2015
DOI: 10.7763/ijcte.2015.v7.1002
|View full text |Cite
|
Sign up to set email alerts
|

Multilayer Secured SIP Based VoIP Architecture

Abstract: Abstract-VoIP faces many emerging attacks and threats. securing SIP based VoIP is a major challenging task, hence confidentiality, integrity, availability, as well as authenticity must be provided. Focusing on three main critical attacks targeting SIP based VoIP infrastructure, which are Denial of service (DoS), man-in-the middle attack, and Authenticity based attacks. In this paper the main contribution is providing a secure efficient multilayer security architecture based on open source applications (snort, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Basem et al [ 62 ] provided a multilayered security solution based on different open-source applications: Snort, IPtables, SnortSam, and OpenVPN tunnel. The design provided reliable and secure VoIP services for users to prevent denial-of-service and eavesdropping attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Basem et al [ 62 ] provided a multilayered security solution based on different open-source applications: Snort, IPtables, SnortSam, and OpenVPN tunnel. The design provided reliable and secure VoIP services for users to prevent denial-of-service and eavesdropping attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Its greater support for mobility, interoperability and multimedia made it scalable beyond VoIP calls. [1] It acts similar to HTTP with its request and response structure .This protocol is used to create sessions and to carry session descriptions that allow participants to agree on multimedia capability. The functions of this protocol are to :1) determine the location of an endpoint or user to be used for communication.…”
Section: Sip ( Session Initiation Protocol)mentioning
confidence: 99%
“…The speech transmission protocols are classified into User Datagram Protocol(UDP), Real Time Transport Protocol (RTP) and Transmission Control Protocol(TCP) [1] . The standards and protocols for VoIP management are DHCP (Dynamic Host Configuration Protocol) , ENUM (Electronic Number Mapping system), RSVP (Resource Reservation Protocol) , BGP (Border Gateway Protocol) and COPS (Common Open Policy Service).…”
Section: Introductionmentioning
confidence: 99%