VoIP Malware: Attack Tool & Attack Scenarios

Document Type

Article

Publication Date

2009

Subject: LCSH

Internet telephony, Computer network protocols, Internet television, Telecommunication--Security measures

Disciplines

Computer Engineering | Computer Sciences | Electrical and Computer Engineering

Abstract

With the appearance of new Internet services like Voice over IP and IP television, malwares are in the way to update and extend their targets. In this paper, we discuss the emergence of a new generation of malwares attacking VoIP infrastructures and services. Such malwares constitute a real threat to the currently deployed VoIP architectures without strong security measures in place. We present one implemented environment that can be used to evaluate such attacks. Our "VoIP bots" support a wide set of attacks ranging from SPIT to DDoS and are tested against several VoIP platforms.

Comments

Article is part of the 2009 IEEE International Conference on Communications, Dresden, Germany, 14-18 June 2009.

University of New Haven Community can access the full-text through our IEEE Xplore Electronic Library database.

DOI

10.1109/ICC.2009.5199570

Publisher Citation

M. Nassar, R. State and O. Festor, "VoIP Malware: Attack Tool & Attack Scenarios," 2009 IEEE International Conference on Communications, 2009, pp. 1-6, doi: 10.1109/ICC.2009.5199570.

Check your library

Share

COinS