Title
Misuse patterns in VoIP
Abstract
In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be aware of typical risks and to have a good understanding of how vulnerabilities can be exploited. In a previous paper we presented the concept of misuse patterns. Attack patterns describe from the point of view of the attacker, how a type of attack is performed (what system units it uses and how), analyzes the ways of stopping the attack by enumerating possible security patterns that can be applied for this purpose, and describes how to trace the attack once it has happened by appropriate collection and observation of forensics data. We present a set of misuse patterns for VoIP: Denial of Service (DoS), Call Interception, and Theft of Service on VoIP.
Year
DOI
Venue
2009
10.1145/1772070.1772072
Proceedings of the 14th Conference on Pattern Languages of Programs
Keywords
Field
DocType
attack pattern,system unit,forensics data,previous paper,misuse pattern,security patterns,appropriate collection,possible security pattern,good understanding,network architecture,voice over ip,software architecture,security vulnerability,call interception
Attack patterns,Denial-of-service attack,Computer security,Computer science,Network architecture,Computer network,Software architecture,Vulnerability,Voice over IP
Journal
Volume
Issue
Citations 
2
6
2
PageRank 
References 
Authors
0.35
5
4
Name
Order
Citations
PageRank
Juan C. Pelaez1465.32
Eduardo B. Fernandez21653429.84
M. M. Larrondo-Petrie3101.16
Christian Wieser491.69