [a11y]/accessibility-menu.js
Anatomy of SIP registration removal attack and defense strategies | IEEE Conference Publication | IEEE Xplore

Anatomy of SIP registration removal attack and defense strategies


Abstract:

This Popularity of VoIP and SIP technologies has been started at last years. SIP applications will have an important place in the future. VoIP/SIP security technologies a...Show More

Abstract:

This Popularity of VoIP and SIP technologies has been started at last years. SIP applications will have an important place in the future. VoIP/SIP security technologies are not known as much as TCP/IP's security world. Hence, VoIP/SIP security technologies, developments and researches are very important for academic and commercial. In this study, signaling vulnerabilities of registration mechanism in Session Initiation Protocol (SIP) which is used in next generation communication environment known as Unified Communications (UC) systems has been mentioned. The results of registration removal attack which has been carried out at VoIP security laboratory environment are shared, anatomy of attack and the defense strategies for that attack type are mentioned.
Date of Conference: 23-25 April 2014
Date Added to IEEE Xplore: 12 June 2014
Electronic ISBN:978-1-4799-4874-1
Print ISSN: 2165-0608
Conference Location: Trabzon, Turkey

References

References is not available for this document.