A Parsing Mode based Method for Malformed SIP Messages Testing for IMS Network

نویسندگان

  • Yulong Wang
  • Dong Wang
  • Lei Wang
چکیده

IMS(IP Multimedia Subsystem) network uses SIP (Session Initiation Protocol) as its core control protocol. The defensive ability of the malformed SIP message is particularly important for IMS network security. In this paper, we propose a malformed SIP generation method based on SIP parsing mode and the associated attack testing method. Based on SIP parsing mode of functional entities in IMS, we generate effective malformed SIP messages, which then be used to perform attacking test to IMS functional entities by establishing different session models, so as to evaluate the defensive ability of these entities and provide recommendations for improving the security of the IMS network. We generated a set of malformed SIP messages through this method and apply them to the attacking test of the well-known IMS testbed OpenIMSCore under different session models. The testing finds new vulnerabilities in OpenIMSCore, which shows that our method of malformed SIP messages generation is effective.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ملزومات امنیتی پیاده‌سازی IMS SIP سرور امن

IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...

متن کامل

A Method for Disguising Malformed SIP Messages to Evade SIP IDS

Malformed SIP attacks are threatening the security of VoIP system, such as IP Multimedia Subsystem, which uses SIP (Session Initiation Protocol) as its core protocol. Though IDSs (Intrusion Detection System) supporting malformed SIP detection had been produced, it was not clear to what extent they can detect disguised malformed SIP messages. This paper analyzes the condition of SIP IDS evasion ...

متن کامل

بهبود کارایی پروتکلSIP در شرایط اضافه بار با استفاده از قابلیت مبتنی بر پنجره

The extent and diversity of systems provided by IP networks have made various technologies to approach integrating various types of access networks and converting to next generation network. The Session Initiation Protocol (SIP) with respect to facilities such as being in text form, end-to-end connection, independence from the type of transmitted data, and supporting various forms of transmissi...

متن کامل

REGULAR PAPERS An Approach to Resisting Malformed and Flooding Attacks on SIP Servers Ming-Yang Su and Chen-Han Tsai A Design Algorithm for QoS Network with Flow Delay Control Kairat Jaroenrat Pairwise Co-betweenness for Several Types of Network

As a result of its low costs and high degree of integration with other services, Voice over Internet Protocol (VoIP) has become very widely used, while Session Initiation Protocol (SIP) is one of the most important protocols for providing the VoIP service. Since SIP is an open source code with a simple structure and high expansibility, SIP servers are more vulnerable to attack by SIP messages m...

متن کامل

Policy Based SIP Signaling Management in IMS

Manageability, the theme for IMS to compete with existing heterogeneous Voice over IP (VoIP) applications, runs over every network element in NGN for security and quality of experience (QoE). Further decomposition of IMS Core Network (CN) has resulted in a rapid increase of signaling traffic. At the same time, the ever rising of applications over signaling, the needs of message validation and s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JNW

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013