471 Hits in 3.1 sec

Labeled VoIP Data-Set for Intrusion Detection Evaluation [chapter]

Mohamed Nassar, Radu State, Olivier Festor
2010 Lecture Notes in Computer Science  
In this paper, we propose a framework for customizing and generating VoIP traffic within controlled environments. We provide a labeled data-set generated in two types of SIP networks.  ...  Because of the lack of a common labeled data-set similarly to what is available in TCP/IP network-based intrusion detection, their results can not be compared.  ...  In fact, Sipp doesn't represent a SIP user-agent state machine and is more oriented towards the transaction layer than the call layer.  ... 
doi:10.1007/978-3-642-13971-0_10 fatcat:mlnfury74jb7djintxphlt652e

Formal analysis for robust anti-SPIT protection using model checking

Dimitris Gritzalis, Panagiotis Katsaros, Stylianos Basagiannis, Yannis Soupionis
2012 International Journal of Information Security  
We propose an Anti-SPIT Policy Management mechanism (aSPM) that detects spam calls and prevents VoIP session establishment by the Session Initiation Protocol (SIP).  ...  Non-determinism plays a key role in representing all possible anti-SPIT policy decisions, in terms of the SIP messages that may be exchanged.  ...  Acknowledgements This work was performed in the framework of the SPHINX (09SYN-72-419) project, which is partly funded by the Cooperation Programme of the Hellenic General Secretariat for Research & Technology  ... 
doi:10.1007/s10207-012-0159-4 fatcat:o5stlskmdzbe3mdvjc7prn3fwe

A Comprehensive Survey of Voice over IP Security Research

Angelos D. Keromytis
2012 IEEE Communications Surveys and Tutorials  
We present a comprehensive survey of Voice over IP security academic research, using a set of 245 publications forming a closed cross-citation set.  ...  We discuss the implications of our findings with respect to vulnerabilities reported in a variety of VoIP products.  ...  Rebahi and Sisalem [26] develop the concept of the "SIP social network" as a means for managing reputation toward countering SPIT.  ... 
doi:10.1109/surv.2011.031611.00112 fatcat:qxpbre5q2zhwhkjeb63t2bkr2a

A Survey of Voice over IP Security Research [chapter]

Angelos D. Keromytis
2009 Lecture Notes in Computer Science  
We present a survey of Voice over IP security research.  ...  We also briefly discuss the implications of our findings with respect to actual vulnerabilities reported in a variety VoIP products.  ...  SPIT is identified by detecting several fingerprints across a large number of different calls. Schlegel et al. [44] describe a framework for preventing SPIT.  ... 
doi:10.1007/978-3-642-10772-6_1 fatcat:5z7aiao4vjhh7fqx2enkbexu3i

VoIP Malware: Attack Tool & Attack Scenarios

M. Nassar, R. State, O. Festor
2009 2009 IEEE International Conference on Communications  
Our "VoIP bots" support a wide set of attacks ranging from SPIT to DDoS and are tested against several VoIP platforms.  ...  In this paper, we discuss the emergence of a new generation of malwares attacking VoIP infrastructures and services.  ...  In this paper, we present such a framework of VoIP bot and botnet in the context of SIP.  ... 
doi:10.1109/icc.2009.5199570 dblp:conf/icc/NassarSF09 fatcat:map37z3ih5e7pgxpf72vzz2xt4

Risk management in VoIP infrastructures using support vector machines

M. Nassar, O. Dabbebi, R. Badonnel, O. Festor
2010 2010 International Conference on Network and Service Management  
We propose in this paper a runtime risk management strategy based on anomaly detection techniques for continuously adapting the VoIP service exposure.  ...  We describe how SVM parameters can be integrated into a runtime risk model, and show how this framework can be deployed into an Asterisk VoIP server.  ...  Mathematical framework A rich set of machine learning algorithms may constitute a suitable framework for anomaly detection.  ... 
doi:10.1109/cnsm.2010.5691338 dblp:conf/cnsm/NassarDBF10 fatcat:cmw3h5sghrd6fkfmwsk6qt4fbu

Session Initiation Protocol Security: A Brief Review

2012 Journal of Computer Science  
Results and Conclusion: A useful categorization of SIP security issues has been done. The vulnerabilities of existing SIP infrastructure and possible remedies are discussed.  ...  An in-depth investigation related to SIP with the intention to categorize the wide variety of SIP security issues. Approach: Related papers to the infrastructure of SIP security were analyzed.  ...  So, it can manage with PSTN. In fact, SIP is a smooth protocol for managing with other networks.  ... 
doi:10.3844/jcssp.2012.348.357 fatcat:eamzyd6u3jbjxjkwh35p2uzram

DDoS attacks in VoIP: a brief review of detection and mitigation techniques

Sambath Narayanan, Selvakumar Manickam, Yu-Beng Leau
2016 International Journal of Advanced and Applied Sciences  
The Session initiation protocol being an application layer protocol helps to create session between the caller and the called for bidirectional communication using SIP messages.  ...  The user datagram protocol (UDP) over the transmission control protocol (TCP) at the transport layer is favored by SIP because of the connection orientation of SIP and simple behavior of UDP.  ...  It acts as a UAC for transmitting SIP messages; the receiver act as UAS. The SIP client acts as both a SIP UAC and SIP UAS.  ... 
doi:10.21833/ijaas.2016.09.013 fatcat:gzagduren5egzmn2enfazngsla

Issues and challenges in securing VoIP

Ram Dantu, Sonia Fahmy, Henning Schulzrinne, João Cangussu
2009 Computers & security  
Threats Feedback VoIP attacks Security solutions a b s t r a c t Voice over the Internet protocol (VoIP) is being rapidly deployed, and the convergence of the voice and data worlds is introducing exciting  ...  Fig. 6 -Results from the use of a PID controller at both host and FW level (Dantu et al., 2007).  ...  spam-blocking algorithm in which a reputation network manager is built from an SIP repository.  ... 
doi:10.1016/j.cose.2009.05.003 fatcat:7lch4elibnfaffeqafdnzo56g4


Robert Sparks
2007 Queue  
HOW SIP WORKS SIP is a transaction-oriented, text-based protocol. Its messages are similar in syntax to HTTP, but there is little similarity in protocol behavior.  ...  Registrar: A SIP server that manages bindings between long-lived well-known AoRs and the ephemeral contact addresses endpoints get when they connect to the network.  ...  He was a contributing editor to RFC 3261, which defines SIP. Sparks holds a master's degree in mathematics and a bachelor's degree in computer science from Texas A&M University.  ... 
doi:10.1145/1229899.1229909 fatcat:ko6eyugzlbdonpnrvaubkhuun4

Assessing the security of VoIP Services

H. Abdelnur, R. State, I. Chrisment, C. Popi
2007 2007 10th IFIP/IEEE International Symposium on Integrated Network Management  
In this paper we describe our work in a VoIP specific security assessment framework.  ...  framework for defining and composing VoIP specific attacks.  ...  Finally, the SIP monitoring manager is able to detect which is the current state of a SIP device.  ... 
doi:10.1109/inm.2007.374802 dblp:conf/im/AbdelnurSCP07 fatcat:cxik5vpvfjdwbe52feyh76ikka

A Holistic Approach to Open-Source VoIP Security: Preliminary Results from the EUX2010sec Project

Lothar Fritsch, Arne-Kristian Groven, Lars Strand
2009 2009 Eighth International Conference on Networks  
The expected outcomes of the project are a solid scientific and practical understanding of the security options for setting up VoIP infrastructures, particular guidance on secure, typical setups of such  ...  ACKNOWLEDGEMENTS This research is funded by the EUX2010SEC project in the VERDIKT framework of the Research Council of Norway (Norges forskingsråd, project 180054).  ...  Using configuration management enables us to deploy repeatable, accurate test frameworks, to repeat a particular test under the same conditions for reproducibility, or to test a particular scenario with  ... 
doi:10.1109/icn.2009.57 dblp:conf/icn/FritschGS09 fatcat:synodc7gezcs5nf4xlji2c3epm

SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned [chapter]

S. Dritsas, Y. Soupionis, M. Theoharidou, Y. Mallios, D. Gritzalis
IFIP International Federation for Information Processing  
In this paper, we present the phases of a SPIT management process and we form a set of SPIT identification criteria, which are needed in order to characterize a call as SPIT, or a caller as spitter.  ...  Then, we present briefly the currently existing anti-SPIT frameworks, so as to examine which of the SPIT identification criteria is fulfilled by each framework, thus providing an insight on which criteria  ...  Acknowledgements This work has been partially performed within the SPIDER (COOP-32720) project, which is partly funded by the European Commission under Framework Programme 6.  ... 
doi:10.1007/978-0-387-09699-5_25 fatcat:m6f5s7r3bbexzjcf7wp6k3byee

Modeling and performance evaluation of transport protocols for firewall control

Sebastian Kiesel, Michael Scharf
2007 Computer Networks  
The usage of out-ofband signaling protocols such as SIP for IP telephony and multimedia applications requires a dynamic control of these firewalls and imposes several challenges.  ...  Firewalls are a crucial building block for securing IP networks.  ...  Management Information Base (MIB) for the Simple Network Management Protocol (SNMPv3).  ... 
doi:10.1016/j.comnet.2006.11.031 fatcat:parf5ojx5ndufjaj4xzywzxdty

Non-conforming behavior detection for VoIP-based network systems

Panagiotis Galiotos, Christos Anagnostopoulos, Tasos Dagiuklas, Stavros Kotsopoulos
2016 2016 IEEE International Conference on Communications (ICC)  
A trustworthy and secure management and billing scheme is necessary, to guarantee the proper operation. This work proposes a behavioral control scheme for the VoIP clients.  ...  Other services such as FollowMe, enhance the traditional voice-oriented nature of these networks.  ...  ACKNOWLEDGMENT Part of this work has been performed in the framework of the project FP7-SME-2010-232458 SCAMSTOP, which is funded by the European Union.  ... 
doi:10.1109/icc.2016.7511103 dblp:conf/icc/GaliotosADK16 fatcat:zye3sun4fnhq5grumf5md6ryry
« Previous Showing results 1 — 15 out of 471 results