Survey of security vulnerabilities in session initiation protocol

Dimitris Geneiatakis, Tasos Dagiuklas, Georgios Kambourakis, Costas Lambrinoudakis, Stefanos Gritzalis, Sven Ehlert, Dorgham Sisalem

Research output: Contribution to journalReview articlepeer-review

172 Citations (Scopus)

Abstract

The open architecture of the Internet and the use of open standards like Session Initiation Protocol (SIP) constitute the provisioning of services (e.g., Internet telephony, instant messaging, presence, etc.) vulnerable to known Internet attacks, while at the same time introducing new security problems based on these standards that cannot been tackled with current security mechanisms. This article identifies and describes security problems in the SIP protocol that may lead to denial of service. Such security problems include flooding attacks, security vulnerabilities in parser implementations, and attacks exploiting vulnerabilities at the signaling-application level. A qualitative analysis of these security flaws and their impacts on SIP systems is presented.

Original languageEnglish
Pages (from-to)68-81
Number of pages14
JournalIEEE Communications Surveys and Tutorials
Volume8
Issue number3
DOIs
Publication statusPublished - Sept 2006
Externally publishedYes

Cite this