[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Jabel et al., 2012 - Google Patents

A study of SIP trunk security and challenges

Jabel et al., 2012

View PDF
Document ID
8646203913217795403
Author
Jabel A
Manickam S
Ramdas S
Publication year
Publication venue
2012 IEEE International Conference on Electronics Design, Systems and Applications (ICEDSA)

External Links

Snippet

Several voice over internet protocol (VoIP) providers migrate to their services to session initiation protocol (SIP). SIP is a lightweight signaling protocol used to implement in wiled VoIP services. However, with the global spread of this service, we can see how VoIP is …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1003Signalling or session protocols
    • H04L65/1006SIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer

Similar Documents

Publication Publication Date Title
Keromytis A comprehensive survey of voice over IP security research
Geneiatakis et al. SIP Security Mechanisms: A state-of-the-art review
JP5173022B2 (en) How to aggregate information values in a network
Sriram et al. Resilient Interdomain Traffic Exchange
Rasol et al. An improved secure SIP registration mechanism to avoid VoIP threats
Keromytis Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research
Jabel et al. A study of SIP trunk security and challenges
Al-Kharobi et al. Comprehensive comparison of VoIP SIP protocol problems and Cisco VoIP system
Lazzez VoIP technology: Security issues analysis
Werapun et al. Solution analysis for SIP security threats
Lohiya et al. End to End Encryption Architecture for Voice over Internet Protocol
Phithakkitnukoon et al. Voip security—attacks and solutions
Duanfeng et al. Security mechanisms for SIP-based multimedia communication infrastructure
Behl et al. An analysis of security implications in session initiation protocol (SIP)
Daniels et al. Network traffic tracking systems: folly in the large?
Patil et al. VoIP security
Subramanian et al. Comparative study of secure vs. Non-secure transport protocols on the SIP proxy server performance: An experimental approach
Omari et al. A closer look on challenges and security risks of Voice over Internet Protocol infrastructures
Farrell et al. Report from the Strengthening the Internet (STRINT) workshop
Hsu et al. A Novel Protocol Design and Collaborative Forensics Mechanism for VoIP Services.
Yang et al. Security issues in VoIP telecommunication networks
Ylli et al. EXPLOITING VOIP SECURITY ISSUES IN A CLASSIC SCENARIO
Moon et al. Securing VoIP networks via signaling protocol layer
Wulff et al. New Approaches to Mitigation of Malicious Traffic in VoIP Networks
Martin et al. Security Issues of VoIP