Developing Robust VoIP Router Honeypots Using Device Fingerprints
نویسندگان
چکیده
As the telegram was replaced by telephony, so to Voice over IP (VoIP) systems are replacing conventional switched wire telephone devices, these systems rely on Internet connectivity for the transmission of voice conversations. This paper is an outline of ongoing preliminary research into malfeasant VoIP activity on the Internet. 30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) this service is now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP systems to enumerate and potentially attack and compromise a wide range of vulnerable systems. .
منابع مشابه
Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity
30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a rep...
متن کاملRFC 4247 Requirements for Header Compression over MPLS
Voice over IP (VoIP) typically uses the encapsulation voice/RTP/UDP/IP. When MPLS labels are added, this becomes voice/RTP/UDP/IP/MPLS-labels. For an MPLS VPN, the packet header is typically 48 bytes, while the voice payload is often no more than 30 bytes, for example. Header compression can significantly reduce the overhead through various compression mechanisms, such as enhanced compressed RT...
متن کاملThe Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET
Voice over Internet Protocol (VoIP) is a service from the internet services that allows users to communicate with each other. Quality of Service (QoS) is very sensitive to delay so that VOIP needs it. The objective of this research is study the effect of different queuing algorithms within the router on VoIP QoS. In this work, simulation tool “OPNET Modeler version 14.0” is used to implement th...
متن کاملHoneyd - A OS Fingerprinting Artifice
This research looks at the efficiency of the honeyd honeypot system to reliably deceive intruders. Honeypots are being used as frontline network intelligence and forensic analysis tools. A honeypots ability to reliably deceive intruders is a key factor in gathering reliable and forensically sound data. Honeyd’s primary deceptive mechanism is the use of the NMAP fingerprint database to provide b...
متن کاملCost-optimal design of VoIP networks using the VPN concept
This paper addresses the issue of cost-optimal voice over IP (VoIP) network design. In the applied model, the whole VoIP network is divided into two logical components: the access network and the transport network. The access network consists of VoIP end-points that connect to the transport network through edge routers serving as gateways. Since multiple edge routers may be available for any gi...
متن کامل