Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research (SpringerBriefs in Computer Science)

Voice over IP (VoIP) and net Multimedia Subsystem applied sciences (IMS) are swiftly being followed by means of shoppers, organizations, governments and militaries. those applied sciences supply larger flexibility and extra good points than conventional telephony (PSTN) infrastructures, in addition to the potential of lower price via gear consolidation and, for the patron marketplace, new company types. despite the fact that, VoIP platforms additionally characterize a better complexity when it comes to structure, protocols and implementation, with a corresponding bring up within the capability for misuse.

In this publication, the authors research the present scenario on VoIP protection via a survey of 221 known/disclosed safeguard vulnerabilities in bug-tracking databases. We supplement this with a accomplished survey of the cutting-edge in VoIP safeguard learn that covers 245 papers. Juxtaposing our findings, we determine present components of probability and deficiencies in examine concentration. This e-book should still function a place to begin for realizing the threats and hazards in a swiftly evolving set of applied sciences which are seeing expanding deployment and use. an extra target is to achieve a greater realizing of the safety panorama with recognize to VoIP towards directing destiny examine during this and different comparable rising technologies.

Show description

Preview of Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research (SpringerBriefs in Computer Science) PDF

Similar Security books

Cyber War: The Next Threat to National Security and What to Do About It

Writer of the number one long island instances bestseller opposed to All Enemies, former presidential consultant and counter-terrorism specialist Richard A. Clarke sounds a well timed and chilling caution approximately America’s vulnerability in a terrifying new foreign conflict—Cyber struggle! each involved American may still learn this startling and explosive publication that provides an insider’s view of White condominium ‘Situation Room’ operations and contains the reader to the frontlines of our cyber safety.

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computing device safeguard book--fully accelerated and updated"Right now you carry on your hand some of the most profitable defense books ever written. instead of being a sideline player, leverage the dear insights Hacking uncovered 6 presents to aid your self, your organization, and your kingdom struggle cyber-crime.

Information Security: The Complete Reference, Second Edition

Enhance and enforce an efficient end-to-end safeguard software Today’s advanced international of cellular structures, cloud computing, and ubiquitous info entry places new protection calls for on each IT specialist. info safety: the full Reference, moment version (previously titled community safety: the total Reference) is the one finished booklet that provides vendor-neutral information on all facets of data defense, with an eye fixed towards the evolving danger panorama.

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

State-of-the-art recommendations for locating and solving severe protection flaws improve your community and dodge electronic disaster with confirmed ideas from a group of safety specialists. thoroughly up to date and that includes 12 new chapters, grey Hat Hacking: the moral Hacker's guide, Fourth version explains the enemy’s present guns, abilities, and strategies and provides field-tested treatments, case experiences, and ready-to-deploy trying out labs.

Extra info for Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research (SpringerBriefs in Computer Science)

Show sample text content

Sixty three ix Acronyms 3DES AES BER CBR COTS CSRF CVE DES DHCP DNS DoS DTLS EAP ECDH ECDSA FTP GSM IDS IETF IM IMS IPsec ITU NAT P2P PBX PKI PPPoE PSTN QoS Triple DES complex Encryption commonplace Bit mistakes cost consistent Bit fee advertisement Off-The-Shelf pass website Request Forgery; additionally XSRF universal Vulnerabilities and Exposures facts Encryption average Dynamic Host Configuration Protocol area identify process Denial of provider Datagram shipping Layer safeguard (protocol) Extensible Authentication Protocol Elliptic Curve Diffie Hellman Elliptic Curve electronic Signature set of rules dossier move Protocol worldwide approach for cellular Communications; initially Groupe Spcial cellular Intrusion Detection process net Engineering activity strength rapid Messaging net Multimedia Subsystem IP defense (protocol) foreign Telecommunications Union community tackle Translation Peer-to-Peer deepest department trade Public Key Infrastructure Point-to-Point Protocol over Ethernet Public Switched Telephony community caliber of provider xi xii RFC RTP S/MIME SDP SIP SMS SOHO SPIM SPIT SQL TCP TFTP TLS UDP UMA UMTS uPnP VBR VoIP VoIPSA XSS XSRF Acronyms Request For reviews actual Time Protocol Secure/Multipurpose net Mail Extensions consultation Description Protocol consultation Initiation Protocol brief Messaging carrier Small place of work domestic place of work unsolicited mail over rapid Messaging junk mail over web Telephony dependent question Language Transmission keep watch over Protocol Trivial dossier move Protocol delivery Layer safety (protocol) person Datagram Protocol Unlicensed cellular entry common cellular Telecommunications procedure common Plug-and-Play Variable Bit cost Voice over IP VoIP protection Alliance move website Scripting See CSRF Acronyms xiii summary Voice over IP (VoIP) and web Multimedia Subsystem applied sciences (IMS) are speedily being followed through shoppers, firms, governments and militaries. those applied sciences supply larger flexibility and extra positive aspects than conventional telephony (PSTN) infrastructures, in addition to the possibility of cheaper price via apparatus consolidation and, for the shopper industry, new company versions. although, VoIP structures additionally symbolize the next complexity when it comes to structure, protocols and implementation, with a corresponding elevate within the power for misuse. during this ebook, we learn the present situation on VoIP defense via a survey of 221 known/disclosed protection vulnerabilities in bug-tracking databases. We supplement this with a finished survey of the state-of-the-art in VoIP protection learn that covers 245 papers. Juxtaposing our findings, we establish present parts of threat and deficiencies in study concentration. This ebook may still function a kick off point for figuring out the threats and dangers in a quickly evolving set of applied sciences which are seeing expanding deployment and use. an extra aim is to realize a greater figuring out of the protection panorama with admire to VoIP towards directing destiny study during this and different comparable rising applied sciences.

Download PDF sample

Rated 4.34 of 5 – based on 31 votes