Filters








4,189 Hits in 3.2 sec

Traffic considerations for security services in VoIP systems [chapter]

Wilhelm Wimmreuter
2000 Telecommunication Network Intelligence  
Voice over IP systems require a new infrastructure of security services. The demand is currently growing and deploys basic-authentication in the first step.  ...  Additionally, if carefully implemented, they can serve for other applications besides VoiP as well.  ...  Out of the major areas of security in VoIP systems, we focus on services for user-authentication.  ... 
doi:10.1007/978-0-387-35522-1_2 dblp:conf/smartnet/Wimmreuter00 fatcat:2mpqd54b6fa6jm7mrxdddrttqm

Implementing Enterprise VoIP Deployment

Oluseyi Basorun, Mnse Mnieee Mieee
2016 Journal of advance research in computer science & enigneering  
Many organizations are already embracing VoIP as replacement for their legacy PBX, others are integrating the existing PBX system with VoIP.  ...  One of the huge benefit of VoIP is noticeable reduction in international call rates.  ...  In deploying VoIP network, the quality of service (QoS) must be put into consideration during design and as essential component in the operation of the VoIP.  ... 
doi:10.53555/nncse.v3i4.424 fatcat:ibsvmbwjhrfcnbgedsucdnblhm

Towards A Security Model Against Denial Of Service Attacks For Sip Traffic

Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla
2018 Zenodo  
Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks  ...  The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.  ...  In future work, it is advised to take into consideration the use of an event correlation system in VoIP systems, and new security updates, to be one step ahead in the emergence of future threats and vulnerabilities  ... 
doi:10.5281/zenodo.1315520 fatcat:augrcuhm5rdivoomoksen7hi2e

Challenges in Securing Voice over IP

T.J. Walsh, D.R. Kuhn
2005 IEEE Security and Privacy  
We are especially grateful to Mike Stauffer and Steffen Fries, who helped tremendously in improving our understanding of many aspects of VoIP operation.  ...  Acknowledgments We thank Tim Grance for supporting this work.  ...  An enterprise can use routers that forward packets based on type-of-service (ToS) bits, for example, or provide a separate queue for VoIP traffic.  ... 
doi:10.1109/msp.2005.62 fatcat:dez7vo4ohjfbllxuo45x2ocbre

VoIP Technology: Investigation of QoS and Security Issues

Amor Lazzez
2014 International Journal of Information Technology and Computer Science  
VoIP allows significant benefits for customers and communication services providers.  ...  The presented investigation mainly address the vulnerabilities and security attacks of VoIP systems, as well as the countermeasures that should be considered to help the deployment of secured VoIP systems  ...  In addition to the security capabilities of the VoIP protocols, specific security devices have been designed to enhance the security of VoIP systems.  ... 
doi:10.5815/ijitcs.2014.07.09 fatcat:rmctgoyoofdijgqf75rdvfr5su

IP over Voice-over-IP for censorship circumvention [article]

Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer
2012 arXiv   pre-print
We prototype the designed FreeWave system over the popular VoIP system of Skype.  ...  The use of actual VoIP connections, as opposed to traffic morphing, allows FreeWave to relay its VoIP connections through oblivious VoIP nodes, hence keeping itself unblockable from censors that perform  ...  Coclusions In this paper, we presented FreeWave, a censorship circumvention system that is highly unblockable by censors.  ... 
arXiv:1207.2683v2 fatcat:p2lc5zztajcuzccajwel5mdxsa

Deployment of VoIP Technology: QoS Concerns [article]

Amor Lazzez, Thabet Slimani
2013 arXiv   pre-print
VoIP allows significant benefits for customers and service providers including cost savings, phone and service portability, mobility, and the integration with other applications.  ...  Nevertheless, the deployment of the VoIP technology encounters many challenges such as interoperability issues, security issues, and QoS concerns.  ...  Security issues: In the legacy phone system, the main security issue is the interception of conversations that require physical access to phone lines. In VoIP security issues are much more than that.  ... 
arXiv:1312.2581v1 fatcat:lzno2btlnfc7rmj6q6f5xh7m5y

Issues and challenges in securing VoIP

Ram Dantu, Sonia Fahmy, Henning Schulzrinne, João Cangussu
2009 Computers & security  
In this article, we discuss these security problems and propose a high-level security architecture that captures required features at each boundary-network-element in the VoIP infrastructure.  ...  We describe mechanisms to efficiently integrate information between distributed security components in the architecture.  ...  Protocols for recovery: Recovery mechanisms play a key role in making VoIP systems robust. For example, consider a scenario with a ''virus'' in an IP phone.  ... 
doi:10.1016/j.cose.2009.05.003 fatcat:7lch4elibnfaffeqafdnzo56g4

Security Test Environment for VoIP Research

Florian Fankhauser, Maximilian Ronniger, Christian Schanes, Thomas Grechenig
2011 International Journal for Information Security Research  
More research on VoIP security is needed to enhance the level of security of VoIP systems and to show the implications of failing to take appropriate security measures.  ...  This paper presents a short introduction in testing VoIP components, proposes an architecture and implementation of a robust, flexible and efficient VoIP test environment for security related tests.  ...  To secure a VoIP system, every component has to be taken into consideration, e.g., weaknesses in implementations of components that seem safe can cause problems in the whole infrastructure if multiple  ... 
doi:10.20533/ijisr.2042.4639.2011.0007 fatcat:orpxc7oco5aanftl7nkk5xr2li

A Comprehensive Survey of Voice over IP Security Research

Angelos D. Keromytis
2012 IEEE Communications Surveys and Tutorials  
Our goal is to provide a roadmap for researchers seeking to understand existing capabilities and to identify gaps in addressing the numerous threats and vulnerabilities present in VoIP systems.  ...  of the issues in future large-scale systems.  ...  [166] overview security issues and mechanisms for VoIP systems, focusing on security-oriented operational practices by VoIP providers and operators.  ... 
doi:10.1109/surv.2011.031611.00112 fatcat:qxpbre5q2zhwhkjeb63t2bkr2a

A first look on the effects and mitigation of VoIP SPIT flooding in 4G mobile networks

Elias Bou-Harb, Mourad Debbabi, Chadi Assi
2012 2012 IEEE International Conference on Communications (ICC)  
In this paper, we primarily contribute by presenting a first look on the DoS effects of VoIP SPIT flooding on 4G mobile networks.  ...  This centralized approach nonetheless, requires large processing resources to handle large amount of traffic, which may result in a significant over dimensioning problem in the centralized nodes causing  ...  Therefore, in order for mobile network operators to mediate all the effects of the attack and preserve the VoIP service on 4G networks, a mitigating security architecture must be D.  ... 
doi:10.1109/icc.2012.6364233 dblp:conf/icc/Bou-HarbDA12 fatcat:5eldrv5dojcu7iskz73nzbfm5y

A Holistic Approach to Open-Source VoIP Security: Preliminary Results from the EUX2010sec Project

Lothar Fritsch, Arne-Kristian Groven, Lars Strand
2009 2009 Eighth International Conference on Networks  
The expected outcomes of the project are a solid scientific and practical understanding of the security options for setting up VoIP infrastructures, particular guidance on secure, typical setups of such  ...  products and services.  ...  The authors would like to thank the anonymous reviewers for comments on earlier drafts of this paper.  ... 
doi:10.1109/icn.2009.57 dblp:conf/icn/FritschGS09 fatcat:synodc7gezcs5nf4xlji2c3epm

Performance analysis of secure session initiation protocol based VoIP networks

Mohan Krishna Ranganathan, Liam Kilmartin
2003 Computer Communications  
The commercial deployment of voice over internet protocol (VoIP) networks (and associated packet switching technologies) has gathered pace in the recent years.  ...  Little research has been carried out into examining the options for securing VoIP networks and, more specifically, the impact which implementing such security architectures and protocols will have on the  ...  The security requirement considerations of VoIP networks are highlighted along with the available security service options for the different VoIP architectures.  ... 
doi:10.1016/s0140-3664(02)00146-9 fatcat:jvnh3ht43rb5tf4ilu6a4fh3xy

Design and Implementation of Bandwidth Monitoring, Line Aggregation of VoIP

Tun Tun Oo, De La Salle University, Manila
2019 International Journal of Advanced Trends in Computer Science and Engineering  
Moreover, the traffic and bandwidth of each port and whole systems can monitor and manage. In this paper, the OSPF, Ether channel and bandwidth monitoring system are used in real time simulations.  ...  The VoIP system uses the packet switching which it can use everywhere in the place of getting an Internet connection. Moreover, the Phone bill costs are lowest and flexible to use in the new era.  ...  security and QoS considerations.  ... 
doi:10.30534/ijatcse/2019/46842019 fatcat:725dgatapvahhapl7qqiac5khi

Evaluating the impact of AES encryption algorithm on Voice over Internet Protocol (VoIP) systems

Sulafa Khaled Talha, Bazara I. A. Barry
2013 2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)  
Therefore, it is critical to apply security mechanisms that are capable of protecting systems in a way that ensures and provides major security services.  ...  However, providing a system with security services comes at the expense of system performance.  ...  Three important security services to computer systems are confidentiality, integrity, and availability.  ... 
doi:10.1109/icceee.2013.6634023 fatcat:t57w2lsao5gblmm6ebm3lde4zi
« Previous Showing results 1 — 15 out of 4,189 results