Berthelot et al., 2009 - Google Patents
Analysis of security issues with respect to Voice over IP technologiesBerthelot et al., 2009
View PDF- Document ID
- 8833379824510748555
- Author
- Berthelot F
- Ludwiniak R
- Publication year
External Links
Snippet
After the recent development of Voice over IP technology, this telecommunication implementation type is now in full expansion. The democratisation of private networks tend more and more enterprises to convert to this solution, for cost and flexibility reasons …
- 238000004458 analytical method 0 title description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1013—Network architectures, gateways, control or user entities
- H04L65/102—Gateways
- H04L65/1023—Media gateways
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1013—Network architectures, gateways, control or user entities
- H04L65/102—Gateways
- H04L65/1033—Signalling gateways
- H04L65/104—Signalling gateways at the edge
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1013—Network architectures, gateways, control or user entities
- H04L65/1046—Call controllers; Call servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1003—Signalling or session protocols
- H04L65/1006—SIP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1013—Network architectures, gateways, control or user entities
- H04L65/1043—MGC, MGCP or Megaco
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1066—Session control
- H04L65/1083—In-session procedures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements or network protocols for addressing or naming
- H04L61/25—Network arrangements or network protocols for addressing or naming mapping of addresses of the same type; address translation
- H04L61/2503—Internet protocol [IP] address translation
- H04L61/256—Network address translation [NAT] traversal
- H04L61/2564—Network address translation [NAT] traversal for a higher-layer protocol, e.g. for session initiation protocol [SIP]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kuhn et al. | Security considerations for voice over IP systems | |
Frankel et al. | Guide to IPsec VPNs:. | |
Keromytis | A comprehensive survey of voice over IP security research | |
Thermos et al. | Securing VoIP Networks | |
Tuleun | Design of an asterisk based VoIP system and the implementation of security solution across the VoIP network | |
Geneiatakis et al. | SIP Security Mechanisms: A state-of-the-art review | |
Keromytis | Voice over IP: Risks, threats and vulnerabilities | |
Park | Voice over IP security | |
Dwivedi | Hacking VoIP: protocols, attacks, and countermeasures | |
Frankel et al. | Guide to ssl vpns | |
Loughney et al. | Security considerations for signaling Transport (SIGTRAN) Protocols | |
Keromytis | Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research | |
Keromytis | A look at VoIP vulnerabilities | |
Tuleun | Implementing advanced security measures in asterisk-driven VoIP networks | |
Ackermann et al. | Vulnerabilities and Security Limitations of current IP Telephony Systems | |
Berthelot et al. | Analysis of security issues with respect to Voice over IP technologies | |
Park et al. | A security evaluation of IMS deployments | |
Cybersecurity et al. | Guide to ipsec vpns | |
Magnusson | SIP trunking benefits and best practices | |
Singhai et al. | VoIP Security | |
Rossebo et al. | Security issues in VoIP | |
Sweeney et al. | Commercial Interoperable VoIP IA Architecture | |
Persky | SANS Institute | |
James et al. | Securing VoIP: A Framework to Mitigate or Manage Risks | |
Tzvetkov et al. | Service provider implementation of SIP regarding security |