VoIP Security regarding the Open Source Software Asterisk

被引:0
|
作者
Detken, Kai-Oliver [1 ]
Eren, Evren [2 ]
机构
[1] DECOIT GmbH, Fahrenheitstr 9, D-28359 Bremen, Germany
[2] Univ Appl Sci Dortmund, D-44227 Dortmund, Germany
关键词
VoIP; VoIP Security; risks; attacks; Asterisk; H.323; SIP; RTP; SCCP; MGCP; MEGACO; IAX; SIMCO;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Enterprises and organizations improve their business processes and drop their infrastructure cost by using Voice-over-IP (VoIP) technology. However, security aspects are often neglected. With the increasing merge of application data and speech data within IP networks new challenges arise for overall network and system security. VoIP packets are being transmitted over a shared medium", i.e., via a network which is shared by numerous subscribers with different profiles and for different services. Under certain conditions attackers can sniff data on the communication path and record VoIP conversations. This article will demonstrate existing security risks regarding the VoIP technology and present viable solutions and concepts. In this context VoIP standards will be analyzed with respect to their security mechanisms. Because of its growing prevalence especially the open source VoIP solution Asterisk" will be analyzed and evaluated against typical security requirements.
引用
收藏
页码:93 / +
页数:2
相关论文
共 50 条
  • [1] Implement VoIP Based IP Telephony with Open Source Asterisk Architecture
    Gohel, Chirag K.
    Lakhtaria, Kamaljit I.
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2010, 2 (01)
  • [2] On the security of open source software
    Payne, C
    INFORMATION SYSTEMS JOURNAL, 2002, 12 (01) : 61 - 78
  • [3] Trusting strangers - Open source software and security
    Landwehr, CE
    BUILDING THE INFORMATION SOCIETY, 2004, 156 : 679 - 683
  • [4] EVALUATION OF QUALITY AND SECURITY OF A VOIP NETWORK BASED ON ASTERISK AND OpenVPN
    Barison, Dherik
    Miani, Rodrigo S.
    Mendes, Leonardo de Souza
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 144 - 147
  • [5] Open Source or Closed Source? A Competitive Analysis with Software Security
    Gao, Xing
    DECISION ANALYSIS, 2020, 17 (01) : 56 - 73
  • [6] The Use of Security Tactics in Open Source Software Projects
    Ryoo, Jungwoo
    Malone, Bryan
    Laplante, Phillip A.
    Anand, Priya
    IEEE TRANSACTIONS ON RELIABILITY, 2016, 65 (03) : 1195 - 1204
  • [7] Learning Software Security in Context An Evaluation in Open Source Software Development Environment
    Wen, Shao-Fang
    Katt, Basel
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [8] Security Risk Indicator for Open Source Software to Measure Software Development Status
    Kuzuno, Hiroki
    Yano, Tomohiko
    Omo, Kazuki
    van der Ham, Jeroen
    Yamauchi, Toshihiro
    INFORMATION SECURITY APPLICATIONS, WISA 2023, 2024, 14402 : 143 - 156
  • [9] A Proposal for A High Availability Architecture for VoIP Telephone Systems based on Open Source Software
    Martin, Alejandro
    Gamess, Eric
    Urribarri, Dedaniel
    Gomez, Jesus
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (09) : 1 - 11
  • [10] Survey on Open-source Software Supply Chain Security
    Ji S.-L.
    Wang Q.-Y.
    Chen A.-Y.
    Zhao B.-B.
    Ye T.
    Zhang X.-H.
    Wu J.-Z.
    Li Y.
    Yin J.-W.
    Wu Y.-J.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (03): : 1330 - 1364