{"title":"VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploits","authors":"Ryan J. Farley, Xinyuan Wang","doi":"10.1109/NOMS.2012.6211937","DOIUrl":null,"url":null,"abstract":"In this paper, we present a lightweight defense mechanism against VoIP attacks, called VoIP Shield, that can detect counterfeit or MITM modified messages as well as replay attacks without ever changing the underlying VoIP protocol. We then empirically tested our design in conjunction with deployed Vonage VoIP services against a large body of attacks including billing, call redirection, voice pharming, and complex MITM exploits. The results demonstrate that advanced VoIP protection is practical, lightweight, and can be deployed even in systems where software upgrades are impossible.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE Network Operations and Management Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NOMS.2012.6211937","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
In this paper, we present a lightweight defense mechanism against VoIP attacks, called VoIP Shield, that can detect counterfeit or MITM modified messages as well as replay attacks without ever changing the underlying VoIP protocol. We then empirically tested our design in conjunction with deployed Vonage VoIP services against a large body of attacks including billing, call redirection, voice pharming, and complex MITM exploits. The results demonstrate that advanced VoIP protection is practical, lightweight, and can be deployed even in systems where software upgrades are impossible.