Security challenge and Defense in VoIP infrastructures

被引:46
作者
Butcher, David [1 ]
Li, Xiangyang
Guo, Jinhua
机构
[1] Tumbleweed Commun Corp, Ann Arbor, MI 48108 USA
[2] Univ Michigan, Dept Ind & Mfg Syst Engn, Dearborn, MI 48128 USA
[3] Univ Michigan, Dept Comp & Informat Sci, Dearborn, MI 48128 USA
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS | 2007年 / 37卷 / 06期
关键词
computer attacks; network security; voice over Internet Protocol (VoIP);
D O I
10.1109/TSMCC.2007.905853
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Voice over Internet Protocol (VoIP) has become a popular alternative to traditional public-switched telephone network (PSTN) networks that provides advantages of low cost and flexible advanced "digital" features. The flexibility of the VoIP system and the convergence of voice and data networks brings with it additional security risks. These are in addition to the common security concerns faced by the underlying IP data network facilities that a VoIP system relies on. The result being that the VoIP network further complicates the security assurance mission faced by enterprises employing this technology. It is time to document various security issues that a VoIP infrastructure may face and analyze the challenges and solutions that may guide future research and development efforts. In this paper, we examine and investigate the concerns and requirements of VoIP security. After a thorough review of security issues and defense mechanisms, we focus on attacks and countermeasures unique to VoIP systems that are essential for current and future VoIP implantations. Then, we analyze two popular industry best practices for securing VoIP networks and conclude this paper with further discussion on future research directions. This paper aims to direct future research efforts and to offer helpful guidelines for practitioners.
引用
收藏
页码:1152 / 1162
页数:11
相关论文
共 29 条
[1]  
[Anonymous], 2 WORKSH SEC VOIC IP
[2]  
[Anonymous], 2000, 9915 CHALM U DEP COM
[3]  
BACE RG, 1999, INTRUSION DETECTION
[4]  
BARTLOMIEJCZYK M, 2007, PREVENTING LAYER 2 S
[5]  
Bishop M., 2003, Computer security: art and science
[6]  
*CISC SYST, 2007, SEC SIP BAS NETW
[7]  
*CISC SYST, 2007, SEC INT TEL MED SRTP
[8]  
*CISC SYST, 2007, SAFE IP TEL SEC DEPT
[9]  
Coffman J. E., 2004, ACM Queue, V2, P40, DOI 10.1145/1028893.1028896
[10]  
COLLIER M, 2007, VOIP VULNERBABILITIE