Filters








4 Hits in 4.0 sec

Global VoIP security threats - large scale validation based on independent honeynets

Markus Gruber, Dirk Hoffstadt, Adnan Aziz, Florian Fankhauser, Christian Schanes, Erwin Rathgeb, Thomas Grechenig
2015 2015 IFIP Networking Conference (IFIP Networking)  
The results show similar attacker behavior, confirm previous assumptions about attacks and present new insights in large scale VoIP attacks, e.g., for toll fraud.  ...  In order to effectively protect VoIP users from misuse, researchers use, e.g., honeynets to capture and analyze VoIP attacks occurring in the Internet.  ...  SETUP, OPERATION AND STATISTICS OF THE INDEPENDENT HONEYNETS The honeynets use different architectures for trapping and analyzing VoIP attacks, because the honeynets were designed and implemented independently  ... 
doi:10.1109/ifipnetworking.2015.7145329 dblp:conf/networking/GruberHAFSRG15 fatcat:iw3flbziubfmrhxqa4nbxwljcy

Artemisa: An open-source honeypot back-end to support security in VoIP domains

Rodrigo do Carmo, Mohamed Nassar, Olivier Festor
2011 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops  
The honeypot is designed to connect to a VoIP enterprise domain as a back-end user-agent in order to detect malicious activity at an early stage.  ...  We test the capacity of the honeypot to handle a series of known SIP attacks and present results from diverse scenarios.  ...  Radu State from the University of Luxembourg for his advices. We thank Pablo Masri from Blas Pascal University for his contribution.  ... 
doi:10.1109/inm.2011.5990712 dblp:conf/im/CarmoNF11 fatcat:mrvprsbfbnaqdfji5ibmaduimy

New Approaches to Mitigation of Malicious Traffic in VoIP Networks

Tobi Wulff, Ray Hunt
2010
This paper describes the design and implementation of a novel VoIP security architecture in which evaluation of, and mitigation against, malicious traffic is demonstrated by the use of virtual machines  ...  to emulate vulnerable clients and servers through the use of apparent attack vectors.  ...  flooding x Toll fraud x Noise injection and malicious traffic While many approaches to the threat of flooding and DoS attacks have been proposed [Lee et al., 2008] , other threats still create significant  ... 
doi:10.4225/75/57b52563cd8b0 fatcat:ymhcgvczhvgcxfn5lqky3fbn4e

Evaluation of and Mitigation against Malicious Traffic in SIP-based VoIP Applications in a Broadband Internet Environment [article]

Tobias Wulff, University Of Canterbury
2011
A novel security architecture is being developed which improves the security of a large VoIP network with many inexperienced users, such as non-IT office workers or telecommunication service customers.  ...  The new architecture establishes interaction between the VoIP backend and the end users, thus providing information about ongoing and unknown attacks to all users.  ...  Toll fraud VoIP Network -Malformed packets -Malicious payload -Noise injection -Packet manipulation -Eavesdropping Malicious traffic from other VoIP users Table 3 . 3 1.: VoIP attack methods  ... 
doi:10.26021/1466 fatcat:dqywzibla5h7hkw3r6ocefv46i