The paper deals with the need to enhance security of the VoIP infrastructure. There are several ways to achieve an enhancement in security. We opted for the honeypot which can provide us information about attacker’s behaviour. We will examine in particular a VoIP honeypot referred to as Artemisa. It is one of many existing honeypots tailored for IP telephony. The paper describes its function and application within a real IP telephony infrastructure. The aim of another tested honeypot is to gather data about the attacks while simulating a SSH server. The gathered information could be crucial for further improvements of the existing security mechanism in our VoIP network.Scopu
Voice over IP (VoIP) is revolutionizing the modern communications system by allowing human voice and...
Voice over Internet Protocol (VoIP) is the technology that allows users to make phone calls over the...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
Voice over IP (VoIP) and the Session Initiation Protocol (SIP) are establishing themselves as strong...
Voice Over IP (VoIP) telephony is becoming widespread, and is often integrated into computer network...
International audienceVoice over IP (VoIP) and the Session Initiation Protocol (SIP) are establishin...
Voice over IP (VoIP) has become a major paradigm for providing flexible telecommunication services a...
This paper analyses data collected over a nine month period in a simple VoIP honeypot based on simpl...
30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some ot...
The role of the Internet is continuously increasing and many technical, commercial, and business tra...
As the telegram was replaced by telephony, so to Voice over IP (VoIP) systems are replacing conventi...
Compared to traditional (PSTN) voice networks, a Voice over Internet Protocol network is a convergen...
VoIP security is crucial for current and future networks and services. The rapid shift from a closed...
This thesis focuses on the topic of honeypots technology and their use for network attacks monitorin...
The Internet has already become a hostile environment for computers, especially when they are direct...
Voice over IP (VoIP) is revolutionizing the modern communications system by allowing human voice and...
Voice over Internet Protocol (VoIP) is the technology that allows users to make phone calls over the...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...
Voice over IP (VoIP) and the Session Initiation Protocol (SIP) are establishing themselves as strong...
Voice Over IP (VoIP) telephony is becoming widespread, and is often integrated into computer network...
International audienceVoice over IP (VoIP) and the Session Initiation Protocol (SIP) are establishin...
Voice over IP (VoIP) has become a major paradigm for providing flexible telecommunication services a...
This paper analyses data collected over a nine month period in a simple VoIP honeypot based on simpl...
30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some ot...
The role of the Internet is continuously increasing and many technical, commercial, and business tra...
As the telegram was replaced by telephony, so to Voice over IP (VoIP) systems are replacing conventi...
Compared to traditional (PSTN) voice networks, a Voice over Internet Protocol network is a convergen...
VoIP security is crucial for current and future networks and services. The rapid shift from a closed...
This thesis focuses on the topic of honeypots technology and their use for network attacks monitorin...
The Internet has already become a hostile environment for computers, especially when they are direct...
Voice over IP (VoIP) is revolutionizing the modern communications system by allowing human voice and...
Voice over Internet Protocol (VoIP) is the technology that allows users to make phone calls over the...
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. T...