Yu, 2015 - Google Patents
Prevention of toll frauds against ip-pbxYu, 2015
- Document ID
- 15629673589921480915
- Author
- Yu J
- Publication year
- Publication venue
- Proceedings of the International Conference on Security and Management (SAM)
External Links
Snippet
This research is motivated by a toll fraud case against an enterprise IP-PBX, and further investigation of an asterisk server log shows a growing threat of VoIP attacks against enterprise IP-PBX. Although the Session Initiation Protocol (SIP) has a comprehensive …
- 230000002265 prevention 0 title description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Butcher et al. | Security challenge and defense in VoIP infrastructures | |
US8522344B2 (en) | Theft of service architectural integrity validation tools for session initiation protocol (SIP)-based systems | |
US20080089494A1 (en) | System and Method for Securing a Telephone System Comprising Circuit Switched and IP Data Networks | |
Cao et al. | Vulnerability analysis and best practices for adopting IP telephony in critical infrastructure sectors | |
US10536468B2 (en) | System and method for voice security in a telecommunications network | |
Basem et al. | Multilayer secured SIP based VoIP architecture | |
Yu | An empirical study of denial of service (dos) against voip | |
Carvajal et al. | Detecting unprotected SIP-based Voice over IP traffic | |
Pelaez et al. | Misuse patterns in VoIP | |
Coulibaly et al. | Security of Voip networks | |
Mentsiev et al. | VoIP security threats | |
Farley et al. | VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploits | |
Blake | Network security: VoIP security on data network--a guide | |
Yu | Prevention of toll frauds against ip-pbx | |
Hanifan | Designing VoIP security system for organizational network | |
Hofbauer et al. | A lightweight privacy preserving approach for analyzing communication records to prevent voip attacks using toll fraud as an example | |
Obidinnu et al. | A survey of Attacks on VoIP networks and Countermeasures | |
McInnes et al. | Analysis of a PBX toll fraud honeypot | |
Al-Shebami et al. | Wireless LAN security | |
Hofbauer et al. | CDRAS: An approach to dealing with Man-in-the-Middle attacks in the context of Voice over IP | |
Hofbauer et al. | Defense methods against VoIP and video hacking attacks in enterprise networks | |
Almeida et al. | Security Issues in Unified Communications | |
Rizvi et al. | VoIP security threats and vulnerabilities | |
Ylli et al. | EXPLOITING VOIP SECURITY ISSUES IN A CLASSIC SCENARIO | |
Rahman | Security Analysis of the VoIP (Voice Over Internet Protocol) System |