Carrier VoIP security architecture

被引:0
|
作者
Marshall, William
Faryar, Alireza Farid
Kealy, Kevin
de los Reyes, Gustav
Rosencrantz, Israel
Rosencrantz, Rachel
Spielman, Chaim
机构
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This document describes a Security Architecture for Real-time Services over IP (RSoIP) Architecture. The architecture described here is used to protect AT&T's VoIP infrastructure, hence our liberal use of AT&T VoIP architecture in describing the proposed security architecture. Our VoIP Security architecture describes guidelines and mechanisms designed to safeguard customer data, our VoIP network infrastructure, and voice and multimedia services and applications against internal and external threats including Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks. Our VoIP Security architecture is designed to ensure availability, confidentiality, privacy, and integrity of user information.
引用
收藏
页码:184 / 189
页数:6
相关论文
共 50 条
  • [41] A VoIP emergency services architecture and prototype
    Mintz-Habib, M
    Rawat, A
    Schulzrinne, H
    Wu, XT
    ICCCN 2005: 14th International Conference on Computer Communications and Networks, Proceedings, 2005, : 523 - 528
  • [42] OSS architecture and requirements for VoIP networks
    Prabhakar, G
    Rastogi, R
    Thottan, M
    BELL LABS TECHNICAL JOURNAL, 2005, 10 (01) : 31 - 45
  • [43] Integrating VoIP/UC Security into the Holistic Information Security Planning
    Tas, I. Melih
    Ugurdogan, Bahar
    Tas, Huseyin
    2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 1002 - 1005
  • [44] Enhancing VoIP Security and Efficiency using VPN
    Surasak, Thattapon
    Huang, Scott C-H
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 180 - 184
  • [45] VoIP vulnerability requires different security methods
    Warren, C
    COMMUNICATIONS NEWS, 2001, 38 (11): : 50 - 50
  • [46] Leveraging countermeasures as a service for VoIP security in the cloud
    Dabbebi, Oussema
    Badonnel, Remi
    Festor, Olivier
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2014, 24 (01) : 70 - 84
  • [47] DESIGNING VOIP SECURITY SYSTEM FOR ORGANIZATIONAL NETWORK
    Hanifan, Yaqub
    Bandung, Yoanes
    2013 INTERNATIONAL CONFERENCE ON ICT FOR SMART SOCIETY (ICISS): THINK ECOSYSTEM ACT CONVERGENCE, 2013, : 111 - 115
  • [48] Cryptanalysis of a data security protection scheme for VoIP
    Li, CQ
    Li, S
    Zhang, D
    Chen, G
    IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2006, 153 (01): : 1 - 10
  • [49] Security enhancement on VoIP using chaotic cryptography
    Man, Kwan-Pok
    Wong, Kwok-Wo
    Man, Kim-Fung
    IECON 2006 - 32ND ANNUAL CONFERENCE ON IEEE INDUSTRIAL ELECTRONICS, VOLS 1-11, 2006, : 1646 - +
  • [50] AN ANALYSIS OF SECURITY THREATS IN VoIP COMMUNICATION SYSTEMS
    Neacsu, Eugen
    Schiopu, Paul
    PROCEEDINGS OF THE 2020 12TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI-2020), 2020,