VoIP Honeypot Architecture

Document Type


Publication Date


Subject: LCSH

Web servers, Internet telephony, Computer network protocols, Intrusion detection systems (Computer security), Computer crimes, Computer security, Data privacy, Computer networks--Management, Media architecture


Computer Engineering | Computer Sciences | Electrical and Computer Engineering


Voice over IP (VoIP) or telephony services over Internet announces a new revolution in the telecommunication world tor its management simplicity and cost reduction. VoIP security extends the existent risk range of IP protocols and infrastructures and introduces new attacks as well. Threats identification and standardization, secure signaling and media architectures, as well as intrusion detection and prevention mechanisms are currently under debate in the research community. We propose in this article a SIP (Session Initiation Protocol) specific honeypot We describe its design and implementation. We detail the inference mechanism which classifies the received messages. We show how the model investigates about a received call and raises an appropriate conclusion.


Article is part of the conference proceedings, 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, 21-25 May 2007.

University of New Haven Community can access the full-text through our IEEE Xplore Electronic Library database.



Publisher Citation

M. Nassar, R. State and O. Festor, "VoIP Honeypot Architecture," 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, 2007, pp. 109-118, doi: 10.1109/INM.2007.374775.

Check your library