Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation
نویسندگان
چکیده
As more and more people are using VoIP softphones in their laptop and smart phones, vulnerabilities in VoIP protocols and systems could introduce new threats to the computer that runs the VoIP softphone. In this paper, we investigate the security ramifications that VoIP softphones expose their host to and ways to mitigate such threats. We show that crafted SIP traffic (noisy attack) can disable a Windows XP host that runs the official Vonage VoIP softphone within several minutes. While such a noisy attack can be effectively mitigated by threshold based filtering, we show that a stealthy attack could defeat the threshold based filtering and disable the targeted computer silently without ever ringing the targeted softphone. To mitigate the stealthy attack, we have developed a limited context aware (LCA) filtering that leverages the context and SIP protocol information to ascertain the intentions of a SIP message on behalf of the client. Our experiments show that LCA filtering can effectively defeat the stealthy attack while allowing legitimate VoIP calls to go through.
منابع مشابه
Analysis of Information Security Problem by Probabilistic Risk Assessment
The information security risk assessment is investigated from perspectives of most advanced probabilistic risk assessment (PRA) for nuclear power plants. Accident scenario enumeration by initiating events, mitigation systems and event trees are first described and demonstrated. Assets, confidentiality, integrity, availability, threats, vulnerabilities, impacts, likelihoods, and safeguards are r...
متن کاملSecurity of Future eEnabled Aircraft Ad hoc Networks
This paper focuses on security concerns with a future ad hoc network of data linked eEnabled airplanes, and proposes a framework to protect communications. The framework identifies emerging threats and vulnerabilities, specifies security requirements and mitigation solutions. Major security challenges anticipated in the ground infrastructure and eEnabled airplanes are presented along with some ...
متن کاملFreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers
Use-after-free vulnerabilities have become an important class of security problems due to the existence of mitigations that protect against other types of vulnerabilities. The effects of their exploitation can be just as devastating as exploiting a buffer overflow, potentially resulting in full code execution within the vulnerable program. Few protections exist against these types of vulnerabil...
متن کاملHow to Integrate Trust Management into a Risk Analysis Process
In order to apply suitable security services for an existing or newly designed information system, one has to perform a security analysis auditing the system for vulnerabilities, threats, and risks. Based on the audit results effective safeguards are selected, designed, and configured. The security analysis process is standardized by a set of so-called Common Criteria (CC) [8] which provides a ...
متن کاملAnticipating Cyber Vulnerability Exploits Using Machine Learning
| @RecordedFuture Every day about 20 new cyber vulnerabilities are released and reported, and these are related to various software implementation weaknesses. Hackers exploit these vulnerabilities to launch an attack, trigger a system failure, access sensitive information, or gain remote system access. Some vulnerabilities have a severe impact, while hackers show little or no interest in exploi...
متن کامل