Special Issue Article
Analysis of Various Attacks and Prevention of Dos Attack in P2PSIP Networks
Recently, establishing a VoIP call using a P2P network instead of regular SIP-servers has been proposed; this novel approach to SIPsignaling is commonly referred to as P2PSIP. The main motivation for peer-to-peer (P2P) SIP is simple configuration, higher robustness and easy maintenance as compared to client-server SIP. However, these benefits come at the cost of security. Securing against adversary nodes which intentionally interrupt functionality of the network remains a major research problem. So evaluation of attacks is of utmost importance for enhancing security and standardization of P2PSIP network communication. In this survey we analyze the security challenges of using a P2P network as a substrate for SIP communication by analyzing the attacks that can be launched against them. The proposed system presents the evaluation of different attacks that can be launched against the services (access control, routing, bootstrap, storage, communication, and resource management) of P2PSIP architecture. Assessment of attacks using security parameters (integrity, confidentiality, nonrepudiation, availability, authenticity) shows that out of all the attacks DOS attack is the most dangerous attack and multiple layer security mechanism is proposed to prevent the DOS attack. With these solutions, P2PSIP networks will be more robust against flooding DOS attacks.