In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be aware of typical risks and to have a good understanding of how vulnerabilities can be exploited. In a previous paper we presented the concept of misuse patterns. Attack patterns describe from the point of view of the attacker, how a type of attack is performed (what system units it uses and how), analyzes the ways of stopping the attack by enumerating possible security patterns that can be applied for this purpose, and describes how to trace the attack once it has happened by appropriate collection and observation of forensics data. We present a set of misuse patterns for VoIP: Denial o
The most common way of communication is obviously through voice exchange. There are mainly two ways ...
Voice over IP (VoIP) architecture and services consist of different software and hard-ware component...
Abstract—A VoIP covert channel is a mechanism that utilizes an IP phone conversation to illicitly tr...
In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be awar...
Voice over IP (VoIP) is revolutionizing the modern communications system by allowing human voice and...
Although the invention of Voice over Internet Protocol (VoIP) in communication technology created s...
The VoIP system is build on the IP network, so it is affected by the IP network security problem. It...
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing secu...
This paper explains how fraud on modern VoIP-Systems works and which attacks are executed. This was ...
Traditional public switched telephone networks (PSTN) are replaced more and more by VoIP services th...
don’t directly let attackers eaves-drop on voice conversations. Figure 1b shows these vulner-abiliti...
Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN archite...
This paper deals with VoIP communication security and various techniques of VoIP attacks. We divid...
Voice communication in recent trends has shown rapid growth in homes and businesses with the develop...
VoIP (Voice over Internet Protocol) enables user to make calls through internet. VoIP system is pop...
The most common way of communication is obviously through voice exchange. There are mainly two ways ...
Voice over IP (VoIP) architecture and services consist of different software and hard-ware component...
Abstract—A VoIP covert channel is a mechanism that utilizes an IP phone conversation to illicitly tr...
In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be awar...
Voice over IP (VoIP) is revolutionizing the modern communications system by allowing human voice and...
Although the invention of Voice over Internet Protocol (VoIP) in communication technology created s...
The VoIP system is build on the IP network, so it is affected by the IP network security problem. It...
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing secu...
This paper explains how fraud on modern VoIP-Systems works and which attacks are executed. This was ...
Traditional public switched telephone networks (PSTN) are replaced more and more by VoIP services th...
don’t directly let attackers eaves-drop on voice conversations. Figure 1b shows these vulner-abiliti...
Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN archite...
This paper deals with VoIP communication security and various techniques of VoIP attacks. We divid...
Voice communication in recent trends has shown rapid growth in homes and businesses with the develop...
VoIP (Voice over Internet Protocol) enables user to make calls through internet. VoIP system is pop...
The most common way of communication is obviously through voice exchange. There are mainly two ways ...
Voice over IP (VoIP) architecture and services consist of different software and hard-ware component...
Abstract—A VoIP covert channel is a mechanism that utilizes an IP phone conversation to illicitly tr...