VoIP Honeypot Architecture
Author URLs
Document Type
Article
Publication Date
2007
Subject: LCSH
Web servers, Internet telephony, Computer network protocols, Intrusion detection systems (Computer security), Computer crimes, Computer security, Data privacy, Computer networks--Management, Media architecture
Disciplines
Computer Engineering | Computer Sciences | Electrical and Computer Engineering
Abstract
Voice over IP (VoIP) or telephony services over Internet announces a new revolution in the telecommunication world tor its management simplicity and cost reduction. VoIP security extends the existent risk range of IP protocols and infrastructures and introduces new attacks as well. Threats identification and standardization, secure signaling and media architectures, as well as intrusion detection and prevention mechanisms are currently under debate in the research community. We propose in this article a SIP (Session Initiation Protocol) specific honeypot We describe its design and implementation. We detail the inference mechanism which classifies the received messages. We show how the model investigates about a received call and raises an appropriate conclusion.
DOI
10.1109/INM.2007.374775
Repository Citation
Nassar, Mohamed; State, Radu; and Festor, Olivier, "VoIP Honeypot Architecture" (2007). Electrical & Computer Engineering and Computer Science Faculty Publications. 107.
https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/107
Publisher Citation
M. Nassar, R. State and O. Festor, "VoIP Honeypot Architecture," 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, 2007, pp. 109-118, doi: 10.1109/INM.2007.374775.
Comments
Article is part of the conference proceedings, 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, 21-25 May 2007.
University of New Haven Community can access the full-text through our IEEE Xplore Electronic Library database.