VoIP protection techniques
This paper provides brief summary of threats and vulnerabilities of VoIP systems and architecture and provides overview of most used methods how to mitigate them. It also includes some interesting projects running nowadays that reflect latest development in this area.
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 224 |
---|---|
container_issue | |
container_start_page | 219 |
container_title | |
container_volume | |
creator | Matejka, J Lábaj, Ondrej Londák, Juraj Podhradský, Pavol |
description | This paper provides brief summary of threats and vulnerabilities of VoIP systems and architecture and provides overview of most used methods how to mitigate them. It also includes some interesting projects running nowadays that reflect latest development in this area. |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5606169</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5606169</ieee_id><sourcerecordid>5606169</sourcerecordid><originalsourceid>FETCH-ieee_primary_56061693</originalsourceid><addsrcrecordid>eNpjZOC1NLcwNDEyMTEzNjc2YmbggnEMLVgYOA2NjU10jcyMDTgYeIuLM5MMDAxNDC1MLI04GaTC8j0DFAqK8ktSk0sy8_MUgHRGXmZhaWoxDwNrWmJOcSovlOZmkHZzDXH20M1MTU2NLyjKzE0sqow3NTMwMzSzNMYvCwD2Vyoj</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>VoIP protection techniques</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Matejka, J ; Lábaj, Ondrej ; Londák, Juraj ; Podhradský, Pavol</creator><creatorcontrib>Matejka, J ; Lábaj, Ondrej ; Londák, Juraj ; Podhradský, Pavol</creatorcontrib><description>This paper provides brief summary of threats and vulnerabilities of VoIP systems and architecture and provides overview of most used methods how to mitigate them. It also includes some interesting projects running nowadays that reflect latest development in this area.</description><identifier>ISSN: 1334-2630</identifier><identifier>ISBN: 1424463718</identifier><identifier>ISBN: 9781424463718</identifier><identifier>EISBN: 9781424463732</identifier><identifier>EISBN: 1424463734</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer architecture ; ELMAR ; Honeypot ; IDS/IPS ; Intrusion detection ; IP networks ; Media ; Protocols ; SBC ; security ; Servers ; VoIP</subject><ispartof>Proceedings ELMAR-2010, 2010, p.219-224</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5606169$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,778,782,787,788,2054,54903</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5606169$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Matejka, J</creatorcontrib><creatorcontrib>Lábaj, Ondrej</creatorcontrib><creatorcontrib>Londák, Juraj</creatorcontrib><creatorcontrib>Podhradský, Pavol</creatorcontrib><title>VoIP protection techniques</title><title>Proceedings ELMAR-2010</title><addtitle>ELMAR</addtitle><description>This paper provides brief summary of threats and vulnerabilities of VoIP systems and architecture and provides overview of most used methods how to mitigate them. It also includes some interesting projects running nowadays that reflect latest development in this area.</description><subject>Computer architecture</subject><subject>ELMAR</subject><subject>Honeypot</subject><subject>IDS/IPS</subject><subject>Intrusion detection</subject><subject>IP networks</subject><subject>Media</subject><subject>Protocols</subject><subject>SBC</subject><subject>security</subject><subject>Servers</subject><subject>VoIP</subject><issn>1334-2630</issn><isbn>1424463718</isbn><isbn>9781424463718</isbn><isbn>9781424463732</isbn><isbn>1424463734</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpjZOC1NLcwNDEyMTEzNjc2YmbggnEMLVgYOA2NjU10jcyMDTgYeIuLM5MMDAxNDC1MLI04GaTC8j0DFAqK8ktSk0sy8_MUgHRGXmZhaWoxDwNrWmJOcSovlOZmkHZzDXH20M1MTU2NLyjKzE0sqow3NTMwMzSzNMYvCwD2Vyoj</recordid><startdate>201009</startdate><enddate>201009</enddate><creator>Matejka, J</creator><creator>Lábaj, Ondrej</creator><creator>Londák, Juraj</creator><creator>Podhradský, Pavol</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201009</creationdate><title>VoIP protection techniques</title><author>Matejka, J ; Lábaj, Ondrej ; Londák, Juraj ; Podhradský, Pavol</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_56061693</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Computer architecture</topic><topic>ELMAR</topic><topic>Honeypot</topic><topic>IDS/IPS</topic><topic>Intrusion detection</topic><topic>IP networks</topic><topic>Media</topic><topic>Protocols</topic><topic>SBC</topic><topic>security</topic><topic>Servers</topic><topic>VoIP</topic><toplevel>online_resources</toplevel><creatorcontrib>Matejka, J</creatorcontrib><creatorcontrib>Lábaj, Ondrej</creatorcontrib><creatorcontrib>Londák, Juraj</creatorcontrib><creatorcontrib>Podhradský, Pavol</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Matejka, J</au><au>Lábaj, Ondrej</au><au>Londák, Juraj</au><au>Podhradský, Pavol</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>VoIP protection techniques</atitle><btitle>Proceedings ELMAR-2010</btitle><stitle>ELMAR</stitle><date>2010-09</date><risdate>2010</risdate><spage>219</spage><epage>224</epage><pages>219-224</pages><issn>1334-2630</issn><isbn>1424463718</isbn><isbn>9781424463718</isbn><eisbn>9781424463732</eisbn><eisbn>1424463734</eisbn><abstract>This paper provides brief summary of threats and vulnerabilities of VoIP systems and architecture and provides overview of most used methods how to mitigate them. It also includes some interesting projects running nowadays that reflect latest development in this area.</abstract><pub>IEEE</pub></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1334-2630 |
ispartof | Proceedings ELMAR-2010, 2010, p.219-224 |
issn | 1334-2630 |
language | eng |
recordid | cdi_ieee_primary_5606169 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Computer architecture ELMAR Honeypot IDS/IPS Intrusion detection IP networks Media Protocols SBC security Servers VoIP |
title | VoIP protection techniques |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T13%3A09%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=VoIP%20protection%20techniques&rft.btitle=Proceedings%20ELMAR-2010&rft.au=Matejka,%20J&rft.date=2010-09&rft.spage=219&rft.epage=224&rft.pages=219-224&rft.issn=1334-2630&rft.isbn=1424463718&rft.isbn_list=9781424463718&rft_id=info:doi/&rft_dat=%3Cieee_6IE%3E5606169%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424463732&rft.eisbn_list=1424463734&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5606169&rfr_iscdi=true |