Abstract We propose an architecture of Intrusion Detection System (IDS) for VoIP using a protocol specification-based detection method to monitor the network traffics and alert administrator for further analysis and countermeasure for suspicious activities. The protocol behaviors and their interactions are described by state machines. The traffics that behave differently from the standard specifications are considered to be suspicious. The IDS has been implemented and simulated using OPNET modeler, and verified to detect attacks
In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be awar...
This paper describes our work on automatic security assessment of VoIP infrastructure as well as int...
Compared to traditional (PSTN) voice networks, a Voice over Internet Protocol network is a convergen...
VoIP has become a major application of multimedia communications over IP. Many initiatives around th...
As VoIP deployment are expected to grow, intrusion problems similar to those of which data networks ...
Voice over IP (VoIP) has become a major paradigm for providing flexible telecommunication services a...
VoIP applications are emerging today as an important component in business and communication industr...
Voice over IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traf...
Voice over IP (VoIP) has become a major paradigm for providing flexible telecommunication services a...
Includes abstract.Includes bibliographical references (leaves 134-140).Voice and data have been trad...
Security threats for voice-over IP (VoIP) networks are becoming a major concern as its popularity in...
This paper presents the preliminary architecture of a network level intrusion detection system. The ...
Voice over IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traf...
ABSTRACT This poper presents R survey of the securiv problems in VoIP networks, with an emphasis on ...
International audienceVoIP has become a major application of multimedia communications over IP. Many...
In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be awar...
This paper describes our work on automatic security assessment of VoIP infrastructure as well as int...
Compared to traditional (PSTN) voice networks, a Voice over Internet Protocol network is a convergen...
VoIP has become a major application of multimedia communications over IP. Many initiatives around th...
As VoIP deployment are expected to grow, intrusion problems similar to those of which data networks ...
Voice over IP (VoIP) has become a major paradigm for providing flexible telecommunication services a...
VoIP applications are emerging today as an important component in business and communication industr...
Voice over IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traf...
Voice over IP (VoIP) has become a major paradigm for providing flexible telecommunication services a...
Includes abstract.Includes bibliographical references (leaves 134-140).Voice and data have been trad...
Security threats for voice-over IP (VoIP) networks are becoming a major concern as its popularity in...
This paper presents the preliminary architecture of a network level intrusion detection system. The ...
Voice over IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traf...
ABSTRACT This poper presents R survey of the securiv problems in VoIP networks, with an emphasis on ...
International audienceVoIP has become a major application of multimedia communications over IP. Many...
In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be awar...
This paper describes our work on automatic security assessment of VoIP infrastructure as well as int...
Compared to traditional (PSTN) voice networks, a Voice over Internet Protocol network is a convergen...