IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 6 - Issue 1, January 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Collective Study On Security Threats In VOIP Networks

[Full Text]

 

AUTHOR(S)

Muhammad Zulkifl Hasan, Muhammad Zunnurain Hussain

 

KEYWORDS

(Voice over internet protocol VOIP), Session Initiation protocol (SIP), Real Time Transport Protocol(RTP ), Media Gateway control protocol (MGCP), Internet Engineering Task Force (IETF), user datagram protocols (UDP), Multipoint Control Units(MCUs),

 

ABSTRACT

The Collective study will critically evaluate the voice over internet protocol (VOIP) Security threats, issues & challenges in the communication over the network, the solution provided by different vendors. Authors will be discussing all security issues, different protocols but main focus will be on SIP protocol its implementation and vendors VOIP security system.

 

REFERENCES

[1] Jayaprakash, M., Tamilarasi, A. & Gopikrishnan, S. (2012) 'QoS management in VoIP security using stream cipher', European Journal of Scientific Research, 87 (1), pp.127-136.

[2] Butcher, D., Li, X. & Guo, J. (2007) 'Security challenge and defense in VoIP infrastructures', Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 37 (6), pp.1152-1162.

[3] Keromytis, A.D. (2011) 'A comprehensive survey of voice over IP security research', Communications Surveys & Tutorials, IEEE, 14 (2), pp.514-537.

[4] Zhang, R., Wang, X., Farley, R., Yang, X. & Jiang, X. (2009) "On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers", Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia New York, NY, USA: ACM. p61-69.

[5] Radman, P., Singh, J., Domingo, M., Arnedo, J. & Talevski, A. (2010) "VoIP: Making secure calls and maintaining high call quality", Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, Paris, France New York, NY, USA: ACM. p56-62.

[6] Kuhn, D.R., Walsh, T.J. & Fries, S. (2005) 'Security considerations for voice over IP systems', NIST Special Publication, pp.800-858.

[7] Soares, V., Neves, P. & Rodrigues, J. (2008) "Past, present and future of IP telephony", Communication Theory, Reliability, and Quality of Service, 2008. CTRQ'08. International Conference on, IEEE. p19-24.

[8] Lina, X., Xiuhua, T., Changyun, M. & Zhigang, W. (2010) "The design of enterprise VoIP MGC based on MGCP protocol", Networking and Digital Society (ICNDS), 2010 2nd International Conference on, IEEE. p526-529.

[9] Callegari, C., Garroppo, R.G., Giordano, S., Pagano, M. & Russo, F. (2009) "A novel method for detecting attacks towards the SIP protocol", Performance Evaluation of Computer & Telecommunication Systems, 2009. SPECTS 2009. International Symposium on, IEEE. p268-273.

[10] Shan, L. & Jiang, N. (2009) "Research on security mechanisms of SIP-based VoIP system", Hybrid Intelligent Systems, 2009. HIS'09. Ninth International Conference on, IEEE. p408-410.

[11] Pérez-Botero, D. & Donoso, Y. (2011) "VoIP eavesdropping: A comprehensive evaluation of cryptographic countermeasures", Networking and Distributed Computing (ICNDC), 2011 Second International Conference on, IEEE. p192-196.