VoIP Malware: Attack Tool & Attack Scenarios
Author URLs
Document Type
Article
Publication Date
2009
Subject: LCSH
Internet telephony, Computer network protocols, Internet television, Telecommunication--Security measures
Disciplines
Computer Engineering | Computer Sciences | Electrical and Computer Engineering
Abstract
With the appearance of new Internet services like Voice over IP and IP television, malwares are in the way to update and extend their targets. In this paper, we discuss the emergence of a new generation of malwares attacking VoIP infrastructures and services. Such malwares constitute a real threat to the currently deployed VoIP architectures without strong security measures in place. We present one implemented environment that can be used to evaluate such attacks. Our "VoIP bots" support a wide set of attacks ranging from SPIT to DDoS and are tested against several VoIP platforms.
DOI
10.1109/ICC.2009.5199570
Repository Citation
Nassar, Mohamed; State, Radu; and Festor, Olivier, "VoIP Malware: Attack Tool & Attack Scenarios" (2009). Electrical & Computer Engineering and Computer Science Faculty Publications. 114.
https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/114
Publisher Citation
M. Nassar, R. State and O. Festor, "VoIP Malware: Attack Tool & Attack Scenarios," 2009 IEEE International Conference on Communications, 2009, pp. 1-6, doi: 10.1109/ICC.2009.5199570.
Comments
Article is part of the 2009 IEEE International Conference on Communications, Dresden, Germany, 14-18 June 2009.
University of New Haven Community can access the full-text through our IEEE Xplore Electronic Library database.