A Comprehensive Survey of Security Issues and Defense Framework for VoIP Cloud

Ashutosh Satapathy, L. M. Jenila Livingston
2016 Indian Journal of Science and Technology  
Voice over Internet Protocol (VoIP) is an advanced telecommunication technology which transfers the voice/video over high speed network that provides advantages of flexibility, reliability and cost efficient advanced telecommunication features. Still the issues related to security are averting many organizations to accept VoIP cloud environment due to security threats, holes or vulnerabilities. So, the novel secured framework is absolutely necessary to prevent all kind of VoIP security issues.
more » ... his paper points out the existing VoIP cloud architecture and various security attacks and issues in the existing framework. It also presents the defense mechanisms to prevent the attacks and proposes a new security framework called Intrusion Prevention System (IPS) using video watermarking and extraction technique and Liveness Voice Detection (LVD) technique with biometric features such as face and voice. IPSs updated with new LVD features protect the VoIP services not only from attacks but also from misuses. It is used for dynamically distributing network configuration parameters such as Internet Protocol (IP) address, address of TFTP server etc. Application Server These servers are designed to install, host and operate applications and provide services to end users, IT industries and organizations. 3 Vol 9 (6) | February 2016 | www.indjst.org problems related to IP network. Security issues in VoIP are broadly classified into three categories. Real Time Issues From last decade onwards, VoIP is used for several illegal activities such as hacking, terrorism, match fixing etc. Recently in October 2014, phone Hackers had broken into the phone network of the company, Foreman Seeley Fountain Architecture and routed $166, 000 worth of calls from the firm to premium rate telephone numbers in Gambia, Somalia and Maldives. It would have taken 34 years for the firm to run of those charges legitimately, based on its typical phone bill. Network Related Issues Attacks related to destroy, block, expose, alter, disable, steal or gain unauthorized access to information in VoIP network (e.g. threats include social, denial of service, service abuse, physical access, interruption of service etc.) are listed in Table 1 followed by different types of attacks 7,8 . Voice Related Issues As VoIP system carries voice traffic, so victim's voice can be mimicked by an attacker/intruder. A talking and singing robot that mimics human vocalization, developed by M. Kitani, Kagawa University is vulnerable to VoIP communication 9 .
doi:10.17485/ijst/2016/v9i6/81980 fatcat:xmonjr6jfjey3d4mgkzwfv5w6y