Abstract | ||
---|---|---|
The paper deals with the need to enhance security of the VoIP infrastructure. There are several ways to achieve an enhancement in security. We opted for the honeypot which can provide us information about attacker's behaviour. We will examine in particular a VoIP honeypot referred to as Artemisa. It is one of many existing honeypots tailored for IP telephony. The paper describes its function and application within a real IP telephony infrastructure. The aim of another tested honeypot is to gather data about the attacks while simulating a SSH server. The gathered information could be crucial for further improvements of the existing security mechanism in our VoIP network. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/TSP.2012.6256294 | 2012 35TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP) |
Keywords | Field | DocType |
Artemisa, honeypot, Kippo, VoIP attacks, VoIP honeypot | Honeypot,Computer science,Computer security,Server,Telecommunication security,Computer network,Pseudoserver,Telephony,Voice over IP | Conference |
Citations | PageRank | References |
0 | 0.34 | 1 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jakub Safarik | 1 | 0 | 1.35 |
Miroslav Voznak | 2 | 113 | 38.68 |
Filip Rezac | 3 | 8 | 4.92 |
Lukas Macura | 4 | 0 | 0.68 |