Misuse patterns in VoIP

  • Authors:
  • Juan C. Pelaez;Eduardo B. Fernandez;M. M. Larrondo-Petrie;Christian Wieser

  • Affiliations:
  • Networking Security Branch, Aberdeen, Maryland;Florida Atlantic University, Boca Raton, Florida;Florida Atlantic University, Boca Raton, Florida;University of Oulu, Oulu, Finland

  • Venue:
  • Proceedings of the 14th Conference on Pattern Languages of Programs
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be aware of typical risks and to have a good understanding of how vulnerabilities can be exploited. In a previous paper we presented the concept of misuse patterns. Attack patterns describe from the point of view of the attacker, how a type of attack is performed (what system units it uses and how), analyzes the ways of stopping the attack by enumerating possible security patterns that can be applied for this purpose, and describes how to trace the attack once it has happened by appropriate collection and observation of forensics data. We present a set of misuse patterns for VoIP: Denial of Service (DoS), Call Interception, and Theft of Service on VoIP.