Wang et al., 2011 - Google Patents
Voip security: vulnerabilities, exploits, and defensesWang et al., 2011
- Document ID
- 12557929046151459492
- Author
- Wang X
- Zhang R
- Publication year
- Publication venue
- Advances in Computers
External Links
Snippet
Telephone network is an important part of the critical information infrastructure. Traditional Public Switched Telephony Network (PSTN) has been shown to be reliable and hard to be tampered with by normal people. The general public has put a lot of trust on landline …
- 238000004891 communication 0 abstract description 19
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42314—Systems providing special services or facilities to subscribers in private branch exchanges
- H04M3/4234—Remote access to features of PBX or home telephone systems-teleworking in a PBX
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1013—Network architectures, gateways, control or user entities
- H04L65/102—Gateways
- H04L65/1023—Media gateways
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Interconnection arrangements between switching centres
- H04M7/006—Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
- H04M7/0078—Security; Fraud detection; Fraud prevention
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/487—Arrangements for providing information services, e.g. recorded voice services, time announcement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Interconnection arrangements between switching centres
- H04M7/12—Interconnection arrangements between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step, decimal and non-decimal, circuit-switched and packet-switched, i.e. gateway arrangements
- H04M7/1205—Interconnection arrangements between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step, decimal and non-decimal, circuit-switched and packet-switched, i.e. gateway arrangements where the types of switching equipement comprises PSTN/ISDN equipment and switching equipment of networks other than PSTN/ISDN, e.g. Internet Protocol networks
- H04M7/1225—Details of core network interconnection arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1066—Session control
- H04L65/1083—In-session procedures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/66—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Geneiatakis et al. | Survey of security vulnerabilities in session initiation protocol | |
Zhang et al. | Billing Attacks on SIP-Based VoIP Systems. | |
Geneiatakis et al. | SIP Security Mechanisms: A state-of-the-art review | |
Rehman et al. | Security analysis of VoIP architecture for identifying SIP vulnerabilities | |
Baumann et al. | Voice over IP-security and SPIT | |
Wang et al. | Voice pharming attack and the trust of VoIP | |
Werapun et al. | Solution analysis for SIP security threats | |
Thermos | Two attacks against VoIP | |
Phithakkitnukoon et al. | Voip security—attacks and solutions | |
Voznak et al. | Threats to voice over IP communications systems | |
Guillet et al. | Mutual Authentication for SIP: A semantic meaning for the SIP opaque values | |
Duanfeng et al. | Security mechanisms for SIP-based multimedia communication infrastructure | |
Zhang et al. | On the billing vulnerabilities of SIP-based VoIP systems | |
Cao et al. | Security analysis and solutions for deploying IP telephony in the critical infrastructure | |
Wang et al. | Voip security: vulnerabilities, exploits, and defenses | |
Arafat et al. | SIP security in IP telephony | |
Chang et al. | Design and implementation of SIP security | |
Behl et al. | An analysis of security implications in session initiation protocol (SIP) | |
Qiu | Study of digest authentication for Session Initiation protocol (SIP) | |
Al Saidat | A design of an enhanced redundant SIP model for securing SIP-based networks | |
Patil et al. | VoIP security | |
Yang et al. | Security issues in VoIP telecommunication networks | |
Zhang et al. | An empirical investigation into the security of phone features in sip-based voip systems | |
Sengar | Don’t Let the VoIP Service to Become a Nuisance for Its Subscribers | |
Moon et al. | Securing VoIP networks via signaling protocol layer |