Proceedings of International Conference on Applied Innovation in IT
2017/03/16, Volume 5, Issue 1, pp.1-8

Fraud Attacks in VoIP-Based Communications Systems (Risk Analysis, Prevention, Protection, Detection)

Benedikt Machens, Olaf Gebauer, Diederich Wermser

Abstract: This paper explains how fraud on modern VoIP-Systems works and which attacks are executed. This was examined practically by the example of a honey pot PBX, which ran for about 3 months and was monitored accordingly. Furthermore, this paper presents possibilities of how to protect productive VoIP systems against Fraud and to examine the fraud vulnerability.

Keywords: Fraud, VoIP, PBX, Honey Pot, SIP, SIPX, SBC

DOI: 10.13142/KT10005.01

Download: PDF


  1. Brennecke, S., 2009. Literaturgestu╠łtzte und experimentelle Untersuchung zur Sicherheit vin Voice over IP in Unternehmensnetzwerken - Diploma Thesis. Institute for communication and technologies - Ostfalia - Wolfenbu╠łttel: s.n.
  2. Endler, D. & Coller, M., 2007. Hacking Exposed VoIP: Voice over IP Security - Secrets & Solutions. ISBN: 978-0072263640. s.l.:Mc Graw Hill Professional. ProQuest. Products & Services - SIPX. [Online] Available from: 2016.10.19.
  3. Sisalem, D., 2009. SIP Security. ISBN: 978-0-470-51636-2. s.l.:John Wiley & Sons Ltd.. The World Bank. Data | The World Bank. [Online] Available from: 2016.07.12.
  4. Wallingford, T., 2005. Switching to VoIP: A Solutions Manual for Network Professionals. ISBN: 978- 0596008680. 1. Hrsg. s.l.:O'Reilly Media.



       - Call for Papers
       - Paper Submission
       - Important Dates
       - Committee
       - Guest registration


       - Volume 1 (ICAIIT 2013)
       - Volume 2 (ICAIIT 2014)
       - Volume 3 (ICAIIT 2015)
       - Volume 4 (ICAIIT 2016)
       - Volume 5 (ICAIIT 2017)
       - Volume 6 (ICAIIT 2018)





           ISSN 2199-8876
           Copyright © 2013-2018 Leonid Mylnikov. All rights reserved.