A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Traffic considerations for security services in VoIP systems
[chapter]
2000
Telecommunication Network Intelligence
Voice over IP systems require a new infrastructure of security services. The demand is currently growing and deploys basic-authentication in the first step. ...
Additionally, if carefully implemented, they can serve for other applications besides VoiP as well. ...
Out of the major areas of security in VoIP systems, we focus on services for user-authentication. ...
doi:10.1007/978-0-387-35522-1_2
dblp:conf/smartnet/Wimmreuter00
fatcat:2mpqd54b6fa6jm7mrxdddrttqm
Implementing Enterprise VoIP Deployment
2016
Journal of advance research in computer science & enigneering
Many organizations are already embracing VoIP as replacement for their legacy PBX, others are integrating the existing PBX system with VoIP. ...
One of the huge benefit of VoIP is noticeable reduction in international call rates. ...
In deploying VoIP network, the quality of service (QoS) must be put into consideration during design and as essential component in the operation of the VoIP. ...
doi:10.53555/nncse.v3i4.424
fatcat:ibsvmbwjhrfcnbgedsucdnblhm
Towards A Security Model Against Denial Of Service Attacks For Sip Traffic
2018
Zenodo
Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks ...
The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization. ...
In future work, it is advised to take into consideration the use of an event correlation system in VoIP systems, and new security updates, to be one step ahead in the emergence of future threats and vulnerabilities ...
doi:10.5281/zenodo.1315520
fatcat:augrcuhm5rdivoomoksen7hi2e
Challenges in Securing Voice over IP
2005
IEEE Security and Privacy
We are especially grateful to Mike Stauffer and Steffen Fries, who helped tremendously in improving our understanding of many aspects of VoIP operation. ...
Acknowledgments We thank Tim Grance for supporting this work. ...
An enterprise can use routers that forward packets based on type-of-service (ToS) bits, for example, or provide a separate queue for VoIP traffic. ...
doi:10.1109/msp.2005.62
fatcat:dez7vo4ohjfbllxuo45x2ocbre
VoIP Technology: Investigation of QoS and Security Issues
2014
International Journal of Information Technology and Computer Science
VoIP allows significant benefits for customers and communication services providers. ...
The presented investigation mainly address the vulnerabilities and security attacks of VoIP systems, as well as the countermeasures that should be considered to help the deployment of secured VoIP systems ...
In addition to the security capabilities of the VoIP protocols, specific security devices have been designed to enhance the security of VoIP systems. ...
doi:10.5815/ijitcs.2014.07.09
fatcat:rmctgoyoofdijgqf75rdvfr5su
IP over Voice-over-IP for censorship circumvention
[article]
2012
arXiv
pre-print
We prototype the designed FreeWave system over the popular VoIP system of Skype. ...
The use of actual VoIP connections, as opposed to traffic morphing, allows FreeWave to relay its VoIP connections through oblivious VoIP nodes, hence keeping itself unblockable from censors that perform ...
Coclusions In this paper, we presented FreeWave, a censorship circumvention system that is highly unblockable by censors. ...
arXiv:1207.2683v2
fatcat:p2lc5zztajcuzccajwel5mdxsa
Deployment of VoIP Technology: QoS Concerns
[article]
2013
arXiv
pre-print
VoIP allows significant benefits for customers and service providers including cost savings, phone and service portability, mobility, and the integration with other applications. ...
Nevertheless, the deployment of the VoIP technology encounters many challenges such as interoperability issues, security issues, and QoS concerns. ...
Security issues: In the legacy phone system, the main security issue is the interception of conversations that require physical access to phone lines. In VoIP security issues are much more than that. ...
arXiv:1312.2581v1
fatcat:lzno2btlnfc7rmj6q6f5xh7m5y
Issues and challenges in securing VoIP
2009
Computers & security
In this article, we discuss these security problems and propose a high-level security architecture that captures required features at each boundary-network-element in the VoIP infrastructure. ...
We describe mechanisms to efficiently integrate information between distributed security components in the architecture. ...
Protocols for recovery: Recovery mechanisms play a key role in making VoIP systems robust. For example, consider a scenario with a ''virus'' in an IP phone. ...
doi:10.1016/j.cose.2009.05.003
fatcat:7lch4elibnfaffeqafdnzo56g4
Security Test Environment for VoIP Research
2011
International Journal for Information Security Research
More research on VoIP security is needed to enhance the level of security of VoIP systems and to show the implications of failing to take appropriate security measures. ...
This paper presents a short introduction in testing VoIP components, proposes an architecture and implementation of a robust, flexible and efficient VoIP test environment for security related tests. ...
To secure a VoIP system, every component has to be taken into consideration, e.g., weaknesses in implementations of components that seem safe can cause problems in the whole infrastructure if multiple ...
doi:10.20533/ijisr.2042.4639.2011.0007
fatcat:orpxc7oco5aanftl7nkk5xr2li
A Comprehensive Survey of Voice over IP Security Research
2012
IEEE Communications Surveys and Tutorials
Our goal is to provide a roadmap for researchers seeking to understand existing capabilities and to identify gaps in addressing the numerous threats and vulnerabilities present in VoIP systems. ...
of the issues in future large-scale systems. ...
[166] overview security issues and mechanisms for VoIP systems, focusing on security-oriented operational practices by VoIP providers and operators. ...
doi:10.1109/surv.2011.031611.00112
fatcat:qxpbre5q2zhwhkjeb63t2bkr2a
A first look on the effects and mitigation of VoIP SPIT flooding in 4G mobile networks
2012
2012 IEEE International Conference on Communications (ICC)
In this paper, we primarily contribute by presenting a first look on the DoS effects of VoIP SPIT flooding on 4G mobile networks. ...
This centralized approach nonetheless, requires large processing resources to handle large amount of traffic, which may result in a significant over dimensioning problem in the centralized nodes causing ...
Therefore, in order for mobile network operators to mediate all the effects of the attack and preserve the VoIP service on 4G networks, a mitigating security architecture must be D. ...
doi:10.1109/icc.2012.6364233
dblp:conf/icc/Bou-HarbDA12
fatcat:5eldrv5dojcu7iskz73nzbfm5y
A Holistic Approach to Open-Source VoIP Security: Preliminary Results from the EUX2010sec Project
2009
2009 Eighth International Conference on Networks
The expected outcomes of the project are a solid scientific and practical understanding of the security options for setting up VoIP infrastructures, particular guidance on secure, typical setups of such ...
products and services. ...
The authors would like to thank the anonymous reviewers for comments on earlier drafts of this paper. ...
doi:10.1109/icn.2009.57
dblp:conf/icn/FritschGS09
fatcat:synodc7gezcs5nf4xlji2c3epm
Performance analysis of secure session initiation protocol based VoIP networks
2003
Computer Communications
The commercial deployment of voice over internet protocol (VoIP) networks (and associated packet switching technologies) has gathered pace in the recent years. ...
Little research has been carried out into examining the options for securing VoIP networks and, more specifically, the impact which implementing such security architectures and protocols will have on the ...
The security requirement considerations of VoIP networks are highlighted along with the available security service options for the different VoIP architectures. ...
doi:10.1016/s0140-3664(02)00146-9
fatcat:jvnh3ht43rb5tf4ilu6a4fh3xy
Design and Implementation of Bandwidth Monitoring, Line Aggregation of VoIP
2019
International Journal of Advanced Trends in Computer Science and Engineering
Moreover, the traffic and bandwidth of each port and whole systems can monitor and manage. In this paper, the OSPF, Ether channel and bandwidth monitoring system are used in real time simulations. ...
The VoIP system uses the packet switching which it can use everywhere in the place of getting an Internet connection. Moreover, the Phone bill costs are lowest and flexible to use in the new era. ...
security and QoS considerations. ...
doi:10.30534/ijatcse/2019/46842019
fatcat:725dgatapvahhapl7qqiac5khi
Evaluating the impact of AES encryption algorithm on Voice over Internet Protocol (VoIP) systems
2013
2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)
Therefore, it is critical to apply security mechanisms that are capable of protecting systems in a way that ensures and provides major security services. ...
However, providing a system with security services comes at the expense of system performance. ...
Three important security services to computer systems are confidentiality, integrity, and availability. ...
doi:10.1109/icceee.2013.6634023
fatcat:t57w2lsao5gblmm6ebm3lde4zi
« Previous
Showing results 1 — 15 out of 4,189 results