Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity

نویسنده

  • Craig Valli
چکیده

30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP systems to enumerate and potentially attack and compromise a wide range of vulnerable systems. This paper is an outline of preliminary research into malfeasant VoIP activity on the Internet.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing Robust VoIP Router Honeypots Using Device Fingerprints

As the telegram was replaced by telephony, so to Voice over IP (VoIP) systems are replacing conventional switched wire telephone devices, these systems rely on Internet connectivity for the transmission of voice conversations. This paper is an outline of ongoing preliminary research into malfeasant VoIP activity on the Internet. 30 years ago PABX systems were compromised by hackers wanting to m...

متن کامل

An Analysis of Malfeasant Activity Directed at a VoIP Honeypot

This paper analyses data collected over a nine month period in a simple VoIP honeypot based on simple design initially put forward by Usken(2009). The honeypot collected 2083 events of malfeasant activity directed towards commonly used VoIP ports. These events resulted in a range of activity being recorded from simple enumeration to advanced probing and attempts to compromise the victim honeypo...

متن کامل

Bandits for Cybersecurity: Adaptive Intrusion Detection Using Honeypots

Intrusion detection is a fundamental problem in network security, and honeypots are one method for actively detecting malicious activity by using deception to fool attackers into interacting with fake hosts or services. We consider the problem of how to strategically select which configurations of honeypots to use to maximize the detection capability in a network. This problem is complicated by...

متن کامل

Honeypots Aiding Network Forensics: Challenges and Notions

risks as attacks are increasing day after day. Network forensics is the process of investigation such attacks through analyzing network data and events. Many challenges are facing investigators due to the rapid growing of network scale and intruders’ skills. Honeypots are computer traps that are meant to be compromised to attract hackers and monitor their strategies and tools. Using honeypots p...

متن کامل

Developing Fuzzy Models for Estimating the Quality of VoIP

This paper presents a novel method for modeling the one-way quality prediction of VoIP, non-intrusively. Intrusive measures of voice quality suffer from common deficiency that is the need of reference signal for evaluating the quality of voice. Owing to this lack, a great deal of effort has been recently devoted for modeling voice quality prediction non-intrusively according to quality degradat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JDFSL

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2010