VoIP a IM - slabiny protokolu SIP (Sesssion Iniciation Protocol)
21.09.2007
Aditya K Sood:
This research paper lays stress on the potential weaknesses present in the SIP which make it vulnerable to
stringent attacks. The point of discussion is to understand the weak spots in the protocol. The payloads
constitute the request vectors. The protocol inherits well defined security procedures and implementation
objects. The security model is hierarchical and is diverged in every working layer of SIP from top to bottom.
SIP features can be exploited easily if definitive attack base is subjugated. We will discuss about inherited
flaws and methods to combat against predefined attacks. The payloads have to be scrutinized at the network
level. It is critical because payloads are considered as infection bases to infect networks.