Difference between revisions of "Security of the SIP protocol"

From NMSL
Line 1: Line 1:
 
== Overview ==  
 
== Overview ==  
  
The Session Initiation Protocol (SIP) is a versatile protocol for session management and control. Today it is mainly used in the ffield of Internet telephony (VoIP). However, due to its simple structure and the wide range of potential applications, it is expected to become a popular choice for many Internet services. The adaptation of SIP as the core signaling protocol for Next Generation Networks (NGNs) like the IP Multimedia Subsystem (IMS)  demonstrates its increasing relevance.  
+
The Session Initiation Protocol (SIP) is a versatile protocol for session management and control. Today it is mainly used in the field of Internet telephony (VoIP). However, due to its simple structure and the wide range of potential applications, it is expected to become a popular choice for many Internet services. The adaptation of SIP as the core signaling protocol for Next Generation Networks (NGNs) like the IP Multimedia Subsystem (IMS)  demonstrates its increasing relevance.  
  
 
This project investigates the security of the SIP protocol and its implications for the design of network based Intrusion Detection Systems (IDSes).
 
This project investigates the security of the SIP protocol and its implications for the design of network based Intrusion Detection Systems (IDSes).

Revision as of 22:34, 23 February 2009

Overview

The Session Initiation Protocol (SIP) is a versatile protocol for session management and control. Today it is mainly used in the field of Internet telephony (VoIP). However, due to its simple structure and the wide range of potential applications, it is expected to become a popular choice for many Internet services. The adaptation of SIP as the core signaling protocol for Next Generation Networks (NGNs) like the IP Multimedia Subsystem (IMS) demonstrates its increasing relevance.

This project investigates the security of the SIP protocol and its implications for the design of network based Intrusion Detection Systems (IDSes).

People


Resources and Links