Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Assessing the risk of intercepting VoIP calls
Computer Networks: The International Journal of Computer and Telecommunications Networking
Session Initiation Protocol (SIP): Controlling Convergent Networks
Session Initiation Protocol (SIP): Controlling Convergent Networks
Predictive algorithms in the management of computer systems
IBM Systems Journal
Analysis of techniques for protection against spam over internet telephony
EUNICE'07 Proceedings of the 13th open European summer school and IFIP TC6.6 conference on Dependable and adaptable networks and services
Hi-index | 0.00 |
VoIP infrastructures are exposed to a large variety of security attacks, but the deployment of security safeguards may deteriorate their performance. Risk management provides new perspectives for addressing this issue. Risk models permit to reduce these attacks while maintaining the quality of such a critical service. These models often suffer from their complexity due to the high number of parameters to be configured. We therefore propose in this paper a self-configuration strategy for supporting runtime risk management in VoIP architectures. This strategy aims at automatically adapting these parameters based on an econometric feedback mechanism. We mathematically describe this self-configuration strategy, show how it can be integrated into our runtime risk model. We then evaluate its deployment based on a proof-of-concept prototype, and quantify its performance through an extensive set of simulation results.