[go: up one dir, main page]

Berthelot et al., 2009 - Google Patents

Analysis of security issues with respect to Voice over IP technologies

Berthelot et al., 2009

View PDF
Document ID
8833379824510748555
Author
Berthelot F
Ludwiniak R
Publication year

External Links

Snippet

After the recent development of Voice over IP technology, this telecommunication implementation type is now in full expansion. The democratisation of private networks tend more and more enterprises to convert to this solution, for cost and flexibility reasons …
Continue reading at fichiers.florian-berthelot.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1013Network architectures, gateways, control or user entities
    • H04L65/102Gateways
    • H04L65/1023Media gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1013Network architectures, gateways, control or user entities
    • H04L65/102Gateways
    • H04L65/1033Signalling gateways
    • H04L65/104Signalling gateways at the edge
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1013Network architectures, gateways, control or user entities
    • H04L65/1046Call controllers; Call servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1003Signalling or session protocols
    • H04L65/1006SIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1013Network architectures, gateways, control or user entities
    • H04L65/1043MGC, MGCP or Megaco
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1066Session control
    • H04L65/1083In-session procedures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements or network protocols for addressing or naming
    • H04L61/25Network arrangements or network protocols for addressing or naming mapping of addresses of the same type; address translation
    • H04L61/2503Internet protocol [IP] address translation
    • H04L61/256Network address translation [NAT] traversal
    • H04L61/2564Network address translation [NAT] traversal for a higher-layer protocol, e.g. for session initiation protocol [SIP]

Similar Documents

Publication Publication Date Title
Kuhn et al. Security considerations for voice over IP systems
Frankel et al. Guide to IPsec VPNs:.
Keromytis A comprehensive survey of voice over IP security research
Thermos et al. Securing VoIP Networks
Tuleun Design of an asterisk based VoIP system and the implementation of security solution across the VoIP network
Geneiatakis et al. SIP Security Mechanisms: A state-of-the-art review
Keromytis Voice over IP: Risks, threats and vulnerabilities
Park Voice over IP security
Dwivedi Hacking VoIP: protocols, attacks, and countermeasures
Frankel et al. Guide to ssl vpns
Loughney et al. Security considerations for signaling Transport (SIGTRAN) Protocols
Keromytis Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research
Keromytis A look at VoIP vulnerabilities
Tuleun Implementing advanced security measures in asterisk-driven VoIP networks
Ackermann et al. Vulnerabilities and Security Limitations of current IP Telephony Systems
Berthelot et al. Analysis of security issues with respect to Voice over IP technologies
Park et al. A security evaluation of IMS deployments
Cybersecurity et al. Guide to ipsec vpns
Magnusson SIP trunking benefits and best practices
Singhai et al. VoIP Security
Rossebo et al. Security issues in VoIP
Sweeney et al. Commercial Interoperable VoIP IA Architecture
Persky SANS Institute
James et al. Securing VoIP: A Framework to Mitigate or Manage Risks
Tzvetkov et al. Service provider implementation of SIP regarding security