Voice over IPsec: Analysis and Solutions
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Socio-technical defense against voice spamming
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
An ontology description for SIP security flaws
Computer Communications
Security Analysis of Voice-over-IP Protocols
CSF '07 Proceedings of the 20th IEEE Computer Security Foundations Symposium
Billing attacks on SIP-based VoIP systems
WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies
Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding
Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications
Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob?
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Detecting VoIP Floods Using the Hellinger Distance
IEEE Transactions on Parallel and Distributed Systems
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Nuisance level of a voice call
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
IAS '08 Proceedings of the 2008 The Fourth International Conference on Information Assurance and Security
Voice pharming attack and the trust of VoIP
Proceedings of the 4th international conference on Security and privacy in communication netowrks
SDRS: A Voice-over-IP Spam Detection and Reaction System
IEEE Security and Privacy
A Self-learning System for Detection of Anomalous SIP Messages
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
ISM '08 Proceedings of the 2008 Tenth IEEE International Symposium on Multimedia
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Performance analysis of identity management in the Session Initiation Protocol (SIP)
AICCSA '08 Proceedings of the 2008 IEEE/ACS International Conference on Computer Systems and Applications
Intrusion detection in voice over IP environments
International Journal of Information Security
Evaluating DOS attacks against SIP-based VoIP systems
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
SP 800-58. Security Considerations for Voice Over IP Systems
SP 800-58. Security Considerations for Voice Over IP Systems
Security Challenge and Defense in VoIP Infrastructures
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
IEEE Communications Magazine
SIP security issues: the SIP authentication procedure and its processing load
IEEE Network: The Magazine of Global Internetworking
Security challenges for peer-to-peer SIP
IEEE Network: The Magazine of Global Internetworking
Inter-domain and DoS-resistant call establishment protocol (IDDR-CEP): work in progress
Principles, Systems and Applications of IP Telecommunications
Principles, Systems and Applications of IP Telecommunications
A survey on fraud and service misuse in voice over IP (VoIP) networks
Information Security Tech. Report
Clustering NGN user behavior for anomaly detection
Information Security Tech. Report
Transaction-based authentication and key agreement protocol for inter-domain VoIP
Journal of Network and Computer Applications
Breaking cell phone authentication: vulnerabilities in AKA, IMS and Android
WOOT'13 Proceedings of the 7th USENIX conference on Offensive Technologies
Digital Identity based VoIP Authentication Mechanism
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.00 |
We present a survey of Voice over IP security research. Our goal is to provide a roadmap for researchers seeking to understand existing capabilities and, and to identify gaps in addressing the numerous threats and vulnerabilities present in VoIP systems. We also briefly discuss the implications of our findings with respect to actual vulnerabilities reported in a variety VoIP products.