A survey of VoIP intrusions and intrusion detection systems

This paper presents a survey of the security problems in VoIP networks, with an emphasis on both intrusions and intrusion detection methods. It examines the intrusion issues in different components of VoIP systems, points to the strengths and shortcomings in the existing intrusion detection methods and intrusion detection systems and suggests possible future research directions.

[1]  R. K. Bhattacharyya New challenges for telephone companies to secure switching systems , 1991, Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology.

[2]  Rolf Oppliger Security at the Internet Layer , 1998, Computer.

[3]  Jonathan Rosenberg The Real Time Transport Protocol (RTP) Denial of Service (Dos) Attack and its Prevention( , 2003 .

[4]  Arthur B. Maccabe,et al.  The architecture of a network level intrusion detection system , 1990 .

[5]  T. Dierks,et al.  The TLS protocol , 1999 .

[6]  Luca Veltri,et al.  SIP security issues: the SIP authentication procedure and its processing load , 2002 .

[7]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[8]  Paul D. Amer,et al.  SCTP in battlefield networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[9]  Baugher,et al.  The Secure Real-Time Transport Protocol , 2003 .

[10]  Mahbub Hassan,et al.  Internet telephony: services, technical challenges, and products , 2000, IEEE Commun. Mag..

[11]  Cullen Jennings,et al.  Example call flows using SIP security mechanisms , 2005 .

[12]  Zhongcheng Li,et al.  Survey on QoS management of VoIP , 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003..

[13]  B. Goode,et al.  Voice over Internet protocol (VoIP) , 2002, Proc. IEEE.

[14]  Christian Huitema,et al.  Megaco Protocol Version 1.0 , 2000, RFC.

[15]  G. Manimaran,et al.  Internet infrastructure security: a taxonomy , 2002, IEEE Netw..

[16]  Sami Knuutinen Session Initiation Protocol Security Considerations , 2003 .

[17]  Depei Qian,et al.  Multi-agent based intrusion detection architecture , 2001, Proceedings 2001 International Conference on Computer Networks and Mobile Computing.