[go: up one dir, main page]

Arya Chandrapal Singh et al., 2019 - Google Patents

VoIP Security Threat Taxonomy and Privacy

Arya Chandrapal Singh et al., 2019

View PDF
Document ID
8507610336450342131
Author
Arya Chandrapal Singh P
Bajirao B
Ashok K
Publication year

External Links

Snippet

The number of users of VoIP services is increasingevery year. Consequently, VoIP systems get more attractive for attackers. This paper describes the implementation of a low interaction honeypot for monitoring illegal activities in VoIP environments. The honeypot …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Geneiatakis et al. Survey of security vulnerabilities in session initiation protocol
US9473529B2 (en) Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using method vulnerability filtering
US8966619B2 (en) Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using return routability check filtering
US20090103524A1 (en) System and method to precisely learn and abstract the positive flow behavior of a unified communication (uc) application and endpoints
Naeem et al. A survey on registration hijacking attack consequences and protection for Session Initiation Protocol (SIP)
Park Voice over IP security
Rezac et al. Security risks in IP telephony
Nassar et al. VoIP honeypot architecture
Wang et al. Voice pharming attack and the trust of VoIP
Srihari et al. Security aspects of SIP based VoIP networks: A survey
El-Moussa et al. Overview of SIP attacks and countermeasures
Voznak et al. Threats to voice over IP communications systems
Vrakas et al. An intrusion detection and prevention system for IMS and VoIP services
Phithakkitnukoon et al. Voip security—attacks and solutions
Duanfeng et al. Security mechanisms for SIP-based multimedia communication infrastructure
Arya Chandrapal Singh et al. VoIP Security Threat Taxonomy and Privacy
Ahmad et al. VoIP security: A model proposed to mitigate DDoS attacks on SIP based VoIP network
Hussain et al. A lightweight countermeasure to cope with flooding attacks against session initiation protocol
Arafat et al. SIP security in IP telephony
Behl et al. An analysis of security implications in session initiation protocol (SIP)
Obidinnu et al. A survey of Attacks on VoIP networks and Countermeasures
Nassar et al. VoIP malware: Attack tool & attack scenarios
Patil et al. VoIP security
Al Saidat A design of an enhanced redundant SIP model for securing SIP-based networks
Omari et al. A closer look on challenges and security risks of Voice over Internet Protocol infrastructures