SIP security:
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Chichester
Wiley
2009
|
Ausgabe: | 1. publ. |
Schlagworte: | |
Online-Zugang: | Cover Inhaltsverzeichnis |
Beschreibung: | XIV, 336 S. Ill., graph. Darst. |
ISBN: | 9780470516362 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035723458 | ||
003 | DE-604 | ||
005 | 20091002 | ||
007 | t | ||
008 | 090914s2009 ad|| |||| 00||| eng d | ||
010 | |a 2008053852 | ||
020 | |a 9780470516362 |9 978-0-470-51636-2 | ||
024 | 3 | |a 9780470516362 | |
035 | |a (OCoLC)699320395 | ||
035 | |a (DE-599)BSZ305901397 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-634 |a DE-11 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a SIP security |c Dorgham Sisalem ... |
250 | |a 1. publ. | ||
264 | 1 | |a Chichester |b Wiley |c 2009 | |
300 | |a XIV, 336 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Session Initiation Protocol (Computer network protocol) | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Sisalem, Dorgham |4 edt | |
856 | 4 | |m DE-576;wiley |q image/jpeg |u http://swbplus.bsz-bw.de/bsz305901397cov.htm |v 20090423202946 |3 Cover | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018000187&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018000187 |
Datensatz im Suchindex
_version_ | 1804139998260232192 |
---|---|
adam_text | SIP SECURITY DORGHAM SISALEM JOHN FLOROIU JIRI KUTHAN ULRICH ABEND
HENNING SCHULZRINNE WILEY A JOHN WILEY AND SONS, LTD., PUBLICATION
CONTENTS FOREWORD XI ABOUT THE AUTHORS XIII ACKNOWLEDGMENT XV 1
INTRODUCTION 1 2 INTRODUCTION TO CRYPTOGRAPHIC MECHANISMS 5 2.1
CRYPTOGRAPHIC ALGORITHMS 6 2.1.1 SYMMETRIC KEY CRYPTOGRAPHY 6 2.1.2
PUBLIC KEY CRYPTOGRAPHY 11 2.1.3 KEY-LESS CRYPTOGRAPHIC FUNCTIONS 20 2.2
SECURE CHANNEL ESTABLISHMENT 21 2.2.1 IP LAYER SECURITY 22 2.2.2
APPLICATION LAYER SECURITY 28 2.3 AUTHENTICATION IN 3GPP NETWORKS 32
2.3.1 AKA AUTHENTICATION VECTORS 35 2.3.2 AKA MUTUAL AUTHENTICATION 37
2.3.3 AKA RE SYNCHRONIZATION 37 2.4 SECURITY MECHANISMS THREATS AND
VULNERABILITIES 38 3 INTRODUCTION TO SIP 43 3.1 WHAT IS SIP, WHY SHOULD
WE BOTHER ABOUT IT AND WHAT ARE COMPETING TECHNOLOGIES? 44 3.2 SIP: THE
COMMON SCENARIOS 46 3.3 INTRODUCTION TO SIP OPERATION: THE SIP TRAPEZOID
49 3.4 SIP COMPONENTS 51 3.4.1 USER AGENT 51 3.4.2 REGISTRAR 53 3.4.3
REDIRECT SERVER 55 3.4.4 PROXY 55 3.4.5 REAL-WORLD SERVERS 58 3.5
ADDRESSING IN SIP 60 3.6 SIP MESSAGE ELEMENTS 3.6.1 WHO ARE YOU CALLING?
3.6.2 WHO IS CALLING YOU? 3.6.3 HOW TO ROUTE SIP TRAFFIC 3.6.4 EVEN MORE
HEADER-FIELDS 3.6.5 SIP MESSAGE BODY 3.6.6 SIP METHODS 3.7 SIP DIALOGS
AND TRANSACTIONS 3.8 SIP REQUEST ROUTING 3.8.1 USER LOCATION ROUTING
3.8.2 USER-PROVISIONED ROUTING 3.8.3 ENUM: PUBLIC PHONE NUMBER DIRECTORY
3.8.4 INTERDOMAIN ROUTING: DNS 3.8.5 ROUTING TABLES 3.9 AUTHENTICATION,
AUTHORIZATION, ACCOUNTING 3.9.1 USER AUTHENTICATION IN SIP 3.9.2
AUTHORIZATION POLICIES 3.9.3 ACCOUNTING 3.10 SIP AND MIDDLEBOXES 3.11
OTHER PARTS OF THE SIP ECO-SYSTEM 3.12 SIP PROTOCOL DESIGN AND LESSONS
LEARNED 4 INTRODUCTION TO IMS 4.1 SIP IN IMS 4.1.1 QUALITY OF SERVICE
CONTROL 4.1.2 SUPPORT FOR ROAMING 4.1.3 SECURITY 4.1.4 EFFICIENT
RESOURCE USAGE 4.2 GENERAL ARCHITECTURE 4.2.1 SUBSCRIBER AND USER
EQUIPMENT 4.2.2 SIGNALING COMPONENTS 4.2.3 INTERWORKING COMPONENTS 4.2.4
QOS-RELATED COMPONENTS 4.2.5 APPLICATION AND SERVICE
PROVISIONING-RELATED COMPON 4.2.6 DATABASE-RELATED COMPONENTS 4.3
SESSION CONTROL AND ESTABLISHMENT IN IMS 4.3.1 UE REGISTRATION IN IMS
4.3.2 SESSION ESTABLISHMENT IN IMS 5 SECURE ACCESS AND INTERWORKING IN
IMS 5.1 ACCESS SECURITY IN IMS 5.1.1 IMS AKA ACCESS SECURITY 5.1.2
ACCESS-BUNDLED AUTHENTICATION 5.1.3 HTTP DIGEST-BASED ACCESS SECURITY
5.1.4 AUTHENTICATION MECHANISM SELECTION 5.2 NETWORK SECURITY IN IMS
CONTENTS VU 6 USER IDENTITY IN SIP 145 6.1 IDENTITY THEFT 145 6.2
IDENTITY AUTHENTICATION USING S/MIME 147 6.2.1 PROVIDING ENCRYPTION WITH
S/MIME 148 6.2.2 PROVIDING INTEGRITY AND AUTHENTICATION WITH S/MIME 150
6.3 IDENTITY AUTHENTICATION IN TRASTED ENVIRONMENTS 150 6.4 STRONG
AUTHENTICATED IDENTITY 153 6.5 IDENTITY THEFT DESPITE STRONG IDENTITY
158 6.6 USER PRIVACY AND ANONYMITY 161 6.6.1 USER-PROVIDED PRIVACY 162
6.6.2 NETWORK-PROVIDED PRIVACY 163 6.7 SUBSCRIPTION THEFT 165 6.8 FRAUD
AND SIP 168 6.8.1 THEFT OF SIP SERVICES 169 7 MEDIA SECURITY 173 7.1 THE
REAL-TIME TRANSPORT PROTOCOL 174 7.2 SECURE RTP 175 7.2.1 THE SRTP
CRYPTOGRAPHIC CONTEXT 111 7.2.2 THE SRTP PAYLOAD STRUCTURE 179 7.2.3
SEQUENCE NUMBERING 181 7.2.4 THE KEY DERIVATION PROCEDURE 181 7.2.5 THE
SRTP INTERACTION WITH FORWARD ERROR CORRECTION 183 7.3 KEY EXCHANGE 184
7.3.1 SDP SECURITY DESCRIPTIONS FOR MEDIA STREAMS 187 7.3.2 MULTIMEDIA
INTERNET KEYING 191 7.3.3 ZRTP 202 7.3.4 DTLS-SRTP 214 7.3.5 THE
CAPABILITY NEGOTIATION FRAMEWORK 219 7.3.6 SUMMARY 221 8
DENIAL-OF-SERVICE ATTACKS ON VOIP AND IMS SERVICES 225 8.1 INTRODUCTION
225 8.2 GENERAL CLASSIFICATION OF DENIAL-OF-SERVICE ATTACKS 229 8.3
BANDWIDTH CONSUMPTION AND DENIAL-OF-SERVICE ATTACKS ON SIP SERVICES 230
8.4 BANDWIDTH DEPLETION ATTACKS 233 8.5 MEMORY DEPLETION ATTACKS 234
8.5.1 GENERAL MEMORY DEPLETION ATTACKS 234 8.5.2 MEMORY DEPLETION
ATTACKS ON SIP SERVICES 235 8.6 CPU DEPLETION ATTACKS 243 8.6.1 MESSAGE
PARSING 244 8.6.2 SECURITY CHECKS 245 8.6.3 APPLICATION EXECUTION 245
8.7 MISUSE ATTACKS 246 8.7.1 TCP/IP PROTOCOL DEVIATION ATTACKS 246 8.7.2
BUFFER OVERFLOW ATTACKS 247 CONTENTS 8.7.3 SIP PROTOCOL MISUSE ATTACKS
247 8.8 DISTRIBUTED DENIAL-OF-SERVICE ATTACKS 250 8.8.1 DDOS ATTACKS
WITH BOTNETS 251 8.8.2 IP-BASED AMPLIFICATION ATTACKS 253 8.8.3
DNS-BASED AMPLIFICATION ATTACKS 254 8.8.4 LOOP-BASED AMPLIFICATION
ATTACKS ON SIP SERVICES 255 8.8.5 FORKING-BASED AMPLIFICATION ATTACKS ON
SIP SERVICES 257 8.8.6 REFLECTION-BASED AMPLIFICATION ATTACKS ON SIP
SERVICES 257 8.9 UNINTENTIONAL ATTACKS 258 8.9.1 FLASH CROWDS 258 8.9.2
IMPLEMENTATION AND CONFIGURATION MISTAKES 259 8.10 ADDRESS
RESOLUTION-RELATED ATTACKS 259 8.10.1 DNS SERVERS SECURITY THREATS 261
8.10.2 EFFECTS OF DNS ATTACKS 262 8.10.3 COUNTERMEASURES AND GENERAL
PROTECTION MECHANISMS FOR DNS SERVICES 262 5.70.4 DNS-RELATED ATTACKS ON
SIP SERVICES 263 8.10.5 PROTECTING SIP PROXIES FROM DNS-BASED ATTACKS 26
5 8.11 ATTACKING THE VOIP SUBSCRIBER DATABASE 265 8.11.1 WEB-BASED
ATTACKS ON THE SUBSCRIBER DATABASE 266 8.11.2 SIP-BASED ATTACKS ON THE
SUBSCRIBER DATABASE 269 8.12 DENIAL-OF-SERVICE ATTACKS IN IMS NETWORKS
270 8.12.1 BANDWIDTH DEPLETION ATTACKS 271 8.12.2 MEMORY DEPLETION
ATTACKS 111 8.12.3 CPU DEPLETION ATTACKS 273 8.12.4 PROTOCOL MISUSE
ATTACKS 21A 8.12.5 WEB-BASED ATTACKS 21A 8.13 DOS DETECTION AND
PROTECTION MECHANISMS 274 8.14 DETECTION OF DOS ATTACKS 274 8.14.1
SIGNATURE-BASED DOS DETECTION 275 8.14.2 ANOMALY-BASED DDOS DETECTION
275 8.15 REACTING TO DOS ATTACKS 278 8.15.1 DYNAMIC FILTERING 278 8.15.2
RATE LIMITING 278 8.15.3 IP TRACEBACK 279 8.16 PREVENTING DOS ATTACKS
280 8.16.1 ACCESS CONTROL 280 8.16.2 MEMORY PROTECTION 283 8.16.3
ARCHITECTURAL CONSIDERATION 285 8.17 DDOS SIGNATURE SPECIFICATION 289
8.17.1 FUZZING 289 8.17.2 HONEYPOTS 290 9 SPAM OVER IP TELEPHONY 291 9.1
INTRODUCTION 291 9.2 SPAM OVER SIP: TYPES AND APPLICABILITY 292 CONTENTS
IX 9.2.1 GENERAL TYPES OF SPAM 293 9.3 WHY IS SIP GOOD FOR SPAM? 294 9.4
LEGAL SIDE OF UNSOLICITED COMMUNICATION 296 9.4.1 PROTECTION OF PERSONAL
PRIVACY 296 9.4.2 PROTECTION OF PROPERTY 297 9.4.3 LEGAL ASPECTS OF
PROHIBITION OF UNSOLICITED COMMUNICATION BY SERVICE PROVIDERS 298 9.4.4
EFFECTIVENESS OF LEGAL ACTION 299 9.5 FIGHTING UNSOLICITED COMMUNICATION
299 9.5.1 ANTISPAM MEASURES BASED ON IDENTITY 300 9.5.2 CONTENT ANALYSIS
306 9.5.3 COLLABORATIVE FILTERING 307 9.5.4 INTERACTIVE ANTISPAM
SOLUTIONS 307 9.5.5 PREVENTIVE ANTISPAM METHODS 312 9.6 GENERAL ANTISPAM
FRAMEWORK 314 BIBLIOGRAPHY 317 INDEX 331
|
any_adam_object | 1 |
author2 | Sisalem, Dorgham |
author2_role | edt |
author2_variant | d s ds |
author_facet | Sisalem, Dorgham |
building | Verbundindex |
bvnumber | BV035723458 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)699320395 (DE-599)BSZ305901397 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. publ. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01574nam a2200421 c 4500</leader><controlfield tag="001">BV035723458</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20091002 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090914s2009 ad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008053852</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470516362</subfield><subfield code="9">978-0-470-51636-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780470516362</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)699320395</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ305901397</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SIP security</subfield><subfield code="c">Dorgham Sisalem ...</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester</subfield><subfield code="b">Wiley</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 336 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Session Initiation Protocol (Computer network protocol)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sisalem, Dorgham</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="m">DE-576;wiley</subfield><subfield code="q">image/jpeg</subfield><subfield code="u">http://swbplus.bsz-bw.de/bsz305901397cov.htm</subfield><subfield code="v">20090423202946</subfield><subfield code="3">Cover</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018000187&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018000187</subfield></datafield></record></collection> |
id | DE-604.BV035723458 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:52:59Z |
institution | BVB |
isbn | 9780470516362 |
language | English |
lccn | 2008053852 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018000187 |
oclc_num | 699320395 |
open_access_boolean | |
owner | DE-634 DE-11 |
owner_facet | DE-634 DE-11 |
physical | XIV, 336 S. Ill., graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Wiley |
record_format | marc |
spelling | SIP security Dorgham Sisalem ... 1. publ. Chichester Wiley 2009 XIV, 336 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computer networks / Security measures Session Initiation Protocol (Computer network protocol) Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Sisalem, Dorgham edt DE-576;wiley image/jpeg http://swbplus.bsz-bw.de/bsz305901397cov.htm 20090423202946 Cover GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018000187&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | SIP security Computer networks / Security measures Session Initiation Protocol (Computer network protocol) Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4070085-9 |
title | SIP security |
title_auth | SIP security |
title_exact_search | SIP security |
title_full | SIP security Dorgham Sisalem ... |
title_fullStr | SIP security Dorgham Sisalem ... |
title_full_unstemmed | SIP security Dorgham Sisalem ... |
title_short | SIP security |
title_sort | sip security |
topic | Computer networks / Security measures Session Initiation Protocol (Computer network protocol) Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computer networks / Security measures Session Initiation Protocol (Computer network protocol) Computersicherheit Rechnernetz |
url | http://swbplus.bsz-bw.de/bsz305901397cov.htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018000187&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT sisalemdorgham sipsecurity |