A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Global VoIP security threats - large scale validation based on independent honeynets
2015
2015 IFIP Networking Conference (IFIP Networking)
The results show similar attacker behavior, confirm previous assumptions about attacks and present new insights in large scale VoIP attacks, e.g., for toll fraud. ...
In order to effectively protect VoIP users from misuse, researchers use, e.g., honeynets to capture and analyze VoIP attacks occurring in the Internet. ...
SETUP, OPERATION AND STATISTICS OF THE INDEPENDENT HONEYNETS The honeynets use different architectures for trapping and analyzing VoIP attacks, because the honeynets were designed and implemented independently ...
doi:10.1109/ifipnetworking.2015.7145329
dblp:conf/networking/GruberHAFSRG15
fatcat:iw3flbziubfmrhxqa4nbxwljcy
Artemisa: An open-source honeypot back-end to support security in VoIP domains
2011
12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops
The honeypot is designed to connect to a VoIP enterprise domain as a back-end user-agent in order to detect malicious activity at an early stage. ...
We test the capacity of the honeypot to handle a series of known SIP attacks and present results from diverse scenarios. ...
Radu State from the University of Luxembourg for his advices. We thank Pablo Masri from Blas Pascal University for his contribution. ...
doi:10.1109/inm.2011.5990712
dblp:conf/im/CarmoNF11
fatcat:mrvprsbfbnaqdfji5ibmaduimy
New Approaches to Mitigation of Malicious Traffic in VoIP Networks
2010
This paper describes the design and implementation of a novel VoIP security architecture in which evaluation of, and mitigation against, malicious traffic is demonstrated by the use of virtual machines ...
to emulate vulnerable clients and servers through the use of apparent attack vectors. ...
flooding x Toll fraud x Noise injection and malicious traffic While many approaches to the threat of flooding and DoS attacks have been proposed [Lee et al., 2008] , other threats still create significant ...
doi:10.4225/75/57b52563cd8b0
fatcat:ymhcgvczhvgcxfn5lqky3fbn4e
Evaluation of and Mitigation against Malicious Traffic in SIP-based VoIP Applications in a Broadband Internet Environment
[article]
2011
A novel security architecture is being developed which improves the security of a large VoIP network with many inexperienced users, such as non-IT office workers or telecommunication service customers. ...
The new architecture establishes interaction between the VoIP backend and the end users, thus providing information about ongoing and unknown attacks to all users. ...
Toll fraud
VoIP Network
-Malformed packets
-Malicious payload
-Noise injection
-Packet manipulation
-Eavesdropping
Malicious traffic from
other VoIP users
Table 3 . 3 1.: VoIP attack methods ...
doi:10.26021/1466
fatcat:dqywzibla5h7hkw3r6ocefv46i