Designing attacks on SIP call set-up
International Journal of Applied Cryptography
DNCOCO'10 Proceedings of the 9th WSEAS international conference on Data networks, communications, computers
Advanced implementation of IP telephony at Czech universities
WSEAS TRANSACTIONS on COMMUNICATIONS
Threats to voice over IP communications systems
WSEAS Transactions on Computers
Kamailio syntax generator and configuration file parser
Proceedings of the 15th WSEAS international conference on Computers
Payment frameworks for the purchase of electronic products and services
Computer Standards & Interfaces
SIP proxy robustness against DoS attacks
ACC'11/MMACTEE'11 Proceedings of the 13th IASME/WSEAS international conference on Mathematical Methods and Computational Techniques in Electrical Engineering conference on Applied Computing
A survey of open source products for building a SIP communication platform
Advances in Multimedia
Hi-index | 0.00 |
This book gives a detailed overview of SIP specific security issues and how to solve them While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms that cover a subset of possible security issues. In this book, the authors survey important aspects of securing SIP-based services. This encompasses a description of the problems themselves and the standards-based solutions for such problems. Where a standards-based solution has not been defined, the alternatives are discussed and the benefits and constraints of the different solutions are highlighted. Key Features: Will help the readers to understand the actual problems of using and developing VoIP services, and to distinguish between real problems and the general hype of VoIP security Discusses key aspects of SIP security including authentication, integrity, confidentiality, non-repudiation and signalling Assesses the real security issues facing users of SIP, and details the latest theoretical and practical solutions to SIP Security issues Covers secure SIP access, inter-provider secure communication, media security, security of the IMS infrastructures as well as VoIP services vulnerabilities and countermeasures against Denial-of-Service attacks and VoIP spam This book will be of interest to IT staff involved in deploying and developing VoIP, service users of SIP, network engineers, designers and managers. Advanced undergraduate and graduate students studying data/voice/multimedia communications as well as researchers in academia and industry will also find this book valuable.