Security Test Environment for VoIP Research
نویسندگان
چکیده
منابع مشابه
Security Test Environment for VoIP Research
Voice over IP (VoIP) is in wide use today, replacing phone lines in many scenarios. However, often, security isn’t considered well enough, even though many security attacks are already known. More research on VoIP security is needed to enhance the level of security of VoIP systems and to show the implications of failing to take appropriate security measures. This paper presents a short introduc...
متن کاملSecurity of VoIP
Voice over IP (VoIP) is gaining more popularity in today's communications. The Session Initiation Protocol (SIP) is becoming one of the dominant VoIP signalling protocol[1, 2], however it is vulnerable to many kinds of attacks. Among these attacks, flood-based denial of service attacks have been identified as the major threat to SIP. Even though a great deal of research has been carried out to ...
متن کاملCovert channel for improving VoIP security
In this paper a new way of exchanging information for Voice over Internet Protocol (VoIP) service is presented. With use of digital watermarking and steganography techniques we achieve a covert channel which can be used for different purposes e.g. to improve IP Telephony security or to alternate existing protocols like RTCP (Real-Time Control Protocol). Main advantage of this solution is that i...
متن کاملSecurity Issues and Countermeasure for VoIP
........................................................................................................... 4 Document Conventions................................................................................... 4 Introduction.................................................................................................... 5 Overview of VoIP techniques..........................................
متن کاملLightweight security mechanism for PSTN-VoIP cooperation
In this paper we describe a new, lightweight security mechanism for PSTN-VoIP cooperation that is based on two information hiding techniques: digital watermarking and steganography. Proposed scheme is especially suitable for PSTN-IP-PSTN (toll-by-passing) scenario which nowadays is very popular application of IP Telephony systems. With the use of this mechanism we authenticate end-to-end transm...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Information Security Research
سال: 2011
ISSN: 2042-4639
DOI: 10.20533/ijisr.2042.4639.2011.0007