Difference between revisions of "Security of the SIP protocol"

From NMSL
m
 
(One intermediate revision by one other user not shown)
Line 4: Line 4:
  
 
This project investigates the security of the SIP protocol and its implications for the design of network based Intrusion Detection Systems (IDSes).
 
This project investigates the security of the SIP protocol and its implications for the design of network based Intrusion Detection Systems (IDSes).
 +
  
 
== People ==
 
== People ==
Line 10: Line 11:
  
 
* [http://www.ftw.at Andreas Berger] (Visiting Researcher, PhD Student)
 
* [http://www.ftw.at Andreas Berger] (Visiting Researcher, PhD Student)
 +
 +
 +
== Publications ==
 +
 +
* A. Berger and M. Hefeeda, [http://www.cs.sfu.ca/~mhefeeda/Papers/npsec09.pdf Exploiting SIP for Botnet Communication], In Proc. of Workshop on Secure Network Protocols (NPSec'09), in conjunction with IEEE International Conference on Network Protocols (ICNP'09), 6 pages, Princeton, NJ, October 2009.  (Acceptance: 30%)
  
  

Latest revision as of 19:41, 3 February 2015

Overview

The Session Initiation Protocol (SIP) is a versatile protocol for session management and control. Today it is mainly used in the field of Internet telephony (VoIP). However, due to its simple structure and the wide range of potential applications, it is expected to become a popular choice for many Internet services. The adaptation of SIP as the core signaling protocol for Next Generation Networks (NGNs) like the IP Multimedia Subsystem (IMS) demonstrates its increasing relevance.

This project investigates the security of the SIP protocol and its implications for the design of network based Intrusion Detection Systems (IDSes).


People


Publications

  • A. Berger and M. Hefeeda, Exploiting SIP for Botnet Communication, In Proc. of Workshop on Secure Network Protocols (NPSec'09), in conjunction with IEEE International Conference on Network Protocols (ICNP'09), 6 pages, Princeton, NJ, October 2009. (Acceptance: 30%)


Resources and Links