DocumentCode
2783
Title
Capture and Analysis of Malicious Traffic in VoIP Environments Using a Low Interaction Honeypot
Author
Riboldi Jordao da Silva Vargas, Ivan ; Kleinschmidt, Joao Henrique
Author_Institution
Univ. Fed. do ABC (UFABC), Santo Andre, Brazil
Volume
13
Issue
3
fYear
2015
fDate
Mar-15
Firstpage
777
Lastpage
783
Abstract
The number of users of VoIP services is increasing every year. Consequently, VoIP systems get more attractive for attackers. This paper describes the implementation of a low interaction honeypot for monitoring illegal activities in VoIP environments. The honeypot operated during 92 days and collected 3502 events related to the SIP protocol. The analysis of the results allows understanding the modus operandi of the attacks targeted to VoIP infrastructures. These results may be used to improve defense mechanisms such as firewalls and intrusion detection systems.
Keywords
Internet telephony; computer network security; VoIP environment; illegal activities monitoring; low interaction honeypot; malicious traffic analysis; malicious traffic capture; IP networks; Logic gates; Monitoring; Protocols; Reactive power; Registers; Software; SIP; VoIP; atacks; honeypot; security;
fLanguage
English
Journal_Title
Latin America Transactions, IEEE (Revista IEEE America Latina)
Publisher
ieee
ISSN
1548-0992
Type
jour
DOI
10.1109/TLA.2015.7069104
Filename
7069104
Link To Document