Practical VoIP Security
Computer Security and Cryptography
Computer Security and Cryptography
Speech bandwith requirements in IPsec and TLS environment
ICCOMP'09 Proceedings of the WSEAES 13th international conference on Computers
SIP Security
Guide for designing cyber security exercises
E-ACTIVITIES'09/ISP'09 Proceedings of the 8th WSEAS International Conference on E-Activities and information security and privacy
A survey of IP traceback mechanisms to overcome denial-of-service attacks
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
SIP infrastructure performance testing
TELE-INFO'10 Proceedings of the 9th WSEAS international conference on Telecommunications and informatics
CIT'10 Proceedings of the 4th international conference on Communications and information technology
A new way towards security in TCP/IP protocol suite
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
Kamailio syntax generator and configuration file parser
Proceedings of the 15th WSEAS international conference on Computers
Admission control methods in IP networks
Advances in Multimedia
Hi-index | 0.00 |
This article deals with various techniques of VoIP attacks and VoIP communication security. These threats are divided in several categories according to their specific behaviour and their impact on the affected system. We describe effective methods to prevent or mitigate these attacks. Our work was especially focused on Spam over Internet Telephony (SPIT) as a real threat for the future and we consider spam in IP telephony to be very serious due to situation we face in e-mail communication. We have developed both an AntiSPIT tool defending communication systems against SPIT attacks and a tool generating SPIT attacks. AntiSPIT represents an effective protection based on statistical blacklist and works without participation of the called party which is significant advantage, AntiSPIT was implemented into Asterisk open-source platform and became one way of protection against the voice spam expected in near future.