• DocumentCode
    1455481
  • Title

    Voice-over-IP Security: Research and Practice

  • Author

    Keromytis, Angelos D.

  • Author_Institution
    Columbia Univ., New York, NY, USA
  • Volume
    8
  • Issue
    2
  • fYear
    2010
  • Firstpage
    76
  • Lastpage
    78
  • Abstract
    Consumers and enterprises alike are rapidly adopting voice-over-IP (VoIP) technologies, which offer higher flexibility and more features than traditional telephony infrastructures. They can also potentially lower costs through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent high complexity in terms of architecture, protocols, and implementation, with a corresponding increase in the potential for misuse. The author conducted survey of published vulnerabilities in the Common Vulnerabilities and Exposures (CVE) database and in two IETF RFC Internet drafts. These issues ranged from relatively straightforward problems that can lead to server or equipment crashes (denial of service [DoS]) to more serious problems that let adversaries eavesdrop on communications, remotely take over servers or handsets, impersonate users, avoid billing or charge another user (toll fraud), and so on.
  • Keywords
    Internet telephony; security of data; VoIP security; communication eavesdropping; denial of service; equipment crash; published vulnerabilities; server crash; telephony infrastructure; user impersonation; voice-over-IP; Computer crashes; Computer crime; Costs; Databases; Internet telephony; Protocols; Security; Telephone sets; Web server; SPIT; VoIP; security; spam over Internet telephony; survey; voice over IP; vulnerabilities;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSP.2010.87
  • Filename
    5439534