Show simple item record

dc.contributor.advisorDinolt, George
dc.contributor.advisorEagle, Chris.
dc.contributor.authorDobson, Lucas E.
dc.date.accessioned2012-03-14T17:45:04Z
dc.date.available2012-03-14T17:45:04Z
dc.date.issued2010-06
dc.identifier.urihttps://hdl.handle.net/10945/5324
dc.description.abstractThe goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was used to compare the severity of protocol vulnerabilities versus the implementation vulnerabilities. Comparison between protocol and implementation vulnerabilities reveals that software remains the greatest weakness of SIP. One particular weakness is lack of TLS (secure session level) implementation in any software tested. This remains a significant concern and leaves all of the software tested open to many of the protocol vulnerabilities mentioned. Furthermore, the large number of implementation vulnerabilities discovered in the parsing mechanisms while testing software leads to the conclusion that SIP is still too immature and complex of a protocol. More work needs to be done developing a reference implementation and robust parser for SIP, and TLS with SIP, before SIP is ready for environments that require high assurances of authenticity, secrecy and integrity.en_US
dc.description.urihttp://archive.org/details/securitynalysiso109455324
dc.format.extentxviii, 79 p. : ill. ;en_US
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.subject.lcshComputer network protocolsen_US
dc.subject.lcshComputer securityen_US
dc.subject.lcshComputer networksen_US
dc.titleSecurity analysis of session initiation protocolen_US
dc.typeThesisen_US
dc.contributor.corporateNaval Postgraduate School (U.S.)
dc.contributor.departmentComputer Science
dc.description.serviceUS Navy (USN) authoren_US
dc.identifier.oclc648154004
etd.thesisdegree.nameM.S.en_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineComputer Scienceen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US
etd.verifiednoen_US
dc.description.distributionstatementApproved for public release; distribution is unlimited.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record