A comprehensive survey of voice over IP security research
AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …
set of 245 publications forming a closed cross-citation set. We classify these papers …
Security analysis of voice-over-IP protocols
P Gupta, V Shmatikov - 20th IEEE Computer Security …, 2007 - ieeexplore.ieee.org
The transmission of voice communications as datagram packets over IP networks,
commonly known as voice-over-IP (VoIP) telephony, is rapidly gaining wide acceptance …
commonly known as voice-over-IP (VoIP) telephony, is rapidly gaining wide acceptance …
A framework for protecting a SIP-based infrastructure against malformed message attacks
This paper presents a framework that can be utilized for the protection of session initiation
protocol (SIP)-based infrastructures from malformed message attacks. Its main characteristic …
protocol (SIP)-based infrastructures from malformed message attacks. Its main characteristic …
[PDF][PDF] Billing Attacks on SIP-Based VoIP Systems.
R Zhang, X Wang, X Yang, X Jiang - WOOT, 2007 - usenix.org
Billing is fundamental to any commercial VoIP services and it has direct impact on each
individual VoIP subscriber. One of the most basic requirements of any VoIP billing function is …
individual VoIP subscriber. One of the most basic requirements of any VoIP billing function is …
Detecting anomalous behavior in VoIP systems: A discrete event system modeling
D Golait, N Hubballi - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
Session initiation protocol (SIP) is an application layer protocol used for signaling purposes
to manage voice over IP connections. SIP being a text-based protocol is vulnerable to a …
to manage voice over IP connections. SIP being a text-based protocol is vulnerable to a …
Performance analysis: Securing SIP on multi-threaded/multi-core proxy server using public keys on Diffie–Hellman (DH) in single and multi-server queuing scenarios
The rapid replacement of PSTN with VOIP networks indicates the definitive phase-out of the
PBX/PABX with smartphone-based VOIP technology that uses WLAN connectivity for local …
PBX/PABX with smartphone-based VOIP technology that uses WLAN connectivity for local …
A framework for identity privacy in SIP
Secure multimedia delivery in modern and future networks is one of the most challenging
problems towards the system integration of fourth generation (4G) networks. This integration …
problems towards the system integration of fourth generation (4G) networks. This integration …
Artemisa: An open-source honeypot back-end to support security in VoIP domains
Voice over IP (VoIP) and the Session Initiation Protocol (SIP) are establishing themselves as
strong players in the field of multimedia communications over IP, leveraged by low cost …
strong players in the field of multimedia communications over IP, leveraged by low cost …
The untold secrets of wifi-calling services: Vulnerabilities, attacks, and countermeasures
Since 2016, all of four major US operators have rolled out Wi-Fi calling services. They
enable mobile users to place cellular calls over Wi-Fi networks based on the 3GPP IMS …
enable mobile users to place cellular calls over Wi-Fi networks based on the 3GPP IMS …
Payment frameworks for the purchase of electronic products and services
End users' demand for electronic contents and services is increasing dramatically. Vendors
and service providers might want to obtain benefits by charging for their electronic contents …
and service providers might want to obtain benefits by charging for their electronic contents …