Journal of Network and Computer Applications
A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Clustering NGN user behavior for anomaly detection
Information Security Tech. Report
Journal of Computer Security
Hi-index | 0.00 |
Voice over IP (VoIP) technologies are increasingly used for personal and enterprise communications, thanks to their flexibility and cost efficiencies relative to the traditional phone network. The author presents a survey of all related vulnerabilities found in the Common Vulnerabilities and Exploits (CVE) database. He juxtaposes it with a survey of a large number of research papers in the area of VoIP security. Key findings include that most disclosed vulnerabilities refer to denial of service attacks that are equally split between client and server devices; the majority of vulnerabilities are attributable to implementation faults; a large fraction of vulnerabilities derive from configuration problems; and research efforts are primarily focused on spam over Internet telephony (SPIT).