preview

The Session Initiation Protocol Sip

Good Essays

The Session Initiation Protocol SIP is responsible for signaling and controlling communication over the internet. The public switch telephone network is what can connect two telephone servers and allow them to connect with one another. In its birthing years, the PSTN was very simply operated. This network could connect two telephones to allow conversations from homes to businesses by telephone lines. As technology increased private branch exchanges were created. The PBE helped the capability of increasing telephone lines to multiple different destinations. Although the advancement on technology is extremely helpful to those who conduct international business affairs, it also opens the door for many protocol vulnerabilities.
As with any …show more content…

This type of communication is widely used across the United States and other countries for both business and personal usage, because it is among the simplest. Call setup is the way that two telephones can recognize one another and share information via those two lines. This means that SIP understands call setup is the main application layer.
The act of using voIP over the internet opens the window for many internet attacks and security and protocol issues. Protocol vulnerabilities include numerous attacks all at once, security vulnerabilities, and attacks exploiting private and crucial information. VoIP is a freely opened environment, therefore, there is a large window of opportunity to the hacking world. What this means is that the internet is easily assessable to a multitude of people, some with good intent and some with malicious intent. Because this is made to be so easily accessed, it is easy for a person to act in a criminal manor and disrupt the flow of private conversations. To help eliminate some of these issues SIP has evolved as the signaling protocol to recognize and handle mass media sessions for the internet and its extremities. These vulnerabilities are so severe because attackers can exhaust and misuse available resources, create false responses to malicious requests, or discover more security vulnerabilities.
To secure VoIP networks can be very complicated. The first VoIP vulnerability is insufficient verification data. This weakness

Get Access