1st IEEE Workshop on VoIP Management and Security, 2006.最新文献

筛选
英文 中文
Securing VoIP and PSTN from integrated signaling network vulnerabilities 保护VoIP和PSTN免受综合信令网络漏洞的侵害
1st IEEE Workshop on VoIP Management and Security, 2006. Pub Date : 2006-06-05 DOI: 10.1109/VOIPMS.2006.1638116
Hemant Sengar, Ram Dantu, D. Wijesekera
{"title":"Securing VoIP and PSTN from integrated signaling network vulnerabilities","authors":"Hemant Sengar, Ram Dantu, D. Wijesekera","doi":"10.1109/VOIPMS.2006.1638116","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638116","url":null,"abstract":"The liberalization of public switched telephone network (PSTN) and growing acceptance of SIGTRAN protocol suite have introduced new and yet to be trusted signaling entities. Thus security threats emerging from one network not only affects itself but other network also. We show how this integrated signaling environment can become a security threat to emerging VoIP and PSTN networks. We propose a security solution as a fix. Our proposal goes beyond \"Gateway Screening\" and \"SS7 Gatekeeper\" proposed by Telcordia and Verizon respectively to defend vulnerable SS7 network.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131388743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A lightweight scheme for securely and reliably locating SIP users 一个轻量级的方案,用于安全可靠地定位SIP用户
1st IEEE Workshop on VoIP Management and Security, 2006. Pub Date : 2006-04-03 DOI: 10.1109/VOIPMS.2006.1638117
L. Kong, V. Balasubramaniyan, M. Ahamad
{"title":"A lightweight scheme for securely and reliably locating SIP users","authors":"L. Kong, V. Balasubramaniyan, M. Ahamad","doi":"10.1109/VOIPMS.2006.1638117","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638117","url":null,"abstract":"Voice over Internet protocol (VOIP) is a fast growing technology believed to be the future replacement for traditional public switched telephone network (PSTN) networks. VOIP offers many benefits over PSTW, but there are still lots of issues when it comes to service reliability and security. One of the problems faced is how to locate communicating parties on the Internet in a secure and reliable manner. The security mechanisms included in RFC 3261 session initiation protocol (SIP) are either weak or expensive to deploy. In this paper, we propose a light weight scheme that can protect the integrity of SIP contact addresses. This scheme also achieves high availability of SIP services through replication. End user public key distributed in this scheme can also be used for end-to-end user authentication and media session key exchange.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133155260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Detecting DoS attacks on SIP systems 检测SIP系统的DoS攻击
1st IEEE Workshop on VoIP Management and Security, 2006. Pub Date : 2006-04-03 DOI: 10.1109/VOIPMS.2006.1638123
Eric Y. Chen
{"title":"Detecting DoS attacks on SIP systems","authors":"Eric Y. Chen","doi":"10.1109/VOIPMS.2006.1638123","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638123","url":null,"abstract":"As VoIP technology becomes more widely deployed due to its economical advantage over traditional PSTN services, VoIP servers and clients will become attractive targets of denial of service (DoS) attacks. This paper proposes a method to detect DoS attacks that involve flooding SIP entities with illegitimate SIP messages. We modify the original finite-state machines for SIP transactions in such a way that transaction anomalies can be detected in a stateful manner. We also propose to use four threshold parameters to confirm an attack.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125130054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 114
Enabling Java-based VoIP backend platforms through JVM performance tuning 通过JVM性能调优启用基于java的VoIP后端平台
1st IEEE Workshop on VoIP Management and Security, 2006. Pub Date : 2006-04-03 DOI: 10.1109/VOIPMS.2006.1638121
B. Van Den Bossche, F. De Turck, B. Dhoedt, P. Demeester
{"title":"Enabling Java-based VoIP backend platforms through JVM performance tuning","authors":"B. Van Den Bossche, F. De Turck, B. Dhoedt, P. Demeester","doi":"10.1109/VOIPMS.2006.1638121","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638121","url":null,"abstract":"Software backend platforms are increasingly important in voice over IP (VoIP) service offering. Java, currently the most popular language, and the J2EE platform have evolved toward one of the important software frameworks for designing and implementing business logic on a telecom backend platform. Considering the popularity of Java, the question arises whether Java-based backend platforms can meet the requirements imposed by VoIP applications. SIP is an important example of a signaling protocol often used for VoIP. The SIP Servlet technology was developed for building Java based VoIP services. Therefore, we evaluated both the functionality and performance of the SIP Servlet specification and implementations. The evaluation procedure and the obtained results are reported upon. The influence of the Java virtual machine (JVM) tuning has been investigated and will be detailed in this paper. Moreover, performance of techniques based on the obtained results to optimize the garbage collector tuning of the JVM in general, and more specifically for VoIP related applications, will be presented.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130545307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
VoIP security assessment: methods and tools VoIP安全评估:方法和工具
1st IEEE Workshop on VoIP Management and Security, 2006. Pub Date : 2006-04-03 DOI: 10.1109/VOIPMS.2006.1638119
H. Abdelnur, V. Cridlig, R. State, O. Festor
{"title":"VoIP security assessment: methods and tools","authors":"H. Abdelnur, V. Cridlig, R. State, O. Festor","doi":"10.1109/VOIPMS.2006.1638119","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638119","url":null,"abstract":"VoIP networks are cost efficient solutions for providing voice services and value added voice based services to both public and enterprise level users. The security of VoIP network is of major importance, since malicious usage can lead to major security incidents and associated costs. In this paper we present a security management framework for VoIP. This framework is capable to perform advanced security assessment tasks for such a network. This paper describe our developed tool, highlights some of its key components and presents some of the learned experience while implementing the framework on a internal testbed.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123105298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Statistical traffic identification method based on flow-level behavior for fair VoIP service 基于流级行为的公平VoIP业务统计识别方法
1st IEEE Workshop on VoIP Management and Security, 2006. Pub Date : 2006-04-03 DOI: 10.1109/VOIPMS.2006.1638120
T. Okabe, T. Kitamura, Takayuki Shizuno
{"title":"Statistical traffic identification method based on flow-level behavior for fair VoIP service","authors":"T. Okabe, T. Kitamura, Takayuki Shizuno","doi":"10.1109/VOIPMS.2006.1638120","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638120","url":null,"abstract":"Many threats, such as denial-of-services (DoS) attacks and impersonation, can endanger an IP network where real-time communication, as represented by VoIP, requires a high level of reliability to work as a replacement for PSTN. Without making a concrete framework to protect the reliability of VoIP, we may soon start seeing cases whereby networks are illegally used by impersonating real-time communication. This paper proposes a technique, based on flow-level behavior, which aims to maintain communication confidentiality and identify applications of real-time communication, in a short period of time in order to eliminate applications that illegally use network resources. The paper shows favorable identification results were obtained from our experiments and also introduces issues we have discovered that must be resolved.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130980040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Threat assessment of IP based voice systems 基于IP的语音系统威胁评估
1st IEEE Workshop on VoIP Management and Security, 2006. Pub Date : 2006-04-03 DOI: 10.1109/VOIPMS.2006.1638118
Bill Rippon
{"title":"Threat assessment of IP based voice systems","authors":"Bill Rippon","doi":"10.1109/VOIPMS.2006.1638118","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638118","url":null,"abstract":"In this paper, we will provide an analysis of the potential threats to the reliability and security of IP based voice systems including; voice over IP and IP telephony. For each of the threat categories we will explore the potential methods of attacks and detail various mitigation approaches. These mitigation approaches may help to minimize or eliminate the exposure. Finally, we will provide a set of summary recommendations for dealing with each of the threat categories.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132477048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
SIP intrusion detection and prevention: recommendations and prototype implementation SIP入侵检测和防御:建议和原型实现
1st IEEE Workshop on VoIP Management and Security, 2006. Pub Date : 2006-04-03 DOI: 10.1109/VOIPMS.2006.1638122
S. Niccolini, R. Garroppo, S. Giordano, G. Risi, S. Ventura
{"title":"SIP intrusion detection and prevention: recommendations and prototype implementation","authors":"S. Niccolini, R. Garroppo, S. Giordano, G. Risi, S. Ventura","doi":"10.1109/VOIPMS.2006.1638122","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638122","url":null,"abstract":"As VoIP deployment are expected to grow, intrusion problems similar to those of which data networks experience will become very critical. In the early stages of deployment, the intrusion and security problems have not been seriously considered, although they could have a negative impact on VoIP deployment. In the paper, SIP intrusion detection and prevention requirements are analyzed and an IDS/IPS architecture is proposed. A prototype of the proposed architecture was implemented using as a basis the very popular open-source software Snort, a network-based intrusion detection and prevention system. The prototype of the proposed architecture extends the basic functionality of Snort, making use of the preprocessing feature that permits analyzing protocols of layers above the TCP/UDP one. The preprocessors block is a very powerful one since it permits to implement both knowledge and behavior based intrusion detection and prevention techniques in Snort that basically adopts a network based technique. An important requirement of an IPS is that legitimate traffic should be forwarded to the recipient with no apparent disruption or delay of service. Hence, the performance of the proposed architecture has been evaluated in terms of impact that its operation has on the QoS experienced by the VoIP users.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128355157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信