The basics of SIP trunking explained
A comprehensive collection of articles, videos and more, hand-picked by our editors
What's the difference between a SIP-flood attack and a telephony denial of service (TDoS) attack? Are they the...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Ask the expert
Do you have a vexing problem for Michael Brandenburg or any of our other experts? Ask your enterprise-specific questions today! (All questions are treated anonymously.)
While both types of attacks have a similar goal in disrupting unified communications (UC) platforms, the attack vector the two methods use is very different. In the case of a TDoS, the attack vector is the target's telephone numbers. By flooding a company's phone circuits with fraudulent inbound calls, a TDoS attack can ultimately prevent legitimate calls (and potential customers) from ever reaching the target business. Without some form of countermeasure, this type of attack can affect everything from the oldest of PBXs to the newest of cloud-based hosted UC platforms.
A SIP-based attack, on the other hand, is a decidedly network-driven attack, and is similar to the types of attacks inflicted upon Internet Web servers. In the case of a SIP-flood, seemingly valid SIP protocol requests attempt to either gain access as a remote endpoint or inundate the UC platform and its endpoints with so many requests that the systems or devices crash, which ultimately disrupts services or exposes vulnerabilities.
Because the two types of attacks target the system in different ways, each has its own way of mitigation. SIP-based attacks might be identified and thwarted by E-SBCs deployed at the network edge to provide flood detection as well as obfuscation of network resources. TDoS attempts, on the other hand, may require call blocking and other tools available from your carrier.
For more information:
Related Q&A from Michael Brandenburg
While an API deployment may seem like a small task, it can have a major effect on the network. IT groups should work with business units to monitor ...continue reading
Don't forget about SIP trunking services during your disaster recovery planning process. Networking expert Michael Brandenburg explains SIP trunking ...continue reading
While VoIP services are growing in popularity, issues with reliability and quality of calls remain. Learn what organizations can do to maintain and ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.