New approaches to mitigation of malicious traffic in VoIP networks

Date

2010

Authors

Wulff, T.
Hunt, R.

Editors

Advisors

Journal Title

Journal ISSN

Volume Title

Type:

Conference paper

Citation

Journal of network forensics, 2010, vol.2, iss.2, pp.40-59

Statement of Responsibility

Conference Name

8th Australian Information Security Management Conference (30 Nov 2010 - 2 Dec 2010 : Perth, Western Australia)

Abstract

Voice over IP (VoIP) telephony is becoming widespread in use, and is often integrated into computer networks. Because of this, malicious software threatens VoIP systems in the same way that traditional computer systems have been attacked by viruses, worms, and other automated agents. VoIP networks are a challenge to secure against such malware as much of the network intelligence is focused on the edge devices and access environment. This paper describes the design and implementation of a novel VoIP security architecture in which evaluation of, and mitigation against, malicious traffic is demonstrated by the use of virtual machines to emulate vulnerable clients and servers through the use of apparent attack vectors. This new architecture, which is part of an ongoing research project, establishes interaction between the VoIP backend and the end users, thus providing information about ongoing and unknown attacks to users.

School/Discipline

Dissertation Note

Provenance

Description

Access Status

Rights

Copyright 2010 Security Research Centre, Edith Cowan University

License

Grant ID

Published Version

Call number

Persistent link to this record