2008
DOI: 10.1080/19393550802308618
|View full text |Cite
|
Sign up to set email alerts
|

VoIP Security — Attacks and Solutions

Abstract: Voice over IP (VoIP) technology is being extensively and rapidly deployed. The flexibility and cost efficiency are the key factors luring enterprises to transition to VoIP. Some security problems may surface with the widespread deployment of VoIP. This article presents an overview of VoIP systems and its security issues. First, we briefly describe basic VoIP architecture and its fundamental differences compared to PSTN. Next, basic VoIP protocols used for signaling and media transport, as well as defense mecha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…Furthermore, it can be used to block automated SPAM over IP Telephony (SPIT) calls [25], the number of which will continue to increase as VoIP technology becomes cheaper and widely adopted. Here, we focus on how to defend against the attack.…”
Section: A Architecturementioning
confidence: 99%
“…Furthermore, it can be used to block automated SPAM over IP Telephony (SPIT) calls [25], the number of which will continue to increase as VoIP technology becomes cheaper and widely adopted. Here, we focus on how to defend against the attack.…”
Section: A Architecturementioning
confidence: 99%
“…These attacks are usually carried out during call transmission by disallowing honest users access to the VoIP service, example of aforesaid attacks are SIP flooding attack and VoIP amplification attack [3]. They are usually achieved by generating immense number of calls at an instance and direct the large traffic through its targeted VoIP server, these attack patterns can easily be detected by network administrators and by placing a good monitoring tool that analyses the network flow and whenever there is unusual increase in traffic it activated the mitigating tool to block IPs [4].…”
Section: Introductionmentioning
confidence: 99%
“…In VoIP, eavesdropping is a scenario where the attacker is able to monitor signal or media contents that are exchanged between users in order to examine communications to prepare for other future attacks. [7] …”
Section: Eavesdroppingmentioning
confidence: 99%
“…The G.7xx series defines audio codec used by H.323, and the H.26x series defines the video codec. H.323 uses RTP for media transport and RTCP for control of the RTP sessions [1] [7]. …”
Section: H323 Family Of Protocolsmentioning
confidence: 99%
See 1 more Smart Citation