Proceedings of International Conference on Applied Innovation in IT
2017/03/16, Volume 1, Issue 5, pp.1-8

Fraud Attacks in VoIP-Based Communications Systems (Risk Analysis, Prevention, Protection, Detection)


Benedikt Machens, Olaf Gebauer, Diederich Wermser


Abstract: This paper explains how fraud on modern VoIP-Systems works and which attacks are executed. This was examined practically by the example of a honey pot PBX, which ran for about 3 months and was monitored accordingly. Furthermore, this paper presents possibilities of how to protect productive VoIP systems against Fraud and to examine the fraud vulnerability.

Keywords: Fraud, VoIP, PBX, Honey Pot, SIP, SIPX, SBC

DOI: 10.13142/KT10005.01

Download: PDF

References:

  1. Brennecke, S., 2009. Literaturgestu╠łtzte und experimentelle Untersuchung zur Sicherheit vin Voice over IP in Unternehmensnetzwerken - Diploma Thesis. Institute for communication and technologies - Ostfalia - Wolfenbu╠łttel: s.n.
  2. Endler, D. & Coller, M., 2007. Hacking Exposed VoIP: Voice over IP Security - Secrets & Solutions. ISBN: 978-0072263640. s.l.:Mc Graw Hill Professional. ProQuest. Products & Services - SIPX. [Online] Available from: http://www.sipx.com/products/ 2016.10.19.
  3. Sisalem, D., 2009. SIP Security. ISBN: 978-0-470-51636-2. s.l.:John Wiley & Sons Ltd.. The World Bank. Data | The World Bank. [Online] Available from: http://data.worldbank.org/ 2016.07.12.
  4. Wallingford, T., 2005. Switching to VoIP: A Solutions Manual for Network Professionals. ISBN: 978- 0596008680. 1. Hrsg. s.l.:O'Reilly Media.

    Home

    PARTICIPATION

       - Call for Papers!!!
       - Paper Submission
       - Important Dates
       - Committee
       - Guest registration


    PROCEEDINGS

       - Issue 1 (ICAIIT 2013)
       - Issue 2 (ICAIIT 2014)
       - Issue 3 (ICAIIT 2015)
       - Issue 4 (ICAIIT 2016)
       - Issue 5 (ICAIIT 2017)

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 


           ISSN 2199-8876
           Copyright © 2013-2017 Leonid Mylnikov. All rights reserved.