DocumentCode :
1946739
Title :
Securing VoIP network: An overview of applied approaches and analysis
Author :
Oche, Michael ; Nasir, Mostofa Kamal ; Tambawal, Abubakar Bello ; Noor, Rafidah Md
Author_Institution :
Fac. of Comput. Sci. & Inf. Technol., Univ. of Malaya, Kuala Lumpur, Malaysia
fYear :
2013
fDate :
13-17 July 2013
Firstpage :
104
Lastpage :
109
Abstract :
VoIP is becoming more and more popular and as such a potential target for hackers. Providing security for VoIP services is therefore pertinent for telecommunications. Without correct mechanisms to ensure callers´ authentication, transmission confidentiality and availability of the service, security of the VoIP users is at risk. The fact that VoIP relies on IP infrastructure make it vulnerable to any attack that targets the network. Consequently, whatever may be the nature of the attack, there is a good chance that the attacker is capitalizing on a weakness in the VoIP protocol being used. VoIP is different from other IP services in the sense that its security is normally treated as one of the service properties configurable by the user. This article provides an overview of the VoIP security configuration requirement, aimed at empowering public VoIP user With the strategies to mitigate threats.
Keywords :
Internet telephony; computer network security; protocols; IP infrastructure; VoIP network security; VoIP protocol; VoIP security configuration requirement; caller authentication; service availability; telecommunications; transmission confidentiality; IP networks; Internet; Ports (Computers); Protocols; Security; Servers; Telephony; PSTN; Security; Telephony; VoIP;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Science, Computing and Telecommunications (PACT), 2013 Pan African International Conference on
Conference_Location :
Lusaka
Type :
conf
DOI :
10.1109/SCAT.2013.7055097
Filename :
7055097
Link To Document :
بازگشت