메뉴 건너뛰기




Volumn 2, Issue 6, 2009, Pages 635-653

Misuse patterns in VoIP

Author keywords

Forensics; Network attacks; Patterns; Security; VoIP

Indexed keywords

DENIAL-OF-SERVICE ATTACK; DIGITAL FORENSICS; INTERNET TELEPHONY; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 74849101810     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.105     Document Type: Article
Times cited : (15)

References (43)
  • 1
  • 4
    • 84947618629 scopus 로고    scopus 로고
    • CERT Coordination Center, Carnegie Mellon University. 2007
    • CERT Coordination Center, Carnegie Mellon University. 2007. http://www.cert.org
  • 5
    • 84947611720 scopus 로고    scopus 로고
    • Symantec Corporation, Antivirus Research Center, 2008
    • Symantec Corporation, Antivirus Research Center, 2008. http://www.symantec.com
  • 7
    • 74849122857 scopus 로고    scopus 로고
    • [Accessed 10 June, 2007]
    • Collier M. 2004. The value of VoIP security. http://www. call-centermagazine.com/shared/printableArticle.jhtml?articleID= 22103933 [Accessed 10 June, 2007].
    • (2004) The Value of Voip Security
    • Collier, M.1
  • 8
    • 84947619090 scopus 로고    scopus 로고
    • The Communications Research Network (CRN)., February2006
    • The Communications Research Network (CRN). VoIP loop-holeaidsservicedeniers?February2006.http://www.ssi.org.br/ english/
    • Voip Loop-holeaidsservicedeniers?
  • 13
    • 73649140895 scopus 로고    scopus 로고
    • Security pat-terns for voice over IP networks
    • Also available at
    • Fernandez EB, Pelaez JC, Larrondo-Petrie MM. Security pat-terns for voice over IP networks. Journal of Software 2007; 2(2): 19-29. Also available at http://www.academypublisher. com/jsw
    • (2007) Journal of Software , vol.2 , Issue.2 , pp. 19-29
    • Fernandez, E.B.1    Pelaez, J.C.2    Larrondo-Petrie, M.M.3
  • 14
    • 24344492645 scopus 로고    scopus 로고
    • Department of Computer and Information Science, Polytechnic University: Brooklyn, NY
    • Shanmugasundaram K. ForNet: A Distributed Forensics Network. Department of Computer and Information Science, Polytechnic University: Brooklyn, NY, 2003.
    • (2003) Fornet: A Distributed Forensics Network
    • Shanmugasundaram, K.1
  • 19
    • 74849098352 scopus 로고    scopus 로고
    • [Accessed 18 June, 2007]
    • Pogar N. 2003. Data security in a converged network. http:// www.computerworld.com/printthis/2003/0,4814,83624,00.html [Accessed 18 June, 2007].
    • (2003) Data Security In a Converged Network
    • Pogar, N.1
  • 22
    • 74849100589 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Applying Forensic Techniques to Incident Response, August
    • National Institute of Standards and Technology. Guide to Computer and Network Data Analysis: Applying Forensic Techniques to Incident Response, August 2005.
    • (2005) Guide to Computer and Network Data Analysis
  • 24
    • 84947616286 scopus 로고    scopus 로고
    • Wikipedia, the free encyclopedia, [Accessed 17 June, 2007],
    • Wikipedia, the free encyclopedia. http://en.wikipedia.org/ wiki/Hepting vs. AT&T [Accessed 17 June, 2007].
  • 26
    • 84947616436 scopus 로고    scopus 로고
    • The International Engineering Consortium, [Accessed 16 May, 2007]
    • The International Engineering Consortium. Fraud analysis in IP and Next Generation Networks. http://www.iec.org/tutorials/ fraud analysis/ [Accessed 16 May, 2007].
    • Fraud Analysis In Ip and Next Generation Networks
  • 27
    • 84947616075 scopus 로고    scopus 로고
    • Arrests reveal vulnerability of Web phone service to fraud."
    • June 8
    • Searcey D, Young S. Arrests reveal vulnerability of Web phone service to fraud." The Wall Street Journal, June 8, 2006.
    • (2006) The Wall Street Journal
    • Searcey, D.1    Young, S.2
  • 28
  • 29
    • 79951732736 scopus 로고    scopus 로고
    • [Accessed 1 June, 2007]
    • Collier M. 2005. Basic vulnerability issues for SIP. http://voipsecurityblog.typepad.com/marks voip security blog/ 2007/03/index.html [Accessed 1 June, 2007].
    • (2005) Basic vulnerability issues for SIP
    • Collier, M.1
  • 30
    • 74849136023 scopus 로고    scopus 로고
    • Defense Information Systems Agency., Technical Implementation Guide, Version 2, Release 0. 30, December
    • Defense Information Systems Agency. IP Telephony & Voice over Internet protocol--Security Technical Implementation Guide, Version 2, Release 0. 30 December 2004.
    • (2004) Ip Telephony & Voice Over Internet Protocol--security
  • 31
    • 84947613916 scopus 로고    scopus 로고
    • [Accessed24May, 2007]
    • Thermos P. 2004. Two attacks against VoIP. http://www.securityfocus.com/infocus/1862 [Accessed24May, 2007].
    • (2004) Two Attacks Against Voip
    • Thermos, P.1
  • 32
    • 74849131946 scopus 로고    scopus 로고
    • The use of transport layer security (TLS) in the session initiation protocol (SIP). SIP WG Internet draft
    • February 26
    • Gurbani V, Jeffrey A. The use of transport layer security (TLS) in the session initiation protocol (SIP). SIP WG Internet draft, February 26, 2006.
    • (2006) SIP WG Internet draft
    • Gurbani, V.1    Jeffrey, A.2
  • 33
    • 73649140895 scopus 로고    scopus 로고
    • Security patterns for voice over IP networks
    • Also available at:
    • Fernandez EB, Pelaez JC, Larrondo-Petrie MM. Security patterns for voice over IP networks. Journal of Software 2007; 2(2): 19-29. Also available at: http://www.academypublisher.com/jsw
    • (2007) Journal of Software , vol.2 , Issue.2 , pp. 19-29
    • Fernandez, E.B.1    Pelaez, J.C.2    Larrondo-Petrie, M.M.3
  • 36
  • 37
    • 0028495490 scopus 로고
    • Requirements specification for process control systems
    • No. 9, September 1994, IEEE Computer Society Press, Los Alamitos, California, USA
    • Leveson NG, Heimdahl MPE, Hildreth H, Reese JD. Requirements specification for process control systems. IEEE Transactions on Software Engineering, Vol. 20, No. 9, September 1994, IEEE Computer Society Press, Los Alamitos, California, USA (1994) 684-707.
    • (1994) Ieee Transactions On Software Engineering , vol.20 , pp. 684-707
    • Leveson, N.G.1    Heimdahl, M.P.E.2    Hildreth, H.3    Reese, J.D.4
  • 39
    • 33947149035 scopus 로고    scopus 로고
    • An ontoilogy description for SIP security flaws
    • Geneiatakis D, Lambrinoudakis C. An ontoilogy description for SIP security flaws. Computer Communications 2007; 30(6): 1367-1374.
    • (2007) Computer Communications , vol.30 , Issue.6 , pp. 1367-1374
    • Geneiatakis, D.1    Lambrinoudakis, C.2
  • 40
    • 84947618207 scopus 로고    scopus 로고
    • Defense Personnel Security Research Center (PERSEREC). Employees Guide to Security Responsibilities, Version 1.0
    • Defense Personnel Security Research Center (PERSEREC). Employees Guide to Security Responsibilities, Version 1.0.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.