Abstract
|
Today, many organizations are transforming their traditional telephone services into Voice over Internet Protocol (VoIP) systems. These services are simple to implement, but they are often vulnerable to attack defense because they are packet-switched IP networks to support the circuit-switched networks used for voice communication. SIP is broadly utilized as a signaling protocol to help video and voice communication additionally to more multimedia applications. However, it is unprotected to various types of assaults due to its open nature and the lack of a clear line of defense against the increasing scope of security threats. Among these risks, registration hijacking assails, familiar by its harmful effect, aims both the User Agent Server (UAS) and the User Agent Client (UAC). In particular, the REGISTER message is evaluated as one of the main reasons of registration hijacking assails in SIP. A SIP registration hijacking works by an attacker who disables the SIP registration of a valid user and replaces it with hackers logical (IP) address. This permits the hacker to obstruct incoming calls as well as redirect, replay or terminate calls as desired. In this survey, we present a complete study of the registration attack versus SIP, communicating its different alternatives and analyzing its effects. We also categorized current solutions based on the different registration hijacking attack approaches they face, their types, and their targets. In addition, we carry out an exhaustive examination of the main robustness and ineffectiveness of these solutions and we survey in depth the important findings that underlie each one of them for a preferable know-how of their characteristics. Finally, we provide a recommendation to protect the UAC registration method against registration hijacking by using the Media Access Control (MAC) address to improve the effectiveness of studied solutions.
|