Arya Chandrapal Singh et al., 2019 - Google Patents
VoIP Security Threat Taxonomy and PrivacyArya Chandrapal Singh et al., 2019
View PDF- Document ID
- 8507610336450342131
- Author
- Arya Chandrapal Singh P
- Bajirao B
- Ashok K
- Publication year
External Links
Snippet
The number of users of VoIP services is increasingevery year. Consequently, VoIP systems get more attractive for attackers. This paper describes the implementation of a low interaction honeypot for monitoring illegal activities in VoIP environments. The honeypot …
- 238000001514 detection method 0 abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Geneiatakis et al. | Survey of security vulnerabilities in session initiation protocol | |
US9473529B2 (en) | Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using method vulnerability filtering | |
US8966619B2 (en) | Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using return routability check filtering | |
US20090103524A1 (en) | System and method to precisely learn and abstract the positive flow behavior of a unified communication (uc) application and endpoints | |
Naeem et al. | A survey on registration hijacking attack consequences and protection for Session Initiation Protocol (SIP) | |
Park | Voice over IP security | |
Rezac et al. | Security risks in IP telephony | |
Nassar et al. | VoIP honeypot architecture | |
Wang et al. | Voice pharming attack and the trust of VoIP | |
Srihari et al. | Security aspects of SIP based VoIP networks: A survey | |
El-Moussa et al. | Overview of SIP attacks and countermeasures | |
Voznak et al. | Threats to voice over IP communications systems | |
Vrakas et al. | An intrusion detection and prevention system for IMS and VoIP services | |
Phithakkitnukoon et al. | Voip security—attacks and solutions | |
Duanfeng et al. | Security mechanisms for SIP-based multimedia communication infrastructure | |
Arya Chandrapal Singh et al. | VoIP Security Threat Taxonomy and Privacy | |
Ahmad et al. | VoIP security: A model proposed to mitigate DDoS attacks on SIP based VoIP network | |
Hussain et al. | A lightweight countermeasure to cope with flooding attacks against session initiation protocol | |
Arafat et al. | SIP security in IP telephony | |
Behl et al. | An analysis of security implications in session initiation protocol (SIP) | |
Obidinnu et al. | A survey of Attacks on VoIP networks and Countermeasures | |
Nassar et al. | VoIP malware: Attack tool & attack scenarios | |
Patil et al. | VoIP security | |
Al Saidat | A design of an enhanced redundant SIP model for securing SIP-based networks | |
Omari et al. | A closer look on challenges and security risks of Voice over Internet Protocol infrastructures |