Abstract | ||
---|---|---|
In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be aware of typical risks and to have a good understanding of how vulnerabilities can be exploited. In a previous paper we presented the concept of misuse patterns. Attack patterns describe from the point of view of the attacker, how a type of attack is performed (what system units it uses and how), analyzes the ways of stopping the attack by enumerating possible security patterns that can be applied for this purpose, and describes how to trace the attack once it has happened by appropriate collection and observation of forensics data. We present a set of misuse patterns for VoIP: Denial of Service (DoS), Call Interception, and Theft of Service on VoIP. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1145/1772070.1772072 | Proceedings of the 14th Conference on Pattern Languages of Programs |
Keywords | Field | DocType |
attack pattern,system unit,forensics data,previous paper,misuse pattern,security patterns,appropriate collection,possible security pattern,good understanding,network architecture,voice over ip,software architecture,security vulnerability,call interception | Attack patterns,Denial-of-service attack,Computer security,Computer science,Network architecture,Computer network,Software architecture,Vulnerability,Voice over IP | Journal |
Volume | Issue | Citations |
2 | 6 | 2 |
PageRank | References | Authors |
0.35 | 5 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Juan C. Pelaez | 1 | 46 | 5.32 |
Eduardo B. Fernandez | 2 | 1653 | 429.84 |
M. M. Larrondo-Petrie | 3 | 10 | 1.16 |
Christian Wieser | 4 | 9 | 1.69 |