{"title":"Modular Test System for Determination of Protection against Attacks in VoIP Networks","authors":"M. Voznák, F. Rezac, J. Rozhon","doi":"10.1109/NGMAST.2013.31","DOIUrl":null,"url":null,"abstract":"A VoIP (Voice over Internet Protocol) soft switch is essential for every IP telephony infrastructure. Frequently, it provides other services besides those related to VoIP. Very often, these switches are the target of external attackers. This article describes the system designed to test whether the targeted VoIP soft switch is sufficiently secured and protected against possible real threats. The system tests the switches for resistance to the most prevailing attacks. Based on whether the penetration is successful or not, the system assesses their overall security. The article describes applications and algorithms used by the system. The conclusion includes recommendations and principles to ensure efficient protection of a VoIP soft switch against existing threats. The system is designed as an open-source web application, allowing for access irrespective of the operation system platform, and can be extended with additional testing modules.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NGMAST.2013.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
A VoIP (Voice over Internet Protocol) soft switch is essential for every IP telephony infrastructure. Frequently, it provides other services besides those related to VoIP. Very often, these switches are the target of external attackers. This article describes the system designed to test whether the targeted VoIP soft switch is sufficiently secured and protected against possible real threats. The system tests the switches for resistance to the most prevailing attacks. Based on whether the penetration is successful or not, the system assesses their overall security. The article describes applications and algorithms used by the system. The conclusion includes recommendations and principles to ensure efficient protection of a VoIP soft switch against existing threats. The system is designed as an open-source web application, allowing for access irrespective of the operation system platform, and can be extended with additional testing modules.