Carrier VoIP security architecture

被引:0
|
作者
Marshall, William
Faryar, Alireza Farid
Kealy, Kevin
de los Reyes, Gustav
Rosencrantz, Israel
Rosencrantz, Rachel
Spielman, Chaim
机构
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This document describes a Security Architecture for Real-time Services over IP (RSoIP) Architecture. The architecture described here is used to protect AT&T's VoIP infrastructure, hence our liberal use of AT&T VoIP architecture in describing the proposed security architecture. Our VoIP Security architecture describes guidelines and mechanisms designed to safeguard customer data, our VoIP network infrastructure, and voice and multimedia services and applications against internal and external threats including Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks. Our VoIP Security architecture is designed to ensure availability, confidentiality, privacy, and integrity of user information.
引用
收藏
页码:184 / 189
页数:6
相关论文
共 50 条
  • [31] VoIP Security: Vulnerabilities, Exploits, and Defenses
    Wang, Xinyuan
    Zhang, Ruishan
    ADVANCES IN COMPUTERS, VOL 81, 2011, 81 : 1 - 49
  • [32] Covert channel for improving VoIP security
    Mazurczyk, Wojciech
    Kotulski, Zbigniew
    ADVANCES IN INFORMATION PROCESSING AND PROTECTION, 2007, : 271 - +
  • [33] An Empirical Study of Security of Voip System
    Ghafarian, Ahmad
    Seno, Seyed Amin Hosseini
    Dehghani, Maria
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1031 - 1036
  • [34] VISOR: VoIP security using reputation
    Yang, Weilai
    Judge, Paul
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1489 - 1493
  • [35] Security considerations in current VOIP protocols
    Fries, Steffen
    SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography, 2006, : 183 - 191
  • [36] Qphone: A Quantum Security VoIP Phone
    Liu, Bo
    Zhao, Baokang
    Wei, Ziling
    Wu, Chunqing
    Su, Jinshu
    Yu, Wanrong
    Wang, Fei
    Sun, Shihai
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) : 477 - 478
  • [37] VoIP security assessment: Methods and tools
    Abdelnur, H.
    Cridlig, V.
    State, R.
    Festor, O.
    VOIP MASE 06: 1ST IEEE WORKSHOP ON VOIP MANAGEMENT AND SECURITY: SECURING AND MANAGING VOIP COMMUNICATIONS, 2006, : 29 - +
  • [38] Service oriented architecture for VOIP conferencing
    Wu, Wenjun
    Fox, Geoffrey
    Bulut, Hasan
    Uyar, Ahmet
    Huang, Tao
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2006, 19 (04) : 445 - 461
  • [39] An architecture for secure VoIP and collaboration applications
    Zisiadis, Dimitris
    Kopsidas, Spyros
    Tassiulas, Leandros
    THIRD INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, : 79 - +
  • [40] A bandwidth broker architecture for VoIP QoS
    Kim, K
    Mouchtaris, P
    Samtani, S
    Talpade, R
    Wong, L
    VOICE OVER IP (VOIP) TECHNOLOGY, 2001, 4522 : 76 - 86