메뉴 건너뛰기




Volumn 37, Issue 6, 2007, Pages 1152-1162

Security challenge and defense in VoIP infrastructures

Author keywords

Computer attacks; Computer crime; Internet telephony; IP networks; Network security; Security; Voice over Internet Protocol (VoIP)

Indexed keywords

COMPUTER CRIME; INTERNET TELEPHONY; NETWORK PROTOCOLS; NETWORK SECURITY;

EID: 36248938188     PISSN: 10946977     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCC.2007.905853     Document Type: Article
Times cited : (86)

References (29)
  • 1
    • 4644279463 scopus 로고    scopus 로고
    • Dept. Comput. Inf. Sci, Univ. Pennsylvania, Philadelphia, PA, Rep. MS-CIS-01-31, Feb
    • P. Mehta and S. Udani, "Overview of voice over IP", Dept. Comput. Inf. Sci., Univ. Pennsylvania, Philadelphia, PA, Rep. MS-CIS-01-31, Feb. 2001.
    • (2001) Overview of voice over IP
    • Mehta, P.1    Udani, S.2
  • 7
    • 36248987023 scopus 로고    scopus 로고
    • S. McGann and D. Sicker, An analysis of security threats and tools in SIP-based VoIP systems, presented at the 2nd Annu. Workshop VoIP Secur., Washington, DC, Jun. 2005.
    • S. McGann and D. Sicker, "An analysis of security threats and tools in SIP-based VoIP systems," presented at the 2nd Annu. Workshop VoIP Secur., Washington, DC, Jun. 2005.
  • 8
    • 34748855403 scopus 로고    scopus 로고
    • VoIP security: Not an afterthought
    • Sep
    • D. Sicker and T. Lookabaugh, "VoIP security: Not an afterthought," ACM Queue, vol. 2, no. 6, pp. 56-64, Sep. 2004.
    • (2004) ACM Queue , vol.2 , Issue.6 , pp. 56-64
    • Sicker, D.1    Lookabaugh, T.2
  • 9
    • 36249029005 scopus 로고    scopus 로고
    • Feb. 20, Online, Available
    • M. Collier. (2007, Feb. 20). VoIP vulnerabilities: Denial of service. [Online]. Available: http://www.voip-magazine.com/ index.php?option=com_content&task=view&id=328.
    • (2007) VoIP vulnerabilities: Denial of service
    • Collier, M.1
  • 10
    • 0036862206 scopus 로고    scopus 로고
    • VoIP the latest security concern: DoS attack the greatest threat
    • Nov
    • P. Hunter, "VoIP the latest security concern: DoS attack the greatest threat," Netw. Secur., no. 11, pp. 5-7, Nov. 2002.
    • (2002) Netw. Secur , Issue.11 , pp. 5-7
    • Hunter, P.1
  • 11
    • 14544290951 scopus 로고    scopus 로고
    • Voice over IP: Security pitfalls
    • Feb
    • E. Edelson, "Voice over IP: Security pitfalls," Netw. Secur., no. 2, pp. 4-7, Feb. 2005.
    • (2005) Netw. Secur , Issue.2 , pp. 4-7
    • Edelson, E.1
  • 12
    • 22544449919 scopus 로고    scopus 로고
    • VoIP - extra threats in the converged environment
    • Jul
    • P. Rowe, "VoIP - extra threats in the converged environment," Netw. Secur., no. 7, pp. 12-16, Jul. 2005.
    • (2005) Netw. Secur , Issue.7 , pp. 12-16
    • Rowe, P.1
  • 14
    • 36249005228 scopus 로고    scopus 로고
    • Not your father's PBX?
    • Sep
    • J. Coffman, "Not your father's PBX?," ACM Queue, vol. 2, no. 6, pp. 40-47, Sep. 2004.
    • (2004) ACM Queue , vol.2 , Issue.6 , pp. 40-47
    • Coffman, J.1
  • 15
    • 36248945371 scopus 로고    scopus 로고
    • Security in VoIP-telephony systems,
    • M.S. thesis, Graz Univ. Technol, Graz, Austria
    • J. Thalhammer, "Security in VoIP-telephony systems," M.S. thesis, Graz Univ. Technol., Graz, Austria, 2004.
    • (2004)
    • Thalhammer, J.1
  • 16
    • 36249021257 scopus 로고    scopus 로고
    • C. Garretson. (2005, Jul.). VoIP security threats: Fact or fiction? Netw. World. [Online]. Available: http://www.networkworld.com/news/2005/072505-voip-security.html.
    • C. Garretson. (2005, Jul.). VoIP security threats: Fact or fiction? Netw. World. [Online]. Available: http://www.networkworld.com/news/2005/072505-voip-security.html.
  • 19
    • 50249152291 scopus 로고    scopus 로고
    • Available
    • Feb. 20, Preventing Layer 2 security threats [Online, sid7_gci1009100,00.html
    • J. Bartlomiejczyk and M. Phipps. (2007, Feb. 20). Preventing Layer 2 security threats [Online]. Available: http:// searchnetworking.techtarget.com/tip/1289483,sid7_gci1009100,00.html.
    • (2007)
    • Bartlomiejczyk, J.1    Phipps, M.2
  • 20
    • 36248959006 scopus 로고    scopus 로고
    • Security framework for IP telephony
    • ANSI Accredited Eng. Committee TR41.4 Standards Commission, Rep. TR-41.4-02-02-12, Feb
    • N. Dadoun, "Security framework for IP telephony," ANSI Accredited Eng. Committee TR41.4 Standards Commission, Rep. TR-41.4-02-02-12, Feb. 2002.
    • (2002)
    • Dadoun, N.1
  • 23
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • H. Debar, M. Dacier, and A. Wespi, "Towards a taxonomy of intrusion-detection systems," Comput. Netw., vol. 31, pp. 805-822, 1999.
    • (1999) Comput. Netw , vol.31 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 24
    • 34547564714 scopus 로고    scopus 로고
    • Secure VoIP: Call establishment and media protection
    • presented at the, Washington, DC, Jun
    • J. Bilien, E. Eliasson, J. Orrblad, and J.O. Vatn, "Secure VoIP: Call establishment and media protection," presented at the 2nd Workshop Secur. Voice IP, Washington, DC, Jun. 2005.
    • (2005) 2nd Workshop Secur. Voice IP
    • Bilien, J.1    Eliasson, E.2    Orrblad, J.3    Vatn, J.O.4
  • 25
    • 36249003618 scopus 로고    scopus 로고
    • J. Kaavi, Group key distribution in ad-hoc networks using MIKEY, presented at the Helsinki Univ. Technol. Semin. Internetw., Apr. 2005.
    • J. Kaavi, "Group key distribution in ad-hoc networks using MIKEY," presented at the Helsinki Univ. Technol. Semin. Internetw., Apr. 2005.
  • 26
    • 36248988857 scopus 로고    scopus 로고
    • Feb. 20, Online, Available
    • Cisco Systems. (2007, Feb. 20). Security in SIP-based networks. [Online]. Available: http://www.cisco.com/warp/public/cc/techno/tyvdve/ sip/prodlit/sipsc_wp.pdf.
    • (2007) Security in SIP-based networks
    • Systems, C.1
  • 27
    • 36249002056 scopus 로고    scopus 로고
    • Feb. 20, Online, Available
    • Cisco Systems. (2007, Feb. 20). SAFE: IP telephony security in depth. [Online]. Available: http://www.cisco.com/warp/public/cc/so/cuso/epso/ sqfr/safip_wp.pdf.
    • (2007) SAFE: IP telephony security in depth
    • Systems, C.1
  • 28
    • 36249027910 scopus 로고    scopus 로고
    • Nortel Networks Secure telephony solution, Nortel Networks, San Ramon, CA, Rep. NN104820-071403, 2003.
    • Nortel Networks "Secure telephony solution," Nortel Networks, San Ramon, CA, Rep. NN104820-071403, 2003.
  • 29
    • 36249018180 scopus 로고    scopus 로고
    • Nortel Networks, Secure telephony solution appendices, Nortel Networks, San Ramon, CA, Rep. NN105080-071103, 2003.
    • Nortel Networks, "Secure telephony solution appendices," Nortel Networks, San Ramon, CA, Rep. NN105080-071103, 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.