VoIP Malware: Attack Tool & Attack Scenarios

Document Type


Publication Date


Subject: LCSH

Internet telephony, Computer network protocols, Internet television, Telecommunication--Security measures


Computer Engineering | Computer Sciences | Electrical and Computer Engineering


With the appearance of new Internet services like Voice over IP and IP television, malwares are in the way to update and extend their targets. In this paper, we discuss the emergence of a new generation of malwares attacking VoIP infrastructures and services. Such malwares constitute a real threat to the currently deployed VoIP architectures without strong security measures in place. We present one implemented environment that can be used to evaluate such attacks. Our "VoIP bots" support a wide set of attacks ranging from SPIT to DDoS and are tested against several VoIP platforms.


Article is part of the 2009 IEEE International Conference on Communications, Dresden, Germany, 14-18 June 2009.

University of New Haven Community can access the full-text through our IEEE Xplore Electronic Library database.



Publisher Citation

M. Nassar, R. State and O. Festor, "VoIP Malware: Attack Tool & Attack Scenarios," 2009 IEEE International Conference on Communications, 2009, pp. 1-6, doi: 10.1109/ICC.2009.5199570.

Check your library