VoIP Honeypot Architecture

Document Type

Article

Publication Date

2007

Subject: LCSH

Web servers, Internet telephony, Computer network protocols, Intrusion detection systems (Computer security), Computer crimes, Computer security, Data privacy, Computer networks--Management, Media architecture

Disciplines

Computer Engineering | Computer Sciences | Electrical and Computer Engineering

Abstract

Voice over IP (VoIP) or telephony services over Internet announces a new revolution in the telecommunication world tor its management simplicity and cost reduction. VoIP security extends the existent risk range of IP protocols and infrastructures and introduces new attacks as well. Threats identification and standardization, secure signaling and media architectures, as well as intrusion detection and prevention mechanisms are currently under debate in the research community. We propose in this article a SIP (Session Initiation Protocol) specific honeypot We describe its design and implementation. We detail the inference mechanism which classifies the received messages. We show how the model investigates about a received call and raises an appropriate conclusion.

Comments

Article is part of the conference proceedings, 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, 21-25 May 2007.

University of New Haven Community can access the full-text through our IEEE Xplore Electronic Library database.

DOI

10.1109/INM.2007.374775

Publisher Citation

M. Nassar, R. State and O. Festor, "VoIP Honeypot Architecture," 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, 2007, pp. 109-118, doi: 10.1109/INM.2007.374775.

Check your library

Share

COinS