CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol
نویسنده
چکیده
Voice communications on IP networks use owner protocols as well as standards like SIP, MGCP and H323. In this paper we propose a new method for transparent traversal of NATed (Network Address Translated) networks for the SIP (Session Initiation Protocol) protocol. Although SIP is an application layer protocol, its operation is affected by address translation. This is because SIP uses network layer information (source IP and source port) that is lost by the NAT operation. The suggested method adapts dynamically one of the three solutions: Connection-Oriented media STUN or TURN depending on the situation occurring during call initiation. Key-words: SIP, NAT, STUN, TURN, ICE, ConnectionOriented media, Voice over IP, IP Telephony.
منابع مشابه
Detecting Denial of Service Message Flooding Attacks in SIP based Services
Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol (SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation deficiencies cause some security concerns in SIP based infra...
متن کاملبهبود کارایی پروتکلSIP در شرایط اضافه بار با استفاده از قابلیت مبتنی بر پنجره
The extent and diversity of systems provided by IP networks have made various technologies to approach integrating various types of access networks and converting to next generation network. The Session Initiation Protocol (SIP) with respect to facilities such as being in text form, end-to-end connection, independence from the type of transmitted data, and supporting various forms of transmissi...
متن کاململزومات امنیتی پیادهسازی IMS SIP سرور امن
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملارزیابی پیکربندیهای مختلف شبکه سیگنالینگ SIP با استفاده از اندازهگیری پارامترهای کیفیت برقراری تماس
Normal 0 false false false EN-US X-NONE AR-SA MicrosoftInternetExplorer4 ...
متن کامل