Proceedings of the 1st International Conference on Principles, Systems and Applications of IP Telecommunications 2007
DOI: 10.1145/1326304.1326306
|View full text |Cite
|
Sign up to set email alerts
|

Holistic VoIP intrusion detection and prevention system

Abstract: VoIP security is crucial for current and future networks and services. The rapid shift from a closed and confined telephony towards an all IP network supporting end to end VoIP services provides major challenges to the security plane. Faced with multiple attack vectors, new and comprehensive defensive security solutions for VoIP must emerge from the research community.This paper describes a multilayer intrusion detection and prevention system architecture for VoIP infrastructures. The key components of the app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0
3

Year Published

2008
2008
2018
2018

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(23 citation statements)
references
References 7 publications
0
20
0
3
Order By: Relevance
“…The authors [13], [14] present a signature-based solution to protect SIP network elements from message payload tampering attacks. They suggest the employment of signature patterns (based on the SIP grammar) to distinguish well-formed messages from malformed ones, similar to computer virus signature descriptions.…”
Section: B Single-layer Security Defensementioning
confidence: 99%
See 2 more Smart Citations
“…The authors [13], [14] present a signature-based solution to protect SIP network elements from message payload tampering attacks. They suggest the employment of signature patterns (based on the SIP grammar) to distinguish well-formed messages from malformed ones, similar to computer virus signature descriptions.…”
Section: B Single-layer Security Defensementioning
confidence: 99%
“…The authors [19] present a combination of the work of [12], [13] and [17]. They use a layered approach with two layers.…”
Section: Multilayer Security Defensementioning
confidence: 99%
See 1 more Smart Citation
“…The resulting SIP honeypot effort is largely exploratory, with performance and effectiveness evaluations left for future work. In follow-on work, Nassar et al [241] describe an intrusion detection and prevention architecture for VoIP that integrates SIP honeypots and an application-layer event correlation engine.…”
Section: ) Authentication Protocols (15 Items)mentioning
confidence: 99%
“…Another prevention technique called "consent-based" performs preliminary notification before the establishment of a first call to fetch the agreement of the receiver, thus solving the "introduction problem" explained in [18]. Finally, marking mechanisms can be used, based on several call criteria, to evaluate the probability that this one may be SPIT [20], [21]. Most of the above protection principles apply equally to the closed model described in next chapter.…”
Section: Open-interconnection Modelmentioning
confidence: 99%