Assessing the risk of intercepting VoIP calls

被引:14
作者
Benini, M. [1 ]
Sicari, S. [1 ]
机构
[1] Univ Insubria, Dipartimento Informat & Comunicaz, IT-21100 Varese, Italy
关键词
VoIP security; risk assessment;
D O I
10.1016/j.comnet.2008.05.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Voice over-IP (VoIP) solutions and services for corporate telephony are usually marketed as 1 cost-free' and 'secure': this paper shows that both statements are false in general. Though being no doubt about the economical benefits resulting from the adoption of Voll? products instead of the standard telephony, hidden costs related to VolP services security arise whenever a company intends to assure the privacy of its phone conversations. This conclusion is extensively justified in the literature and this article aims at reasserting it by analysing the risk that a Voll? phone call may be intercepted when travelling across the Internet. The purpose of deriving a well-known conclusion consists in proving that a general and formal risk assessment method can be used in place of ad-hoc methods not only without losing the strength in the results but also adding up a sound mathematical and engineering foundation. (c) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:2432 / 2446
页数:15
相关论文
共 50 条
[1]  
Abdelnur H, 2006, VOIP MASE 06: 1ST IEEE WORKSHOP ON VOIP MANAGEMENT AND SECURITY, P29
[2]  
Alberts C., 2003, Introduction to the OCTAVE Approach
[3]  
[Anonymous], 1998, BOOK SECURE SYSTEM E, DOI DOI 10.1145/310889.310900
[4]  
[Anonymous], 2003, VOIP SERVICE QUALITY
[5]  
Bakry S. H., 2003, International Journal of Network Management, V13, P203, DOI 10.1002/nem.472
[6]  
Balzarotti D, 2006, ADV INFORM SECUR, P65
[7]   Voice over IPsec: Analysis and solutions [J].
Barbieri, R ;
Bruschi, D ;
Rosti, E .
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :261-270
[8]  
Barrantes Elena Gabriela, 2003, PROC CCS, P281
[9]   INFORMATION-SYSTEMS SECURITY DESIGN METHODS - IMPLICATIONS FOR INFORMATION-SYSTEMS DEVELOPMENT [J].
BASKERVILLE, R .
COMPUTING SURVEYS, 1993, 25 (04) :375-414
[10]  
BENINI M, 2007, P 1 NTMS INT C