VoIP News
VoIP Providers
VoIP Books
VoIP Software
VoIP Jobs
VoIP Events Calendar
VoIP FAQ
Archives
Contact
About
Report Finds VOIP Services Susceptible to Major Attacks Through SIP
The flexibility and openness of SIP have made it a key building block for VOIP services, but SIP also makes carrier and enterprise VOIP networks vulnerable to crippling attacks that could bring services down for days, according to the latest report published by
Light Reading's VOIP Services Insider
.
SIP & VOIP: The Coming Security Crisis explores the vulnerabilities of VOIP networks to outside attacks and surveys available SIP security solutions, examining likely geographic expansion and providing an in-depth evaluation of the technology relative to its competition. It examines factors that vendors should address to promote growth, including technological and marketing issues. Additionally, it offers a detailed case study and provides a comparative analysis of some of the top companies in the SIP security arena.
SIP is subject to the same types of attacks -- including viruses and denial-of-service (DOS) attacks -- that affect email communications, but a successful attack through SIP is likely to have a larger impact on the affected network, notes Denise Culver, research analyst with Light Reading's VOIP Services Insider and author of the report. "SIP enables voice traffic to traverse VPNs, potentially carrying with it all of the things a hacker might want to attach to such a message," she says. "While those in the email security world have had more than a decade to contend with these issues, SIP security vendors are trying not only to address the issue of securing SIP messages but also to ensure that SIP can successfully traverse a firewall at all."
A big part of the problem with SIP is that vendors have rushed products into the market that don't make use of all the security measures recommended in the protocol standard, Culver adds. The standard's flexibility is also an issue in making networks vulnerable to security breaches, she says: "Until vendors reach a point at which interoperability is not just a requirement but actually something they recognize in terms of the security it provides across SIP itself, the protocol will remain inherently flawed."
Other key findings of SIP & VOIP: The Coming Security Crisis include the following:
Although SIP is widely considered the standard protocol for VOIP services, it doesn't traverse firewalls, creating problems for users and security vendors.
Attention placed on eavesdropping at the SIP phone level isn't driving users to encrypt SIP, even though eavesdropping presents a viable threat.
While the cost of securing SIP networks is widely debated, everyone agrees that much more will be spent over the next 12-18 months to keep networks secure.
SIP & VOIP: The Coming Security Crisis provides critical data and analysis for a range of industry participants, including:
Suppliers of SIP security product needing independent market analysis of the SIP security sector
VOIP network operators and enterprise network planners evaluating deployment of SIP security products and the risks posed by potential security breaches to their networks
Investors needing a better understanding of the scale of the opportunity that SIP security presents, and which types of companies are best positioned in the sector
Posted on Nov 15, 2007
Reviews
|
Share
|
Digg
Filed in:
Security
|
VoIP Reports
Related Entries
•
Security Researcher Demonstrates Enterprise VoIP Phone Hack at Recent Amphion Forum
•
Vertex Telecom Selects RedShift Networks as the VOIP/SIP Security Solution for Enterprise and Wholesale Customers
•
Report: The VoIP Market 2012-2017 - Prospects for Skype and Other Players
•
Report: Carrier VoIP and IMS Market Falls Back to Earth in Q2 after LTE-Inspired Boost
•
Rebtel Mobile Device Survey Shows that 20 Million American Smartphone Owners Spend Approx. $37.8B Annually On International Calls
•
Report: ''Global VoIP Revenues to Reach $65 Billion in 2012''
All comments require the approval of the site owner before being displayed.
Post a Comment
Please use a valid e-mail address. Your address will not be publicly visible and is only a means for us to contact you when asked. Thank you.
Name
E-mail
(will show your
gravatar
icon)
Home page
Remember Me
Comment (Some html is allowed:
)
Enter the code shown (prevents robots):
All brand, company, and product names are trademarks or registered trademarks of their
respective owners. © 2012 VoIP Monitor. All rights reserved.
Privacy Policy
Terms
SUBSCRIBE
Subscribe to our RSS feed
Bookmark VoIPMonitor.net
Subscribe to our newsletter via email
News Categories
Asterisk
Bluetooth Headsets
E911
General
Hardware
Investments
iPad
iPhone
Mergers and Acquisitions
Mobile VoIP
Offbeat News
Security
SIP
VoIP Advice
VoIP Awards
VoIP Bloggers
VoIP Books
VoIP by Region
Africa
Asia
Australia
Europe
Middle East
North America
South America
VoIP Events
VoIP Jobs
VoIP Products
VoIP Promotions
VoIP Providers
ATT
Fusion
Google Talk
Lingo
MCI
MSN Messenger
Net2Phone
Packet8
Phone Power
Pingo
Qwest
RingCentral
SBC
Skype
SunRocket
Verizon
ViaTalk
Vonage
Yahoo Messenger
VoIP Reports
VoIP Software
VoIP Solutions
VoIP Wireless
WiFi
VoIP Information
Tom Keating
Alec Saunders
Andy Abramson
Garrett Smith
Jeff Pulver
Om Malik
Thoughts on VoIP
Solomon's VoIP World
VoIP Weblog
VoIP Guide
Archives
May, 2013 (2)
December, 2012 (3)
November, 2012 (7)
October, 2012 (19)
September, 2012 (5)
August, 2012 (10)
July, 2012 (24)
June, 2012 (18)
May, 2012 (28)
April, 2012 (20)
March, 2012 (16)
February, 2012 (12)
January, 2012 (12)
November, 2011 (21)
October, 2011 (28)
September, 2011 (23)
August, 2011 (26)
July, 2011 (26)
June, 2011 (38)
May, 2011 (59)
April, 2011 (49)
March, 2011 (67)
February, 2011 (68)
January, 2011 (54)
December, 2010 (45)
November, 2010 (43)
October, 2010 (47)
September, 2010 (43)
August, 2010 (32)
July, 2010 (28)
June, 2010 (39)
May, 2010 (46)
April, 2010 (36)
March, 2010 (52)
February, 2010 (45)
January, 2010 (44)
December, 2009 (41)
November, 2009 (46)
October, 2009 (54)
September, 2009 (58)
August, 2009 (29)
July, 2009 (36)
June, 2009 (32)
May, 2009 (32)
April, 2009 (13)
March, 2009 (47)
February, 2009 (37)
January, 2009 (53)
December, 2008 (44)
November, 2008 (56)
October, 2008 (51)
September, 2008 (50)
August, 2008 (41)
July, 2008 (50)
June, 2008 (52)
May, 2008 (53)
April, 2008 (64)
March, 2008 (59)
February, 2008 (53)
January, 2008 (65)
December, 2007 (39)
November, 2007 (33)
October, 2007 (65)
September, 2007 (29)
August, 2007 (52)
July, 2007 (49)
June, 2007 (59)
May, 2007 (64)
April, 2007 (43)
March, 2007 (66)
February, 2007 (100)
January, 2007 (108)
December, 2006 (86)
November, 2006 (100)
October, 2006 (86)
September, 2006 (55)
August, 2006 (31)
July, 2006 (76)
June, 2006 (79)
May, 2006 (87)
April, 2006 (45)
March, 2006 (55)
February, 2006 (55)
January, 2006 (56)
December, 2005 (53)
November, 2005 (61)
October, 2005 (13)
September, 2005 (42)
August, 2005 (57)
April, 2005 (57)
March, 2005 (21)
February, 2005 (15)