[go: up one dir, main page]

Wang et al., 2011 - Google Patents

Voip security: vulnerabilities, exploits, and defenses

Wang et al., 2011

Document ID
12557929046151459492
Author
Wang X
Zhang R
Publication year
Publication venue
Advances in Computers

External Links

Snippet

Telephone network is an important part of the critical information infrastructure. Traditional Public Switched Telephony Network (PSTN) has been shown to be reliable and hard to be tampered with by normal people. The general public has put a lot of trust on landline …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42314Systems providing special services or facilities to subscribers in private branch exchanges
    • H04M3/4234Remote access to features of PBX or home telephone systems-teleworking in a PBX
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1013Network architectures, gateways, control or user entities
    • H04L65/102Gateways
    • H04L65/1023Media gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Interconnection arrangements between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • H04M7/0078Security; Fraud detection; Fraud prevention
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/487Arrangements for providing information services, e.g. recorded voice services, time announcement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Interconnection arrangements between switching centres
    • H04M7/12Interconnection arrangements between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step, decimal and non-decimal, circuit-switched and packet-switched, i.e. gateway arrangements
    • H04M7/1205Interconnection arrangements between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step, decimal and non-decimal, circuit-switched and packet-switched, i.e. gateway arrangements where the types of switching equipement comprises PSTN/ISDN equipment and switching equipment of networks other than PSTN/ISDN, e.g. Internet Protocol networks
    • H04M7/1225Details of core network interconnection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1066Session control
    • H04L65/1083In-session procedures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/66Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling

Similar Documents

Publication Publication Date Title
Geneiatakis et al. Survey of security vulnerabilities in session initiation protocol
Zhang et al. Billing Attacks on SIP-Based VoIP Systems.
Geneiatakis et al. SIP Security Mechanisms: A state-of-the-art review
Rehman et al. Security analysis of VoIP architecture for identifying SIP vulnerabilities
Baumann et al. Voice over IP-security and SPIT
Wang et al. Voice pharming attack and the trust of VoIP
Werapun et al. Solution analysis for SIP security threats
Thermos Two attacks against VoIP
Phithakkitnukoon et al. Voip security—attacks and solutions
Voznak et al. Threats to voice over IP communications systems
Guillet et al. Mutual Authentication for SIP: A semantic meaning for the SIP opaque values
Duanfeng et al. Security mechanisms for SIP-based multimedia communication infrastructure
Zhang et al. On the billing vulnerabilities of SIP-based VoIP systems
Cao et al. Security analysis and solutions for deploying IP telephony in the critical infrastructure
Wang et al. Voip security: vulnerabilities, exploits, and defenses
Arafat et al. SIP security in IP telephony
Chang et al. Design and implementation of SIP security
Behl et al. An analysis of security implications in session initiation protocol (SIP)
Qiu Study of digest authentication for Session Initiation protocol (SIP)
Al Saidat A design of an enhanced redundant SIP model for securing SIP-based networks
Patil et al. VoIP security
Yang et al. Security issues in VoIP telecommunication networks
Zhang et al. An empirical investigation into the security of phone features in sip-based voip systems
Sengar Don’t Let the VoIP Service to Become a Nuisance for Its Subscribers
Moon et al. Securing VoIP networks via signaling protocol layer