[go: up one dir, main page]

Yu, 2015 - Google Patents

Prevention of toll frauds against ip-pbx

Yu, 2015

Document ID
15629673589921480915
Author
Yu J
Publication year
Publication venue
Proceedings of the International Conference on Security and Management (SAM)

External Links

Snippet

This research is motivated by a toll fraud case against an enterprise IP-PBX, and further investigation of an asterisk server log shows a growing threat of VoIP attacks against enterprise IP-PBX. Although the Session Initiation Protocol (SIP) has a comprehensive …
Continue reading at search.proquest.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
Butcher et al. Security challenge and defense in VoIP infrastructures
US8522344B2 (en) Theft of service architectural integrity validation tools for session initiation protocol (SIP)-based systems
US20080089494A1 (en) System and Method for Securing a Telephone System Comprising Circuit Switched and IP Data Networks
Cao et al. Vulnerability analysis and best practices for adopting IP telephony in critical infrastructure sectors
US10536468B2 (en) System and method for voice security in a telecommunications network
Basem et al. Multilayer secured SIP based VoIP architecture
Yu An empirical study of denial of service (dos) against voip
Carvajal et al. Detecting unprotected SIP-based Voice over IP traffic
Pelaez et al. Misuse patterns in VoIP
Coulibaly et al. Security of Voip networks
Mentsiev et al. VoIP security threats
Farley et al. VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploits
Blake Network security: VoIP security on data network--a guide
Yu Prevention of toll frauds against ip-pbx
Hanifan Designing VoIP security system for organizational network
Hofbauer et al. A lightweight privacy preserving approach for analyzing communication records to prevent voip attacks using toll fraud as an example
Obidinnu et al. A survey of Attacks on VoIP networks and Countermeasures
McInnes et al. Analysis of a PBX toll fraud honeypot
Al-Shebami et al. Wireless LAN security
Hofbauer et al. CDRAS: An approach to dealing with Man-in-the-Middle attacks in the context of Voice over IP
Hofbauer et al. Defense methods against VoIP and video hacking attacks in enterprise networks
Almeida et al. Security Issues in Unified Communications
Rizvi et al. VoIP security threats and vulnerabilities
Ylli et al. EXPLOITING VOIP SECURITY ISSUES IN A CLASSIC SCENARIO
Rahman Security Analysis of the VoIP (Voice Over Internet Protocol) System