VoIP protection techniques

This paper provides brief summary of threats and vulnerabilities of VoIP systems and architecture and provides overview of most used methods how to mitigate them. It also includes some interesting projects running nowadays that reflect latest development in this area.

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Matejka, J, Lábaj, Ondrej, Londák, Juraj, Podhradský, Pavol
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 224
container_issue
container_start_page 219
container_title
container_volume
creator Matejka, J
Lábaj, Ondrej
Londák, Juraj
Podhradský, Pavol
description This paper provides brief summary of threats and vulnerabilities of VoIP systems and architecture and provides overview of most used methods how to mitigate them. It also includes some interesting projects running nowadays that reflect latest development in this area.
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5606169</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5606169</ieee_id><sourcerecordid>5606169</sourcerecordid><originalsourceid>FETCH-ieee_primary_56061693</originalsourceid><addsrcrecordid>eNpjZOC1NLcwNDEyMTEzNjc2YmbggnEMLVgYOA2NjU10jcyMDTgYeIuLM5MMDAxNDC1MLI04GaTC8j0DFAqK8ktSk0sy8_MUgHRGXmZhaWoxDwNrWmJOcSovlOZmkHZzDXH20M1MTU2NLyjKzE0sqow3NTMwMzSzNMYvCwD2Vyoj</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>VoIP protection techniques</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Matejka, J ; Lábaj, Ondrej ; Londák, Juraj ; Podhradský, Pavol</creator><creatorcontrib>Matejka, J ; Lábaj, Ondrej ; Londák, Juraj ; Podhradský, Pavol</creatorcontrib><description>This paper provides brief summary of threats and vulnerabilities of VoIP systems and architecture and provides overview of most used methods how to mitigate them. It also includes some interesting projects running nowadays that reflect latest development in this area.</description><identifier>ISSN: 1334-2630</identifier><identifier>ISBN: 1424463718</identifier><identifier>ISBN: 9781424463718</identifier><identifier>EISBN: 9781424463732</identifier><identifier>EISBN: 1424463734</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer architecture ; ELMAR ; Honeypot ; IDS/IPS ; Intrusion detection ; IP networks ; Media ; Protocols ; SBC ; security ; Servers ; VoIP</subject><ispartof>Proceedings ELMAR-2010, 2010, p.219-224</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5606169$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,778,782,787,788,2054,54903</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5606169$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Matejka, J</creatorcontrib><creatorcontrib>Lábaj, Ondrej</creatorcontrib><creatorcontrib>Londák, Juraj</creatorcontrib><creatorcontrib>Podhradský, Pavol</creatorcontrib><title>VoIP protection techniques</title><title>Proceedings ELMAR-2010</title><addtitle>ELMAR</addtitle><description>This paper provides brief summary of threats and vulnerabilities of VoIP systems and architecture and provides overview of most used methods how to mitigate them. It also includes some interesting projects running nowadays that reflect latest development in this area.</description><subject>Computer architecture</subject><subject>ELMAR</subject><subject>Honeypot</subject><subject>IDS/IPS</subject><subject>Intrusion detection</subject><subject>IP networks</subject><subject>Media</subject><subject>Protocols</subject><subject>SBC</subject><subject>security</subject><subject>Servers</subject><subject>VoIP</subject><issn>1334-2630</issn><isbn>1424463718</isbn><isbn>9781424463718</isbn><isbn>9781424463732</isbn><isbn>1424463734</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpjZOC1NLcwNDEyMTEzNjc2YmbggnEMLVgYOA2NjU10jcyMDTgYeIuLM5MMDAxNDC1MLI04GaTC8j0DFAqK8ktSk0sy8_MUgHRGXmZhaWoxDwNrWmJOcSovlOZmkHZzDXH20M1MTU2NLyjKzE0sqow3NTMwMzSzNMYvCwD2Vyoj</recordid><startdate>201009</startdate><enddate>201009</enddate><creator>Matejka, J</creator><creator>Lábaj, Ondrej</creator><creator>Londák, Juraj</creator><creator>Podhradský, Pavol</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201009</creationdate><title>VoIP protection techniques</title><author>Matejka, J ; Lábaj, Ondrej ; Londák, Juraj ; Podhradský, Pavol</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_56061693</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Computer architecture</topic><topic>ELMAR</topic><topic>Honeypot</topic><topic>IDS/IPS</topic><topic>Intrusion detection</topic><topic>IP networks</topic><topic>Media</topic><topic>Protocols</topic><topic>SBC</topic><topic>security</topic><topic>Servers</topic><topic>VoIP</topic><toplevel>online_resources</toplevel><creatorcontrib>Matejka, J</creatorcontrib><creatorcontrib>Lábaj, Ondrej</creatorcontrib><creatorcontrib>Londák, Juraj</creatorcontrib><creatorcontrib>Podhradský, Pavol</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Matejka, J</au><au>Lábaj, Ondrej</au><au>Londák, Juraj</au><au>Podhradský, Pavol</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>VoIP protection techniques</atitle><btitle>Proceedings ELMAR-2010</btitle><stitle>ELMAR</stitle><date>2010-09</date><risdate>2010</risdate><spage>219</spage><epage>224</epage><pages>219-224</pages><issn>1334-2630</issn><isbn>1424463718</isbn><isbn>9781424463718</isbn><eisbn>9781424463732</eisbn><eisbn>1424463734</eisbn><abstract>This paper provides brief summary of threats and vulnerabilities of VoIP systems and architecture and provides overview of most used methods how to mitigate them. It also includes some interesting projects running nowadays that reflect latest development in this area.</abstract><pub>IEEE</pub></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1334-2630
ispartof Proceedings ELMAR-2010, 2010, p.219-224
issn 1334-2630
language eng
recordid cdi_ieee_primary_5606169
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Computer architecture
ELMAR
Honeypot
IDS/IPS
Intrusion detection
IP networks
Media
Protocols
SBC
security
Servers
VoIP
title VoIP protection techniques
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T13%3A09%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=VoIP%20protection%20techniques&rft.btitle=Proceedings%20ELMAR-2010&rft.au=Matejka,%20J&rft.date=2010-09&rft.spage=219&rft.epage=224&rft.pages=219-224&rft.issn=1334-2630&rft.isbn=1424463718&rft.isbn_list=9781424463718&rft_id=info:doi/&rft_dat=%3Cieee_6IE%3E5606169%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424463732&rft.eisbn_list=1424463734&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5606169&rfr_iscdi=true