Jabel et al., 2012 - Google Patents
A study of SIP trunk security and challengesJabel et al., 2012
View PDF- Document ID
- 8646203913217795403
- Author
- Jabel A
- Manickam S
- Ramdas S
- Publication year
- Publication venue
- 2012 IEEE International Conference on Electronics Design, Systems and Applications (ICEDSA)
External Links
Snippet
Several voice over internet protocol (VoIP) providers migrate to their services to session initiation protocol (SIP). SIP is a lightweight signaling protocol used to implement in wiled VoIP services. However, with the global spread of this service, we can see how VoIP is …
- 238000000034 method 0 abstract description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1003—Signalling or session protocols
- H04L65/1006—SIP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Keromytis | A comprehensive survey of voice over IP security research | |
Geneiatakis et al. | SIP Security Mechanisms: A state-of-the-art review | |
JP5173022B2 (en) | How to aggregate information values in a network | |
Sriram et al. | Resilient Interdomain Traffic Exchange | |
Rasol et al. | An improved secure SIP registration mechanism to avoid VoIP threats | |
Keromytis | Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research | |
Jabel et al. | A study of SIP trunk security and challenges | |
Al-Kharobi et al. | Comprehensive comparison of VoIP SIP protocol problems and Cisco VoIP system | |
Lazzez | VoIP technology: Security issues analysis | |
Werapun et al. | Solution analysis for SIP security threats | |
Lohiya et al. | End to End Encryption Architecture for Voice over Internet Protocol | |
Phithakkitnukoon et al. | Voip security—attacks and solutions | |
Duanfeng et al. | Security mechanisms for SIP-based multimedia communication infrastructure | |
Behl et al. | An analysis of security implications in session initiation protocol (SIP) | |
Daniels et al. | Network traffic tracking systems: folly in the large? | |
Patil et al. | VoIP security | |
Subramanian et al. | Comparative study of secure vs. Non-secure transport protocols on the SIP proxy server performance: An experimental approach | |
Omari et al. | A closer look on challenges and security risks of Voice over Internet Protocol infrastructures | |
Farrell et al. | Report from the Strengthening the Internet (STRINT) workshop | |
Hsu et al. | A Novel Protocol Design and Collaborative Forensics Mechanism for VoIP Services. | |
Yang et al. | Security issues in VoIP telecommunication networks | |
Ylli et al. | EXPLOITING VOIP SECURITY ISSUES IN A CLASSIC SCENARIO | |
Moon et al. | Securing VoIP networks via signaling protocol layer | |
Wulff et al. | New Approaches to Mitigation of Malicious Traffic in VoIP Networks | |
Martin et al. | Security Issues of VoIP |