Browse > Article
http://dx.doi.org/10.5392/JKCA.2015.15.12.018

Protecting Deregistration Attack in SIP Using Delayed Deregistration  

Kwon, Kyung-Hee (단국대학교 컴퓨터과학과)
Publication Information
Abstract
This paper proposes a new protection technique against deregistration attack in SIP. Although it is caused by simple spoofing the REGISTER message of a legitimate SIP UA, its impact is serious. This new protection technique identifies and protects the deregistration attack by removing a binding form the location server after delaying a certain period of time instead of removing the binding immediately after receiving deregistration message. Therefore, this technique makes it possible to establish a secure SIP environment defending the deregistraion attack without any additional overhead such as an encryption or authentication.
Keywords
SIP; Deregistration Attack; Impersonation Attack; Delayed Deregistration;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Yijun Zeng and Omar Cherkaoui, "Performance Study of COPS over TLS and IPSec Secure Session," LNCS2506, Springer-Verlag, Berlin, Heidelberg, pp.133-144, 2002.
2 https://www.k2esec.com/network-securityprotocols-ipsec-vs-tlsssl-vs-ssh-part-ii/
3 ETRI, "VoIP technology and market trends," ETRI 2006.
4 고윤미, 권경희, "SIP에서의 강화된 사용자 인증 방식," 한국콘텐츠학회논문지, 제11권, 제12호, pp.88-98, 2011.   DOI
5 Rpsemberg, H. Schulzrinne, G. Camarillo, A. Johnstion, J. Peterson, R. Sparks, M. Handly, and E. Schooler, "SIP: Session Initation Protocol," RFC 3261, 2002(6).
6 고윤미, 권경희, "IEEE 802.11에서의 복제된 AP탐지 및 차단 기법," 한국콘텐츠학회논문지, 제10권, 제5호, pp.17-22, 2010.
7 Ruhul Islam and Smarajit Ghosh, "SIP Security Mechanism Techniques on Voice over Internet Protocol(VoIP) System," International Journal of Computer Application In Engineering Science, Vol.1, Issue.1, pp.94-99, 2011.
8 최재덕, 정수환, "효율적이고 안전한 SIP 사용자 인증 및 키 교환," 정보보호학회, 제19권, 제3호, pp.73-82, 2009.
9 윤하나, 이형우, "SIP 공격 대응을 위한 보안성이 강화된 Stateful SIP 프로토콜," 한국콘텐츠학회논문지, 제10권, 제1호, pp.46-58, 2010.   DOI
10 El Sawda S., Urien P., "SIP Security Attacks and Solutions: A state-of-the-art Review," Information and Communication Technologies, ICTTA'06 2nd, Vol.2, pp.3187-3191, 2006.