Security analysis of session initiation protocol
dc.contributor.advisor | Dinolt, George | |
dc.contributor.advisor | Eagle, Chris. | |
dc.contributor.author | Dobson, Lucas E. | |
dc.date.accessioned | 2012-03-14T17:45:04Z | |
dc.date.available | 2012-03-14T17:45:04Z | |
dc.date.issued | 2010-06 | |
dc.identifier.uri | https://hdl.handle.net/10945/5324 | |
dc.description.abstract | The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was used to compare the severity of protocol vulnerabilities versus the implementation vulnerabilities. Comparison between protocol and implementation vulnerabilities reveals that software remains the greatest weakness of SIP. One particular weakness is lack of TLS (secure session level) implementation in any software tested. This remains a significant concern and leaves all of the software tested open to many of the protocol vulnerabilities mentioned. Furthermore, the large number of implementation vulnerabilities discovered in the parsing mechanisms while testing software leads to the conclusion that SIP is still too immature and complex of a protocol. More work needs to be done developing a reference implementation and robust parser for SIP, and TLS with SIP, before SIP is ready for environments that require high assurances of authenticity, secrecy and integrity. | en_US |
dc.description.uri | http://archive.org/details/securitynalysiso109455324 | |
dc.format.extent | xviii, 79 p. : ill. ; | en_US |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
dc.subject.lcsh | Computer network protocols | en_US |
dc.subject.lcsh | Computer security | en_US |
dc.subject.lcsh | Computer networks | en_US |
dc.title | Security analysis of session initiation protocol | en_US |
dc.type | Thesis | en_US |
dc.contributor.corporate | Naval Postgraduate School (U.S.) | |
dc.contributor.department | Computer Science | |
dc.description.service | US Navy (USN) author | en_US |
dc.identifier.oclc | 648154004 | |
etd.thesisdegree.name | M.S. | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Computer Science | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
etd.verified | no | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.