SIP Vulnerability Scan Framework
نویسندگان
چکیده
The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP (Session Initiation Protocol) networks. We focused our studies on the detection of SIP DoS related vulnerabilities in VoIP infrastructures because of their generalization. We try to find weaknesses in SIP enabled entities that an attacker by exploiting them is able to attack the system and affect it. This framework is provided by the concept of penetration testing and is designed to be flexible and extensible, and has the capability to customize for other similar session based protocols. To satisfy the above objectives, the framework is designed with five main modules for discovery, information modeling, operation, evaluation and report. After setting up a test-bed as a typical VoIP system to show the validity of the proposed framework, this system has been implemented as a SIP vulnerability scanner. We also defined appropriate metrics for gathering the performance statistics of SIP components. Our test-bed is deployed by open-source applications and used for validation and also evaluation of the proposed framework. The main contributions of this paper are its non-destructive manner in identifying vulnerabilities and incorporating the penetration testing ideas and steps in the overall architecture of our framework. We also defined appropriate metrics that help us to identify vulnerabilities in a black box penetration testing.
منابع مشابه
ملزومات امنیتی پیادهسازی IMS SIP سرور امن
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملAddressing an Amplification Vulnerability in Session Initiation Protocol (SIP) Forking Proxies
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. license-info) in effect on the date of pu...
متن کاملLeveraging Engaged Parties in SIP Domains of eTOM Framework by using ITSM Reference Model
the telecommunications industry plays an important role in providing ICT services to a wide range of customers. In addition to individual customers, corporate customers also are user of these services and have an important role to make return on investment for telecom companies (Telcos). Therefore, this group of customers should not be ignored by any reason. This is where the Telecom Companies ...
متن کاملApplication of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for communication over the Internet. In this paper we describe a method to assess a particular kind of vulnerability of SIP implementation so that we could gain insights into its robustness. We used PROTOS as a tool to carry out exception element injection into SIP INVITE method and test it against a SI...
متن کامل