DocumentCode
1455481
Title
Voice-over-IP Security: Research and Practice
Author
Keromytis, Angelos D.
Author_Institution
Columbia Univ., New York, NY, USA
Volume
8
Issue
2
fYear
2010
Firstpage
76
Lastpage
78
Abstract
Consumers and enterprises alike are rapidly adopting voice-over-IP (VoIP) technologies, which offer higher flexibility and more features than traditional telephony infrastructures. They can also potentially lower costs through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent high complexity in terms of architecture, protocols, and implementation, with a corresponding increase in the potential for misuse. The author conducted survey of published vulnerabilities in the Common Vulnerabilities and Exposures (CVE) database and in two IETF RFC Internet drafts. These issues ranged from relatively straightforward problems that can lead to server or equipment crashes (denial of service [DoS]) to more serious problems that let adversaries eavesdrop on communications, remotely take over servers or handsets, impersonate users, avoid billing or charge another user (toll fraud), and so on.
Keywords
Internet telephony; security of data; VoIP security; communication eavesdropping; denial of service; equipment crash; published vulnerabilities; server crash; telephony infrastructure; user impersonation; voice-over-IP; Computer crashes; Computer crime; Costs; Databases; Internet telephony; Protocols; Security; Telephone sets; Web server; SPIT; VoIP; security; spam over Internet telephony; survey; voice over IP; vulnerabilities;
fLanguage
English
Journal_Title
Security & Privacy, IEEE
Publisher
ieee
ISSN
1540-7993
Type
jour
DOI
10.1109/MSP.2010.87
Filename
5439534
Link To Document