SIP Vulnerability Scan Framework
Journal Title: Journal of Information Systems and Telecommunication - Year 2014, Vol 2, Issue 4
Abstract
The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP (Session Initiation Protocol) networks. We try to find weaknesses in SIP enabled entities that an attacker by exploiting them is able to attack the system and affect it. This framework is provided by the concept of penetration testing and is designed to be flexible and extensible, and has the capability to customize for other similar session based protocols. To satisfy the above objectives, the framework is designed with five main modules for discovery, information modeling, operation, evaluation and report. After setting up a test-bed as a typical VoIP system to show the validity of the proposed framework, this system has been implemented as a SIP vulnerability scanner. We also defined appropriate metrics for gathering the performance statistics of SIP components. Our test bed is deployed by open-source applications and used for validation and also evaluation of the proposed framework.
Authors and Affiliations
Mitra Alidoosti, Hassan Asgharian, Ahmad Akbari
A Robust Statistical Color Edge Detection for Noisy Images
Edge detection is a fundamental tool that plays a significant role in image processing, and performance of high-level tasks such as image segmentation and object recognition depends on its efficiency. Therefore, edge det...
A Robust Data Envelopment Analysis Method for Business and IT Alignment of Enterprise Architecture Scenarios
Information Technology is recognized as a competitive enabler in today’s dynamic business environment. Therefore, alliance of business and Information Technology process is critical, which is mostly emphasized in Informa...
A Global-Local Noise Removal Approach to Remove High Density Impulse Noise
Impulse noise removal from images is one of the most important concerns in digital image processing. Noise must be removed in a way that the main and important information of image is kept. Traditionally, the median filt...
Performance Analysis of SVM-Type Per Tone Equalizer Using Blind and Radius Directed Algorithms for OFDM Systems
In this paper, we present Support Vector Machine (SVM)-based blind per tone equalization for OFDM systems. Blind per tone equalization using Constant Modulus Algorithm (CMA) and Multi-Modulus Algorithm (MMA) are used as...
A Semantic Approach to Person Profile Extraction from Farsi Web Documents
Entity profiling (EP) as an important task of Web mining and information extraction (IE) is the process of extracting entities in question and their related information from given text resources. From computational viewp...