The basics of SIP trunking explained
A comprehensive collection of articles, videos and more, hand-picked by our editors
What's the difference between a SIP-flood attack and a telephony denial of service (TDoS) attack? Are they the...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Ask the expert
Do you have a vexing problem for Michael Brandenburg or any of our other experts? Ask your enterprise-specific questions today! (All questions are treated anonymously.)
While both types of attacks have a similar goal in disrupting unified communications (UC) platforms, the attack vector the two methods use is very different. In the case of a TDoS, the attack vector is the target's telephone numbers. By flooding a company's phone circuits with fraudulent inbound calls, a TDoS attack can ultimately prevent legitimate calls (and potential customers) from ever reaching the target business. Without some form of countermeasure, this type of attack can affect everything from the oldest of PBXs to the newest of cloud-based hosted UC platforms.
A SIP-based attack, on the other hand, is a decidedly network-driven attack, and is similar to the types of attacks inflicted upon Internet Web servers. In the case of a SIP-flood, seemingly valid SIP protocol requests attempt to either gain access as a remote endpoint or inundate the UC platform and its endpoints with so many requests that the systems or devices crash, which ultimately disrupts services or exposes vulnerabilities.
Because the two types of attacks target the system in different ways, each has its own way of mitigation. SIP-based attacks might be identified and thwarted by E-SBCs deployed at the network edge to provide flood detection as well as obfuscation of network resources. TDoS attempts, on the other hand, may require call blocking and other tools available from your carrier.
For more information:
Related Q&A from Michael Brandenburg
Organizations looking for the best way to deploy SIP trunks can look to their Carrier Ethernet. Michael Brandenburg explains the benefits of SIP ...continue reading
Making sure VoIP bandwidth is sufficient can be difficult when the network is shared with non-mission critical apps. Expert Michael Brandenburg ...continue reading
There is no one-size-fits-all approach to SIP. Networking expert Michael Brandenburg explains how to choose between a decentralized and centralized ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.