2012
DOI: 10.1109/surv.2011.031611.00112
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey of Voice over IP Security Research

Abstract: Abstract-We present a comprehensive survey of Voice over IP security academic research, using a set of 245 publications forming a closed cross-citation set. We classify these papers according to an extended version of the VoIP Security Alliance (VoIPSA) Threat Taxonomy. Our goal is to provide a roadmap for researchers seeking to understand existing capabilities and to identify gaps in addressing the numerous threats and vulnerabilities present in VoIP systems. We discuss the implications of our findings with r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
69
0
1

Year Published

2013
2013
2018
2018

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 116 publications
(70 citation statements)
references
References 173 publications
0
69
0
1
Order By: Relevance
“…The selection of these symbols reflects the different parts of a SIP message that an attacker could craft in order to launch a resource consumption or other type of attack. In fact, this method of assault is well-documented and evaluated in various researches so far [7,8,9,31]. For instance, a malicious actor could fabricate different SIP messages by modifying some of their parts 135 such as <Via>, <From>, <To>, <Call-ID> headers or even the First Line (corresponding to symbols S2 -S5, and S1 in Figure 1) depending on the situation at hand.…”
Section: Symbol Definitionmentioning
confidence: 99%
See 2 more Smart Citations
“…The selection of these symbols reflects the different parts of a SIP message that an attacker could craft in order to launch a resource consumption or other type of attack. In fact, this method of assault is well-documented and evaluated in various researches so far [7,8,9,31]. For instance, a malicious actor could fabricate different SIP messages by modifying some of their parts 135 such as <Via>, <From>, <To>, <Call-ID> headers or even the First Line (corresponding to symbols S2 -S5, and S1 in Figure 1) depending on the situation at hand.…”
Section: Symbol Definitionmentioning
confidence: 99%
“…Despite the advantages users enjoy due to SIP flexibility, various attacks have been 10 identified against SIP-based VoIP services [7,8,9]. To alleviate, if not eliminate, such security flaws a diversity of detection and prevention solutions have been proposed in the literature [10,11,12,13,14].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, a malicious user could select to replay the same message (by using identical instances of S7) or fabricate different SIP messages by modifying certain segments such as FROM, TO, Call-ID, headers or even the First Line (symbols S1 to S5) depending on the case. For the interested reader, a detailed analysis for resource consumption attacks in VoIP can be found in [2]- [4].…”
Section: B Symbol Definition: Information Theory In the Context Of Voipmentioning
confidence: 99%
“…may abuse them for advertisement or fraud, which is called SPIT (Spam over Internet Telephony) [1]. Hence, detecting SPIT calls or spammers in voice communication services is an urgent demand for the service providers.…”
mentioning
confidence: 99%