This work proposes a detection scheme that identifies non-conforming behavior in a VoIP network, based on statistical analysis and hypothesis testing. VoIP networks are a popular, low-cost alternative for telephony that offer lower rates especially for long-distance calls. Other services such as FollowMe, enhance the traditional voice-oriented nature of these networks. Consequently several security concerns such as fraud calls, are related to the high availability required by a VoIP system. Fraud calls account for an average loss of 3% to 5% of the operators’ revenue. Thus the detection and prevention of the users from behaving in a non-conforming way, becomes crucial. A trustworthy and secure management and billing scheme is necessary, to ...
Fraud detection is an important application, since network operators lose a relevant portion of thei...
The migration from circuit-switched networks to packet-switched networks necessitates the investigat...
Based on the results achieved in the previous deliverable D2.1 where the fraud problem was discussed...
This work proposes a detection scheme that identifies non-conforming behavior in a VoIP network, bas...
IP Telephony has become very popular and Session Initiation Protocol (SIP)-based telephony systems a...
Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN archite...
ABSTRACT This poper presents R survey of the securiv problems in VoIP networks, with an emphasis on ...
In this paper we present methodological advances in anomaly detection, which, among other purposes, ...
The use of Voice over IP (VoIP) applications has dramatically increased in recent years. Large, medi...
In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be awar...
Communications fraud has been dramatically increasing with the development of communication technolo...
Voice over Internet Protocol (VoIP) is an advanced area for researchers. Many different methods are ...
This paper explains how fraud on modern VoIP-Systems works and which attacks are executed. This was ...
The migration from circuit-switched networks to packet-switched networks necessitates the investigat...
Voice over IP (VoIP) has become a major paradigm for providing flexible telecommunication services a...
Fraud detection is an important application, since network operators lose a relevant portion of thei...
The migration from circuit-switched networks to packet-switched networks necessitates the investigat...
Based on the results achieved in the previous deliverable D2.1 where the fraud problem was discussed...
This work proposes a detection scheme that identifies non-conforming behavior in a VoIP network, bas...
IP Telephony has become very popular and Session Initiation Protocol (SIP)-based telephony systems a...
Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN archite...
ABSTRACT This poper presents R survey of the securiv problems in VoIP networks, with an emphasis on ...
In this paper we present methodological advances in anomaly detection, which, among other purposes, ...
The use of Voice over IP (VoIP) applications has dramatically increased in recent years. Large, medi...
In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be awar...
Communications fraud has been dramatically increasing with the development of communication technolo...
Voice over Internet Protocol (VoIP) is an advanced area for researchers. Many different methods are ...
This paper explains how fraud on modern VoIP-Systems works and which attacks are executed. This was ...
The migration from circuit-switched networks to packet-switched networks necessitates the investigat...
Voice over IP (VoIP) has become a major paradigm for providing flexible telecommunication services a...
Fraud detection is an important application, since network operators lose a relevant portion of thei...
The migration from circuit-switched networks to packet-switched networks necessitates the investigat...
Based on the results achieved in the previous deliverable D2.1 where the fraud problem was discussed...