VOIP SECURITY: A PERFORMANCE AND COST-BENEFIT ANALYSIS

被引:0
作者
Perigo, Levi [1 ]
Gandotra, Rahil [2 ]
Gedia, Dewang [2 ]
Hussain, Moiz [2 ]
Gupta, Praniti [2 ]
Bano, Shirin [2 ]
Kulkarni, Vineet [2 ]
机构
[1] Univ Colorado, Dept Comp Sci, Boulder, CO 80309 USA
[2] Univ Colorado, Interdisciplinary Telecom Program, Boulder, CO 80309 USA
来源
INFORMATION TECHNOLOGY IN INDUSTRY | 2020年 / 8卷 / 02期
关键词
IPv4/IPv6; VoIP; security; performance; cost-benefit analysis;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Voice over IP (VoIP) has become the standard technology for telephony and has replaced the old Public Switched Telephone Network (PSTN). This research focuses on the security aspect of VoIP systems. Unsecured VoIP systems are vulnerable to malicious attacks. However, the overhead of the security techniques hampers the performance of VoIP systems. This research analyzes how a VoIP system performs with different security techniques. The performance of the VoIP system is analyzed on different types of data networks such as IPv4, IPv6, and IPv4/IPv6 mixed networks, and in scenarios such as with and without network traffic. Additionally, the research includes a cost-benefit analysis of the security techniques, to determine their cost effectiveness. Based on the performance analysis and cost-benefit analysis, this research proposes three security techniques that can be applied to VoIP systems deployed on IPv4, IPv6, and IPv4/IPv6 networks.
引用
收藏
页码:34 / 42
页数:9
相关论文
共 22 条
[1]  
Ahmed Hussam Alddin S., 2014, International Journal of Digital Content Technology and its Applications, V8, P40
[2]  
Alexander AL, 2009, NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, P95, DOI 10.1109/NSS.2009.90
[3]  
[Anonymous], 2014, TESTING VOICE IP VOI
[4]  
Ashraf M.T., INVESTIGATION EFFECT
[5]   Voice over IPsec: Analysis and solutions [J].
Barbieri, R ;
Bruschi, D ;
Rosti, E .
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :261-270
[6]   Security challenge and Defense in VoIP infrastructures [J].
Butcher, David ;
Li, Xiangyang ;
Guo, Jinhua .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2007, 37 (06) :1152-1162
[7]  
Coulibaly E, 2010, COMP ENG TECHN ICCET, V3, DOI 10.1109/ICCET.2010.5485790.
[8]  
Critelli A., 2014, HACKING VOIP DECRYPT
[9]  
Desantis M., 2006, UNDERSTANDING VOICE
[10]  
Gedia D, 2018, INF TECHNOL IND, V6, P1