VoIP Security regarding the Open Source Software Asterisk

被引:0
|
作者
Detken, Kai-Oliver [1 ]
Eren, Evren [2 ]
机构
[1] DECOIT GmbH, Fahrenheitstr 9, D-28359 Bremen, Germany
[2] Univ Appl Sci Dortmund, D-44227 Dortmund, Germany
关键词
VoIP; VoIP Security; risks; attacks; Asterisk; H.323; SIP; RTP; SCCP; MGCP; MEGACO; IAX; SIMCO;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Enterprises and organizations improve their business processes and drop their infrastructure cost by using Voice-over-IP (VoIP) technology. However, security aspects are often neglected. With the increasing merge of application data and speech data within IP networks new challenges arise for overall network and system security. VoIP packets are being transmitted over a shared medium", i.e., via a network which is shared by numerous subscribers with different profiles and for different services. Under certain conditions attackers can sniff data on the communication path and record VoIP conversations. This article will demonstrate existing security risks regarding the VoIP technology and present viable solutions and concepts. In this context VoIP standards will be analyzed with respect to their security mechanisms. Because of its growing prevalence especially the open source VoIP solution Asterisk" will be analyzed and evaluated against typical security requirements.
引用
收藏
页码:93 / +
页数:2
相关论文
共 50 条
  • [11] Data on security requirements in open-source software projects
    Wang, Wentao
    Mahakala, Kavya Reddy
    Gupta, Arushi
    Hussein, Nesrin
    Wang, Yinglin
    DATA IN BRIEF, 2019, 25
  • [12] Software Security in Open Source Development: A Systematic Literature Review
    Wen, Shao-Fang
    PROCEEDINGS OF THE 2017 21ST CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2017, : 364 - 373
  • [13] The Prisoner's Dilemma of Open-Source Software Security
    Koch, Christian
    COMPUTER, 2024, 57 (10) : 82 - 85
  • [14] OPEN SOURCE SOFTWARE, INFORMATION ENTREPRENEURS AND ISSUES OF NATIONAL SECURITY
    Trim, Peter R. J.
    Lee, Yang-Im
    STRATEGIZING RESILIENCE AND REDUCING VULNERABILITY, 2009, : 75 - +
  • [15] An Empirical Study of Security Culture in Open Source Software Communities
    Wen, Shao-Fang
    Kianpour, Mazaher
    Kowalski, Stewart
    PROCEEDINGS OF THE 2019 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2019), 2019, : 863 - 870
  • [16] Code Ownership in Open-Source AI Software Security
    Wen, Jiawen
    Yuari, Dong
    Ma, Lei
    Chen, Huaming
    PROCEEDINGS OF THE 2024 IEEE/ACM INTERNATIONAL WORKSHOP ON RESPONSIBLE AI ENGINEERING, RAIE 2024, 2024, : 28 - 35
  • [17] A security evaluation and testing methodology for open source software embedded information security system
    Choi, SJ
    Kang, YH
    Lee, GS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 215 - 224
  • [18] Voice over IP (VoIP) Speech Quality Measurement with Open-Source Software Components
    Huntgeburth, Bastian
    Schumann, Sebastian
    Londak, Juraj
    PROCEEDINGS ELMAR-2010, 2010, : 215 - 218
  • [19] Understanding How the "Open" of Open Source Software (OSS) Will Improve Global Health Security
    Hahn, Erin
    Blazes, David
    Lewis, Sheri
    HEALTH SECURITY, 2016, 14 (01) : 13 - 18
  • [20] Towards a Security Requirements Management Framework for Open-Source Software
    Wang, Wentao
    2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 478 - 483