메뉴 건너뛰기




Volumn 52, Issue 12, 2008, Pages 2432-2446

Assessing the risk of intercepting VoIP calls

Author keywords

Risk assessment; VoIP security

Indexed keywords

COMPUTER NETWORKS; FORMAL METHODS; INFORMATION TECHNOLOGY; INTERNET PROTOCOLS; INTERNET TELEPHONY; RISK ASSESSMENT; RISK MANAGEMENT; RISKS; SAFETY ENGINEERING; STANDARDS; TECHNOLOGY; TELECOMMUNICATION SYSTEMS; TELEPHONE SETS; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 46449103169     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2008.05.001     Document Type: Article
Times cited : (21)

References (51)
  • 1
    • 46449137421 scopus 로고    scopus 로고
    • S. Garfinkel, VoIP and Skype security, March 2005. URL .
    • S. Garfinkel, VoIP and Skype security, March 2005. URL .
  • 2
    • 0036980250 scopus 로고    scopus 로고
    • A. Godber, P. Dasgupta, Secure wireless gateway, in: Proceedings of the Third ACM Workshop on Wireless Security, ACM Press, New York, NY, USA, 2002, pp. 41-46.
    • A. Godber, P. Dasgupta, Secure wireless gateway, in: Proceedings of the Third ACM Workshop on Wireless Security, ACM Press, New York, NY, USA, 2002, pp. 41-46.
  • 3
    • 18744376889 scopus 로고    scopus 로고
    • E. Barrantes, D. Ackley, T. Palmer, D. Stefanovic, D.D. Zovi, Randomized instruction set emulation to disrupt binary code injection attacks, in: Proceedings of the 10th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, USA, 2003, pp. 281-289.
    • E. Barrantes, D. Ackley, T. Palmer, D. Stefanovic, D.D. Zovi, Randomized instruction set emulation to disrupt binary code injection attacks, in: Proceedings of the 10th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, USA, 2003, pp. 281-289.
  • 4
    • 0036570725 scopus 로고    scopus 로고
    • Identifying enterprise network vulnerabilities
    • Myerson J. Identifying enterprise network vulnerabilities. International Journal of Network Management 12 3 (2002) 135-144
    • (2002) International Journal of Network Management , vol.12 , Issue.3 , pp. 135-144
    • Myerson, J.1
  • 5
    • 20844455974 scopus 로고    scopus 로고
    • Challenges in securing voice over IP
    • Walsh T., and Kuhn D. Challenges in securing voice over IP. IEEE Security and Privacy 3 3 (2005) 44-49
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 44-49
    • Walsh, T.1    Kuhn, D.2
  • 7
    • 30344452580 scopus 로고    scopus 로고
    • Security, wiretapping, and the internet
    • Landau S. Security, wiretapping, and the internet. IEEE Security and Privacy 3 6 (2005) 26-33
    • (2005) IEEE Security and Privacy , vol.3 , Issue.6 , pp. 26-33
    • Landau, S.1
  • 8
    • 46449113708 scopus 로고    scopus 로고
    • K. Fiveash, VoIP - open season for hackers, November 2006. URL .
    • K. Fiveash, VoIP - open season for hackers, November 2006. URL .
  • 9
    • 46449092597 scopus 로고    scopus 로고
    • Inchiesta Telecom, altri due arresti, Corriere della Sera, January 2007. URL .
    • Inchiesta Telecom, altri due arresti, Corriere della Sera, January 2007. URL .
  • 10
    • 46449118703 scopus 로고    scopus 로고
    • E. Galli Della Loggia, L'Idra italiana, Corriere della Sera, September 2006. URL .
    • E. Galli Della Loggia, L'Idra italiana, Corriere della Sera, September 2006. URL .
  • 11
    • 46449120484 scopus 로고    scopus 로고
    • M. Benini, S. Sicari, Risk assessment: intercepting VoIP calls, in: Proceedings of the VIPSI-2007 Venice Conference, International Conferences on Advances in the Internet, Processing, Systems, and Interdisciplinary Research, Venice, Italy, 2007, pp. 1-10.
    • M. Benini, S. Sicari, Risk assessment: intercepting VoIP calls, in: Proceedings of the VIPSI-2007 Venice Conference, International Conferences on Advances in the Internet, Processing, Systems, and Interdisciplinary Research, Venice, Italy, 2007, pp. 1-10.
  • 12
    • 84882663975 scopus 로고    scopus 로고
    • D. Balzarotti, M. Monga, S. Sicari, Assessing the risk of using vulnerable components, in: D. Gollmann, F. Massacci, A. Yautsiukhin (Eds.), Quality of Protection - Security Measurements and Metrics, vol. 23 of Advances in Information Security, Springer, New York, NY, USA, 2006, pp. 65-78.
    • D. Balzarotti, M. Monga, S. Sicari, Assessing the risk of using vulnerable components, in: D. Gollmann, F. Massacci, A. Yautsiukhin (Eds.), Quality of Protection - Security Measurements and Metrics, vol. 23 of Advances in Information Security, Springer, New York, NY, USA, 2006, pp. 65-78.
  • 13
    • 0037809645 scopus 로고    scopus 로고
    • Development of security policies for private networks
    • Bakry S. Development of security policies for private networks. International Journal of Network Management 13 3 (2003) 203-210
    • (2003) International Journal of Network Management , vol.13 , Issue.3 , pp. 203-210
    • Bakry, S.1
  • 15
    • 50849089642 scopus 로고    scopus 로고
    • M. Benini, S. Sicari, A mathematical framework for risk assessment, in: Proceedings of the First NTMS International Conference, 2007.
    • M. Benini, S. Sicari, A mathematical framework for risk assessment, in: Proceedings of the First NTMS International Conference, 2007.
  • 17
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees
    • Schneier B. Attack trees. Dr. Dobb's Journal 24 12 (1999) 21-29
    • (1999) Dr. Dobb's Journal , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 18
    • 46449093213 scopus 로고    scopus 로고
    • J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, E. Schooler, RFC 3261: SIP: Session initiation protocol, Junuary 2002. URL .
    • J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, E. Schooler, RFC 3261: SIP: Session initiation protocol, Junuary 2002. URL .
  • 19
    • 46449105332 scopus 로고    scopus 로고
    • J. Postel, RFC 791: Internet protocol, September 1981. URL .
    • J. Postel, RFC 791: Internet protocol, September 1981. URL .
  • 21
    • 46449130752 scopus 로고    scopus 로고
    • P. Mehta, S. Udani, Overview of voice over IP, Technical report MS-CIS-01-31, Department of Computer and Information Science, University of Pennsylvania, February 2001.
    • P. Mehta, S. Udani, Overview of voice over IP, Technical report MS-CIS-01-31, Department of Computer and Information Science, University of Pennsylvania, February 2001.
  • 22
    • 0242510134 scopus 로고    scopus 로고
    • Voice over internet protocol (VoIP)
    • Goode B. Voice over internet protocol (VoIP). Proceedings of the IEEE 90 9 (2002) 1495-1517
    • (2002) Proceedings of the IEEE , vol.90 , Issue.9 , pp. 1495-1517
    • Goode, B.1
  • 23
    • 33745698097 scopus 로고    scopus 로고
    • Assessed quality of service and voice and data integration: a case study
    • La Corte A., and Sicari S. Assessed quality of service and voice and data integration: a case study. Computer Communications 29 11 (2006) 1992-2003
    • (2006) Computer Communications , vol.29 , Issue.11 , pp. 1992-2003
    • La Corte, A.1    Sicari, S.2
  • 26
    • 46449121713 scopus 로고    scopus 로고
    • D. Kuhn, T. Walsh, S. Fries, Security considerations of voice over IP Systems, National Institute of Standards and Technology (NIST), Gaithersburs, MD, USA, Computer Security Division, Special Publication 800-58, January 2005.
    • D. Kuhn, T. Walsh, S. Fries, Security considerations of voice over IP Systems, National Institute of Standards and Technology (NIST), Gaithersburs, MD, USA, Computer Security Division, Special Publication 800-58, January 2005.
  • 27
    • 46449098423 scopus 로고    scopus 로고
    • The voice over IP security alliance. URL .
    • The voice over IP security alliance. URL .
  • 28
    • 46449095013 scopus 로고    scopus 로고
    • M. Tanase, Voice over IP security, Security Focus (Mar. 2004). URL .
    • M. Tanase, Voice over IP security, Security Focus (Mar. 2004). URL .
  • 29
    • 84948961076 scopus 로고    scopus 로고
    • R. Barbieri, D. Bruschi, E. Rosti, Voice over IPSec: Analysis and solutions, in: Proceedings of the 18th Annual Computer Security Applications Conference, IEEE Computer Society, Washington, DC, USA, 2002, pp. 261-270.
    • R. Barbieri, D. Bruschi, E. Rosti, Voice over IPSec: Analysis and solutions, in: Proceedings of the 18th Annual Computer Security Applications Conference, IEEE Computer Society, Washington, DC, USA, 2002, pp. 261-270.
  • 30
    • 46449138822 scopus 로고    scopus 로고
    • J. Halpern, IP Telephony Security in Depth, Cisco Systems Inc., White paper, 2002.
    • J. Halpern, IP Telephony Security in Depth, Cisco Systems Inc., White paper, 2002.
  • 31
    • 46449131276 scopus 로고    scopus 로고
    • M. Marjalaakso, Security requirements and constraints of VoIP, Tech. Rep., Department of Electrical Engineering and Telecommunications, Helsinki University of Technology, 2000. URL .
    • M. Marjalaakso, Security requirements and constraints of VoIP, Tech. Rep., Department of Electrical Engineering and Telecommunications, Helsinki University of Technology, 2000. URL .
  • 32
    • 46449110999 scopus 로고    scopus 로고
    • J. Larson, T. Dawson, M. Evans, J. Straley, Defending VoIP networks from distributed DoS (DDoS) attacks, in: Proceedings of the Voice over IP Workshop, IEEE Global Telecommunications Conference, 2004.
    • J. Larson, T. Dawson, M. Evans, J. Straley, Defending VoIP networks from distributed DoS (DDoS) attacks, in: Proceedings of the Voice over IP Workshop, IEEE Global Telecommunications Conference, 2004.
  • 33
    • 33751027241 scopus 로고    scopus 로고
    • W. Rippon, Threat assessment of IP based voice systems., in: Proceedings of the 1st IEEE Workshop on VoIP Management and Security, Vancouver, Canada, 2006, pp. 19-28.
    • W. Rippon, Threat assessment of IP based voice systems., in: Proceedings of the 1st IEEE Workshop on VoIP Management and Security, Vancouver, Canada, 2006, pp. 19-28.
  • 34
    • 46449087726 scopus 로고    scopus 로고
    • P. Hochmuth, T. Greene, Firewall limits vex VoIP users, Network World, July 2002. URL .
    • P. Hochmuth, T. Greene, Firewall limits vex VoIP users, Network World, July 2002. URL .
  • 35
    • 33745773302 scopus 로고    scopus 로고
    • X. Wang, S. Chen, S. Jajodia, Tracking anonymous peer-to-peer VoIP calls on the Internet, in: Proceedings of the 12th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, USA, 2005, pp. 81-91.
    • X. Wang, S. Chen, S. Jajodia, Tracking anonymous peer-to-peer VoIP calls on the Internet, in: Proceedings of the 12th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, USA, 2005, pp. 81-91.
  • 36
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS problems
    • Peng T., Leckie C., and Ramamohanarao K. Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys 39 1 (2007) 1-42
    • (2007) ACM Computing Surveys , vol.39 , Issue.1 , pp. 1-42
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 37
    • 0027804413 scopus 로고
    • Information system security design methods: implications for information systems development
    • Baskerville R. Information system security design methods: implications for information systems development. ACM Computing Survey 25 4 (1993) 375-412
    • (1993) ACM Computing Survey , vol.25 , Issue.4 , pp. 375-412
    • Baskerville, R.1
  • 38
    • 85020200328 scopus 로고    scopus 로고
    • C. Salter, O. Saydjari, B. Schneier, J. Wallner, Toward a secure system engineering methodology, in: Proceedings of the 1998 Workshop on New Security Paradigms, ACM Press, New York, NY, USA, 1998, pp. 2-10.
    • C. Salter, O. Saydjari, B. Schneier, J. Wallner, Toward a secure system engineering methodology, in: Proceedings of the 1998 Workshop on New Security Paradigms, ACM Press, New York, NY, USA, 1998, pp. 2-10.
  • 39
    • 33751059308 scopus 로고    scopus 로고
    • H. Abdelnur, V. Cridlig, R. State, O. Festor, VoIP security assessment: Method and tools, in: Proceedings of the 1st IEEE Workshop on VoIP Management and Security, Vancouver, Canada, 2006, pp. 29-34.
    • H. Abdelnur, V. Cridlig, R. State, O. Festor, VoIP security assessment: Method and tools, in: Proceedings of the 1st IEEE Workshop on VoIP Management and Security, Vancouver, Canada, 2006, pp. 29-34.
  • 40
    • 46449116576 scopus 로고    scopus 로고
    • H.Schulzrinne, S. Casner, R. Frederick, V. Jacobson, RFC 3550: RTP: A transport protocol for real-time applications, July 2003. URL .
    • H.Schulzrinne, S. Casner, R. Frederick, V. Jacobson, RFC 3550: RTP: A transport protocol for real-time applications, July 2003. URL .
  • 41
    • 85029618768 scopus 로고    scopus 로고
    • I. Moskowitz, M. Kang, An insecurity flow model, in: Proceedings of the 1997 Workshop on New Security Paradigms, ACM Press, New York, NY, USA, 1997, pp. 61-74.
    • I. Moskowitz, M. Kang, An insecurity flow model, in: Proceedings of the 1997 Workshop on New Security Paradigms, ACM Press, New York, NY, USA, 1997, pp. 61-74.
  • 42
    • 46449129240 scopus 로고    scopus 로고
    • C. Alberts, A. Dorofee, J. Stevens, C. Woody, Introduction to the Octave approach, October 2003. URL .
    • C. Alberts, A. Dorofee, J. Stevens, C. Woody, Introduction to the Octave approach, October 2003. URL .
  • 43
    • 46449117203 scopus 로고    scopus 로고
    • B. Jenkins, Risk analysis helps establish a good security posture; risk management keeps it that way. White Paper, 1998. URL .
    • B. Jenkins, Risk analysis helps establish a good security posture; risk management keeps it that way. White Paper, 1998. URL .
  • 44
    • 46449101405 scopus 로고    scopus 로고
    • T. Siu, Risk-eye for the IT security guy, February 2004. URL .
    • T. Siu, Risk-eye for the IT security guy, February 2004. URL .
  • 45
    • 1142292428 scopus 로고    scopus 로고
    • G. Sharp, P. Enslow, S. Navathe, F. Farahmand, Managing vulnerabilities of information system to security incidents, in: Proceedings of the 5th International Conference on Electronic Commerce, ACM Press, New York, NY, USA, 2003, pp. 348-354.
    • G. Sharp, P. Enslow, S. Navathe, F. Farahmand, Managing vulnerabilities of information system to security incidents, in: Proceedings of the 5th International Conference on Electronic Commerce, ACM Press, New York, NY, USA, 2003, pp. 348-354.
  • 46
    • 0035505967 scopus 로고    scopus 로고
    • Making decisions: Bayesian nets and MCDA
    • Fenton N., and Neil M. Making decisions: Bayesian nets and MCDA. Knowledge-Based Systems 14 7 (2001) 307-325
    • (2001) Knowledge-Based Systems , vol.14 , Issue.7 , pp. 307-325
    • Fenton, N.1    Neil, M.2
  • 48
    • 57049132856 scopus 로고    scopus 로고
    • Y. Stamatiou, E. Skipenes, E. Henriksen, N. Stathiakis, A. Sikianakis, E. Charalambous, N. Antonakis, K. Stølen, F. den Braber, M. Soldal Lund, K. Papadaki, G. Valvis, The CORAS approach for model-based risk management applied to a telemedicine service, in: Proceedings of Medical Informatics Europe, IOS Press, 2003, pp. 206-211.
    • Y. Stamatiou, E. Skipenes, E. Henriksen, N. Stathiakis, A. Sikianakis, E. Charalambous, N. Antonakis, K. Stølen, F. den Braber, M. Soldal Lund, K. Papadaki, G. Valvis, The CORAS approach for model-based risk management applied to a telemedicine service, in: Proceedings of Medical Informatics Europe, IOS Press, 2003, pp. 206-211.
  • 49
    • 4143082542 scopus 로고    scopus 로고
    • N. Stathiakis, C. Chronaki, E. Skipenes, E. Henriksen, E. Charalambous, A. Sykianakis, G. Vrouchos, N. Antonakis, M. Tsiknakis, S. Orphanoudakis, Risk assessment of a cardiology eHealth service in HYGEIAnet, in: Proceedings of Computers in Cardiology, IEEE, 2003, pp. 201-204.
    • N. Stathiakis, C. Chronaki, E. Skipenes, E. Henriksen, E. Charalambous, A. Sykianakis, G. Vrouchos, N. Antonakis, M. Tsiknakis, S. Orphanoudakis, Risk assessment of a cardiology eHealth service in HYGEIAnet, in: Proceedings of Computers in Cardiology, IEEE, 2003, pp. 201-204.
  • 50
    • 78651584520 scopus 로고    scopus 로고
    • G. Biswas, K. Debelak, K. Kawamura, Application of qualitative modelling to knowledge-based risk assessment studies, in: Second International Conference on Industrial Engineering Applications of Artificial Intelligence Expert Systems, ACM Press, New York, NY, USA, 1989, pp. 92-101.
    • G. Biswas, K. Debelak, K. Kawamura, Application of qualitative modelling to knowledge-based risk assessment studies, in: Second International Conference on Industrial Engineering Applications of Artificial Intelligence Expert Systems, ACM Press, New York, NY, USA, 1989, pp. 92-101.
  • 51
    • 20844461569 scopus 로고    scopus 로고
    • Security meter: a practical decision-tree model to quantify risk
    • Sahinoglu M. Security meter: a practical decision-tree model to quantify risk. IEEE Security and Privacy 3 3 (2005) 18-24
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 18-24
    • Sahinoglu, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.