Security issues with the IP multimedia subsystem (IMS)
Proceedings of the 2007 Workshop on Middleware for next-generation converged networks and applications
Monitoring SIP Traffic Using Support Vector Machines
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Analysing Protocol Implementations
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
A novel method for detecting attacks towards the SIP protocol
SPECTS'09 Proceedings of the 12th international conference on Symposium on Performance Evaluation of Computer & Telecommunication Systems
Detecting VoIP-specific denial-of-service using change-point method
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Designing attacks on SIP call set-up
International Journal of Applied Cryptography
Principles, Systems and Applications of IP Telecommunications
DNCOCO'10 Proceedings of the 9th WSEAS international conference on Data networks, communications, computers
Strategic management using VoIP technology: a case study in a call center company
WSEAS TRANSACTIONS on COMMUNICATIONS
Hi-index | 0.00 |
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way"This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network SecurityBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardwareFortify Cisco, Avaya, and Asterisk systemsPrevent DNS poisoning, DHCP exhaustion, and ARP table manipulationThwart number harvesting, call pattern tracking, and conversation eavesdroppingMeasure and maintain VoIP network quality of service and VoIP conversation qualityStop DoS and packet flood-based attacks from disrupting SIP proxies and phones Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacksAvoid insertion/mixing of malicious audioLearn about voice SPAM/SPIT and how to prevent itDefend against voice phishing and identity theft scamsTable of contentsPart I: Casing the EstablishmentChapter 1: Footprinting a VoIP NetworkChapter 2: Scanning a VoIP NetworkChapter 3: Enumerating a VoIP NetworkPart II: Exploiting the VoIP Underlying PlatformsChapter 4: VoIP Network Infrastructure Denial of Service (DoS)Chapter 5: VoIP Network EavesdroppingChapter 6: VoIP Interception and ModificationPart III: Exploiting Specific VoIP PlatformsChapter 7: Cisco Unified CallManagerChapter 8: Avaya Communication ManagerChapter 9: AsteriskChapter 10: Emerging Softphone TechnologiesPart IV : VoIP Session and Application HackingChapter 11: VoIP FuzzingChapter 12: Flood-based Disruption of ServiceChapter 13: Signaling and Media ManipulationPart V: Social ThreatsChapter 14: SPAM over Internet Technology (SPIT)Chapter 15: Voice PhishingIndex