A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Monitoring and counter-profiling for voice over IP networks and services
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Managing risks at runtime in VoIP networks and services
AIMS'10 Proceedings of the Mechanisms for autonomous management of networks and services, and 4th international conference on Autonomous infrastructure, management and security
VoIP: making secure calls and maintaining high call quality
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
The impact of security on voip call quality
Journal of Mobile Multimedia
Econometric feedback for runtime risk management in VoIP architectures
AIMS'11 Proceedings of the 5th international conference on Autonomous infrastructure, management, and security: managing the dynamics of networks and services
SIPA: generic and secure accounting for SIP
Security and Communication Networks
Hi-index | 0.00 |
In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.1ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Introduction2ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 VoIP Architectures and Protocols3ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Threats and Attacks4ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 VoIP Vulnerabilites5ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Signaling Protection Mechanisms6ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Media Protection Mechanisms7ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 Key Management Mechanisms8ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 VoIP and Network Security Controls9ï戮 ï戮 ï戮 ï戮 ï戮 ï戮 A Security Framework for Enterprise VoIP Networks10ï戮 ï戮 ï戮 ï戮 Provider Architectures and Security11ï戮 ï戮 ï戮 ï戮 Enterprise Architectures and Security