{"title":"基于IP的语音系统威胁评估","authors":"Bill Rippon","doi":"10.1109/VOIPMS.2006.1638118","DOIUrl":null,"url":null,"abstract":"In this paper, we will provide an analysis of the potential threats to the reliability and security of IP based voice systems including; voice over IP and IP telephony. For each of the threat categories we will explore the potential methods of attacks and detail various mitigation approaches. These mitigation approaches may help to minimize or eliminate the exposure. Finally, we will provide a set of summary recommendations for dealing with each of the threat categories.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"Threat assessment of IP based voice systems\",\"authors\":\"Bill Rippon\",\"doi\":\"10.1109/VOIPMS.2006.1638118\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we will provide an analysis of the potential threats to the reliability and security of IP based voice systems including; voice over IP and IP telephony. For each of the threat categories we will explore the potential methods of attacks and detail various mitigation approaches. These mitigation approaches may help to minimize or eliminate the exposure. Finally, we will provide a set of summary recommendations for dealing with each of the threat categories.\",\"PeriodicalId\":374092,\"journal\":{\"name\":\"1st IEEE Workshop on VoIP Management and Security, 2006.\",\"volume\":\"78 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"1st IEEE Workshop on VoIP Management and Security, 2006.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/VOIPMS.2006.1638118\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"1st IEEE Workshop on VoIP Management and Security, 2006.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VOIPMS.2006.1638118","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, we will provide an analysis of the potential threats to the reliability and security of IP based voice systems including; voice over IP and IP telephony. For each of the threat categories we will explore the potential methods of attacks and detail various mitigation approaches. These mitigation approaches may help to minimize or eliminate the exposure. Finally, we will provide a set of summary recommendations for dealing with each of the threat categories.