ABSTRACT

SIP security threats fall into one of four different categories. The first set of threats results from the vulnerabilities of SIP. These threats take advantage of the flaws in the definition of SIP in terms of its characteristics, functionality, and description. The second set of threats results from its interoperation with other protocols. This relates to SIP interfacing with other protocols. The third group is threats that exploit the operational details of SIP, including mandatory, nonmandatory, and/or optional requirements of SIP. The fourth type of threat results from the inherent security risks associated with the system under which SIP is used. These four categories of threats are well discussed in [1] and are therefore summarized only.