Browse > Article
http://dx.doi.org/10.5392/JKCA.2010.10.1.046

Stateful SIP Protocol with Enhanced Security for Proactive Response on SIP Attack  

Yun, Ha-Na (한신대학교 컴퓨터공학부)
Lee, Hyung-Woo (한신대학교 컴퓨터공학부)
Publication Information
Abstract
The user valence of VoIP services with SIP protocol is increasing rapidly because of cheap communication cost and its conveniency. But attacker can easily modify the packet contents of SIP protocol as SIP header is transmitted by using UDP methods in text form. The reason is that SIP protocols does not provide an authentication function on the transmission session. Therefore, existing SIP protocol is very weak on SIP Packet Flooding attack etc. In order to solve like this kinds of SIP vulnerabilities, we used SIP status codes under the monitoring module for detecting SIP Flooding attacks and additionally proposed an advanced protocol where the authentication and security function is strengthened about SIP packet. We managed SIP session spontaneously in order to strengthen security with SIP authentication function and to solve the vulnerability of SIP protocol. The proposed mechanism can securely send SIP packet to solves the security vulnerability with minimum traffic transmission. Also service delay in SIP proxy servers will be minimized to solve the overload problem on SIP proxy server.
Keywords
SIP; Attack Detection; Status Code; Security and Authentication;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 한국전자통신연구원(ETRI) 기술평가팀, “VoIP 기술 및 시장 동향”, 한국전자통신연구원(ETRI) 2006.
2 http://www.voip-forum.or.kr, VoIP 국내표준, “H.323 기반 인터넷 텔레포니 단말”, 2005.
3 http://www.voip-forum.or.kr, VoIP 국내표준, “SIP 기반 인터넷 텔레포니 단말”, 2005.
4 구자현, "VoIP 서비스 보안 취약성 분석", 한국 정보보호학회지, Vol.16, No.1, pp.60-63, 2006.
5 원용근, “SIP프로토콜 기반 VoIP 서비스에서 DoS 공격 대응 방안 연구”, 한국정보보호학회 동계학술대회, 2007.
6 박진범, “VoIP 보안 취약점 공격에 대한 기존 보안장비의 대응 분석 연구”, 한국정보보호학회지, Vol.17, No.5, 2007.
7 C. Mark, "VoIP Vulnerabilities Registration Hijacking," SecureLogix Corporation, pp.1-4, 2005.
8 http://www.vopsecurity.org, SiVuS(Sip Vulnerability Scanner), "User Guide Vo1.07," 2004.
9 J. Y. Migeon, "The MIT Kerberos Administrator’'s How-to Guide," Kerveros constortium, 2008,
10 C. Neuman, J. Kohl, and T. Ts'o, "The Kerberos Network Authentication Service (V5)," Internet draft (work in progress), draft-ietf-cat-kerberos-revisions-06.txt, 2000.
11 S. Hemant, "VoIP Intrusion Detection Through Interacting Protocol State Machines," 2006.
12 최재덕, “SIP 기반의 VoIP 보안 시스템 구현”, 한국통신학회 논문지, Vol.29, No.9B, 2004.
13 신영찬, “VoIP를 위한 보안 프로토콜 성능 평가”, 한국 정보보안학회 논문지, Vol.18, No.3, 2008(6).