A Holistic Approach to Open Source VoIP Security: Results from the EUX2010SEC Project

نویسندگان

  • Lothar Fritsch
  • Arne-Kristian Groven
  • Lars Strand
  • Wolfgang Leister
چکیده

The present paper describes the approach and preliminary results from the research project EUX2010SEC. The project works closely with Voice over IP (VoIP) companies and users. The project aims at providing better security of open source VoIP installations. The work towards this goal is organized by gathering researchers and practitioners around scientific activities that range from security modeling and verification up to testbed testing. The expected outcomes of the project are a solid scientific and practical understanding of the security options for setting up VoIP infrastructures, particular guidance on secure, typical setups of such infrastructure. The project’s special focus is on producing results relevant to the practitioners in the project, aiming at the stimulation of innovation and the provision of highest quality in open source based VoIP products and services. The article describes the research-based innovation approach used.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Environment Security and Decrease of Crimes with CPTED Approach Critical and Analytical Discussion

Crime and the fear of crime are pervasive and endemic concerns in modern post-industrial society and criminal justice systems are clearly failing to tackle both issues. In this research after mentioning the abstract for motivation and the vital opinion in the security public, the role of city framework (programming the environmental design) in the decrease and prediction of crimes in the city...

متن کامل

Implementation of Wireless VoIP System based on VPN

VoIP isn’t secure since it uses the Internet to which many people connect simultaneously. In this paper, we designed and implemented a Wireless VoIP + VPN system with which secure telephone calls are possible using the open project SIP VoIP Gateway, 'Asterisk' and 'OpenVPN'. Key-Words: VoIP, VPN, SIP, Wireless, Security, WiFi

متن کامل

Integrating Secure RTP into the Open Source VoIP PBX Asterisk

Implementations of Voice over Internet Protocol (VoIP) have focused, up to now, mainly on the need to transport data in real-time, often at the expense of security. The neglect of secure VoIP is often intentional, as developers are striving to minimise overheads and delays. The Secure Real-Time Protocol (SRTP) has the potential to secure real-time streams without exacting too high a performance...

متن کامل

Securing VOIP networks via Transport protocols Layer

Voice over Internet Protocol (VoIP), is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line. VoIP services have compelling technical advantages over circuit switching. VoIP networks are based more on an open architecture than that of their circuit-switched contemporaries. This open, standards-based architecture means...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009