2009
DOI: 10.1002/sec.105
|View full text |Cite
|
Sign up to set email alerts
|

Misuse patterns in VoIP

Abstract: To protect against security attacks, it is necessary to be aware of typical risks and to have a good understanding of how vulnerabilities can be exploited. Security patterns are useful to guide the security design of systems by providing generic solutions that can stop a variety of attacks, but it is not clear to an inexperienced designer what pattern should be applied to stop a specific attack. Additionally, security patterns are not useful for network forensics purposes because they do not emphasize the modu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Considering the vulnerabilities associated with specific software products installed allows us to identify concrete attack scenarios and hence specific monitoring activities that collect forensic evidence necessary to demonstrate that these attacks took place. Cloud security reference architectures [24] provide guidance for identifying potential misuse cases [25] arising from the interaction of stakeholders with the system and for detecting a set of security patterns, which include countermeasures to prevent or mitigate those misuse cases. Security patterns also include a general list of components of the cloud architecture, such as VMs and networks, from which forensic evidence regarding a specific misuse pattern can be found.…”
Section: Related Workmentioning
confidence: 99%
“…Considering the vulnerabilities associated with specific software products installed allows us to identify concrete attack scenarios and hence specific monitoring activities that collect forensic evidence necessary to demonstrate that these attacks took place. Cloud security reference architectures [24] provide guidance for identifying potential misuse cases [25] arising from the interaction of stakeholders with the system and for detecting a set of security patterns, which include countermeasures to prevent or mitigate those misuse cases. Security patterns also include a general list of components of the cloud architecture, such as VMs and networks, from which forensic evidence regarding a specific misuse pattern can be found.…”
Section: Related Workmentioning
confidence: 99%
“…This threat includes eavesdropping and impersonation to support the attack. Session hijacking infiltrates the middle of the communication to gain control over the transmitted data [13]. MITM attack is a renowned act of session hijacking [7][14].…”
Section: Session Hijackingmentioning
confidence: 99%
“…Although many researchers have explained the possibility of this threat, no one in the literature has used patterns to analyze the threat of non-control data in an NFV system. Patterns have proved convenient to describe the threats in several environments, such as cloud [15], IoT [16], and VoIP [17].…”
Section: Introductionmentioning
confidence: 99%