Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

  • Authors:
  • Peter Thermos;Ari Takanen

  • Affiliations:
  • -;-

  • Venue:
  • Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.1ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Introduction2ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 VoIP Architectures and Protocols3ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Threats and Attacks4ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 VoIP Vulnerabilites5ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Signaling Protection Mechanisms6ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Media Protection Mechanisms7ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Key Management Mechanisms8ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 VoIP and Network Security Controls9ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 A Security Framework for Enterprise VoIP Networks10ï戮 ï戮 ï戮 ï戮 Provider Architectures and Security11ï戮 ï戮 ï戮 ï戮 Enterprise Architectures and Security