Vulnerability and VoIP Threats Survey in Broadband Networks

S. Reza Chogan(1*), Mostafa Heidarzadeh(2), Hassan Yeganeh(3), Hosein Mohammadi(4)

(1) Shahed University, Tehran, Iran, Islamic Republic of
(2) Shahed University, Tehran, Iran, Islamic Republic of
(3) Khajeh Nasir Toosi university of Tehran, Iran, Islamic Republic of
(4) Isfahan University, Isfahan, Iran, Islamic Republic of
(*) Corresponding author


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


VoIP services are a major area in the broadband networks for telecommunication domain. This technology includes positive and negative aspects as other new technologies. Nowadays, the telecom operators provide call waiting, call transfer, conference calling, caller ID and other VoIP services based on IMS solution. Thus, VoIP security is now one of the issues over which many debates take place. In this paper, we decide to concentrate on categories of vulnerability for VoIP services which is implemented by IMS solution in broadband networks. We try to present the common security threats and vulnerabilities of VoIP services. Identifying vulnerabilities, their classification and the risks which these services are threatened by, makes the ways to penetrate in the system to be clear and hence the administrators can solve the problems. The debate on this matter would be a misleading subject without having full recognition of various specifications. In addition, to clarify the importance of identifying these types of vulnerabilities, we classify the probability threats for VoIP.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Vulnerability; Classification; Threats; Security; VoIP

Full Text:

PDF


References


P. Mehta and S. Udani, “Overview of voice over IP”, Dept. Comput. Inf. Sci., Univ. Pennsylvania, Philadelphia, PA, Rep. MS-CIS-01-31,Feb. 2001. [2] Camarilo, G., García-Martín, M.A.: The 3G IP Multimedia Subsystem (IMS). John Wiley & Sons Ltd, 2006. [3] Jonathan Cumming, “Session Border Control in IMS”, Data Connection, 2005. [4] A. D. Keromytis. “Voice over IP: Risks, Threat and Vulnerabilities.” In Proceeding of Cyber Infrastructure Protection (CIP) conference, June 2009. [5] Seyd A.Ahson , Mohammad Ilyase, “Security Issues of VoIP, VoIP Handbook”,CRC Press ,Taylor & Francis Group, 2009. [6] Patrik Park, “Voice over IP security”, cisco press, 2009. [7] Peter Cox, “VoIP security management threat detection and control”, CEO UM labs Ltd, September 2009. [8] David Endler and Mark Collier, “Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions”, McGraw-Hill/Osborne, 2007. [9] Dorgham Sisalem,“SIP SECURITY”, A John Wiley and Sons Ltd, 2009. [10] James F. Ransome, CISM, CISSP, “VoIP security”, Elsevier Digital Press, 2005. [11] VoIP Security Alliance, “VoIP Security and Privacy Threat Taxonomy, version 1.0,” http://www.voipsa.org/Activities/taxonomy.php, October 2005. [12] Tan, Koon. "Phishing and Spamming via IM (SPIM)". Internet Storm Center. http://isc.sans.org/diary.php?storyid=1905. December 5, 2006. [13] A. Saika, R. El Kouch, M. M. Himmi, B. Raouyane, M. Bellafkih, “IP Multimedia Subsystem (IMS) Architecture And Management Function for MPLS-based QoS”, International Review on Computers and Software (IRECOS), Vol. 5 N. 6, pp. 706-711, November 2010. [14] G. Singh, A. Pal Singh Atwal, B. S. Sohi, “Application Controlled Mobile IP Handoff for 802.11 Wireless Networks”, International Review on Computers and Software (IRECOS), Vol. 2. n. 4, pp. 371 – 381, July 2007.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2020 Praise Worthy Prize