VoIP Security Threats
Author(s): POPESCU, Eliza-Elena
Author(s) keywords: communication, cybersecurity, real-time, risks, VoIP
Reference keywords: cyber threats, data security, voip
Abstract:
Nowadays, communication is based on a wide variety of solutions, especially using the real-time ones. People use a lot of online tools that offer them audio-video solutions, and the most important thing is that anyone has access to them, and there are easy to use. VoIP (Voice over IP) is one of the most used solutions today, with which everyone can make calls over the internet. Like any other service that is exposed to the internet, it presents risks for the data violation and administrators or any people that use this service, needs to secure the system.
References:
[1]. Johann Thalhammer, “Security in VoIP-Telephony Systems,” Masters Thesis, 2002.
[2]. Himanshu Dwivedi,“Hacking VoIP: Protocols, Attacks, and Countermeasures,” 2009.
[3]. Peter Thermos and Ari Takanen, “Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures,” 2007.
[4]. Miroslav Vozňák, Filip Rezac, “SIP threats detection system,” 2010.
[5]. Şevki Gani Şanlıöz, Muhammed Sadık Karabay, Aytuğ Boyacı, “Penetration testing for VoIP,” 2021.
[6]. E.Y. Chen, ”Detecting DoS attacks on SIP systems,“ 2006.
Article Title: VoIP Security Threats
Author(s): POPESCU, Eliza-Elena
Date of Publication: 2024-06-28
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2024.01.06
Issue: Volume 13, Issue 1, Year 2024
Section: Cyber-Attacks Evolution and Cybercrime Trends
Page Range: 66-70 (5 pages)
Copyright ©2012-2024
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.