A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
The results show similar attacker behavior, confirm previous assumptions about attacks and present new insights in large scale VoIP attacks, e.g., for toll fraud. ... In order to effectively protect VoIP users from misuse, researchers use, e.g., honeynets to capture and analyze VoIP attacks occurring in the Internet. ... SETUP, OPERATION AND STATISTICS OF THE INDEPENDENT HONEYNETS The honeynets use different architectures for trapping and analyzing VoIP attacks, because the honeynets were designed and implemented independently ...doi:10.1109/ifipnetworking.2015.7145329 dblp:conf/networking/GruberHAFSRG15 fatcat:iw3flbziubfmrhxqa4nbxwljcy
The honeypot is designed to connect to a VoIP enterprise domain as a back-end user-agent in order to detect malicious activity at an early stage. ... We test the capacity of the honeypot to handle a series of known SIP attacks and present results from diverse scenarios. ... Radu State from the University of Luxembourg for his advices. We thank Pablo Masri from Blas Pascal University for his contribution. ...doi:10.1109/inm.2011.5990712 dblp:conf/im/CarmoNF11 fatcat:mrvprsbfbnaqdfji5ibmaduimy
This paper describes the design and implementation of a novel VoIP security architecture in which evaluation of, and mitigation against, malicious traffic is demonstrated by the use of virtual machines ... to emulate vulnerable clients and servers through the use of apparent attack vectors. ... flooding x Toll fraud x Noise injection and malicious traffic While many approaches to the threat of flooding and DoS attacks have been proposed [Lee et al., 2008] , other threats still create significant ...doi:10.4225/75/57b52563cd8b0 fatcat:ymhcgvczhvgcxfn5lqky3fbn4e
A novel security architecture is being developed which improves the security of a large VoIP network with many inexperienced users, such as non-IT office workers or telecommunication service customers. ... The new architecture establishes interaction between the VoIP backend and the end users, thus providing information about ongoing and unknown attacks to all users. ... Toll fraud VoIP Network -Malformed packets -Malicious payload -Noise injection -Packet manipulation -Eavesdropping Malicious traffic from other VoIP users Table 3 . 3 1.: VoIP attack methods ...doi:10.26021/1466 fatcat:dqywzibla5h7hkw3r6ocefv46i