2013
DOI: 10.1007/978-3-642-38631-2_49
|View full text |Cite
|
Sign up to set email alerts
|

Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
8
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 8 publications
1
8
0
Order By: Relevance
“…Since 2011, researchers at Vienna University of Technology have also been running a Honeynet. Their findings coincide with Essen's in that many calls were to African countries (Ethiopia and Egypt) and when attempts are made, most of the time the attempt is made from an Egyptian IP address [15].…”
Section: Pbx Penetration Studiessupporting
confidence: 80%
See 2 more Smart Citations
“…Since 2011, researchers at Vienna University of Technology have also been running a Honeynet. Their findings coincide with Essen's in that many calls were to African countries (Ethiopia and Egypt) and when attempts are made, most of the time the attempt is made from an Egyptian IP address [15].…”
Section: Pbx Penetration Studiessupporting
confidence: 80%
“…In contrast, Sengar suggests that most SIP vulnerabilities are not due to the weaknesses in the protocol itself, but result from poor SIP credentials and misconfigured systems [13]. Other researchers such as Hoffstadt et al [14] and Gruber et al [15] support this assessment.…”
Section: Voip Vulnerabilities and Types Of Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…If a caller tries to call a callee outside the local VoIP domain of the honeypot the call will be forwarded to our VoIP provider via the uplink interface, who will route the call to a PSTN endpoint. The processing steps for collecting toll fraud attacks with our proposed honeynet approach is described in our previous work [10]. …”
Section: Description Of the Voip/pstn Honeynet Architecturementioning
confidence: 99%
“…In many cases, congestion on IP and internet networks prevents service providers and users from delivering an excellent quality for VoIP communications. It is worth to note that there exist considerable research proposals and solutions tackling the quality of service issues in VoIP networks . However, there is a paucity of research on VoIP security threats.…”
Section: Introductionmentioning
confidence: 99%