Security Issues and Countermeasure for VoIP

نویسنده

  • Jianqiang Xin
چکیده

........................................................................................................... 4 Document Conventions................................................................................... 4 Introduction.................................................................................................... 5 Overview of VoIP techniques.................................................................... 6 VoIP components.......................................................................................... 6 VoIP Data handling ................................................................................... 8 Quality of Service for VoIP ................................................................ 9 VoIP protocols.......................................................................................... 11 H.323 protocol ...................................................................................... 12 Session Initiation Protocol (SIP).............................................. 14 MGCP and Megaco/H.248 ....................................................................... 15 Security threats of VoIP ........................................................................ 16 Confidentiality threats....................................................................... 16 Eavesdropping of phone conversation ......................................... 16 Unauthorized access attack............................................................. 16 Countermeasures .................................................................................... 17 Integrity Threats ................................................................................... 17 Caller Identification spoofing .................................................... 18 Registration hijacking ..................................................................... 19 Proxy Impersonation............................................................................ 20 Call redirection or hijacking ...................................................... 20 Countermeasures .................................................................................... 22 Availability threats ............................................................................. 23 VoIP Signaling DoS Attacks............................................................. 23 VoIP Media DoS Attacks ..................................................................... 23 Physical DoS Attacks ......................................................................... 24 Countermeasures .................................................................................... 24 Firewall and Network Address Translation challenges........... 25 Security Guidelines for VoIP ............................................................... 27 Conclusion ...................................................................................................... 29 References ...................................................................................................... 30

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

VoIP Technology: Security Issues Analysis

Voice over IP (VoIP) is the technology allowing voice and multimedia transmissions as data packets over a private or a public IP network. Thanks to the benefits that it may provide, the VoIP technology is increasingly attracting attention and interest in the industry. Actually, VoIP allows significant benefits for customers and communication services providers such as cost savings, rich media s...

متن کامل

VoIP Cell Phones : Security concerns and Countermeasures

This paper deals with modern cellular phones that operate on Voice over Internet Protocol, their current development, several Information security risks associated with them and various countermeasures that can be undertaken to prevent data theft/misuse. VoIP is vulnerable to well known traditional modes of attack such as Denial of Service (DoS),Man in the middle (MiTM) etc but also introduces ...

متن کامل

VoIP Technology: Investigation of QoS and Security Issues

Voice over IP (VoIP) is the technology allowing voice traffic transmission as data packets over a private or a public IP network. VoIP allows significant benefits for customers and communication services providers. The main are cost savings, rich media service, phone and service portability and mobility, and the integration with other applications. Nevertheless, the deployment of the VoIP techn...

متن کامل

Securing VoIP Networks using graded Protection Levels

This contribution evaluates the security of VoIP networks. Potential threats to VoIP networks lead to unbearable risks which need to be eliminated by suitable countermeasures. However, cost and complexity of countermeasures should be adapted to the practical situation. Therefore the protection requirements are assessed. In this contribution the range of possible protection requirements is divid...

متن کامل

Securing VoIP Systems: A QoS-Oriented Approach

Voice over IP (VoIP) is a communication technology allowing voice traffic transmission as data packets over a private or a public IP network. VoIP allows significant benefits for customers and service providers including cost savings, services integration, and systems extensibility. Nevertheless, the VoIP technology suffers from many hurdles such as architecture complexity, interoperability pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015