EN
Penetration testing for VoIP
Abstract
Thanks to its economic advantages and flexibility, VoIP technology is spreading dramatically in recent years. This increase is happening much faster, especially due to the recent COVID-19 restrictions. However, the rapid spread also brings along some security threats. So, it is inevitable to take security measures specific to VoIP technology. These security measures specific to VoIP systems and devices will increase the benefit in terms of cost and performance. In this context, penetration tests to determine the required security measures should also be made specific to VoIP. In this paper, we proposed a penetration testing strategy for VoIP which ensure and analyzes the VoIP vulnerabilities. Furthermore, it provides an aspect of view on VoIP security precautions for VoIP administrators. This strategy provides proactivity to VoIP administrators before a possible attack. In our future studies, we aim to analyze them by implementing in a test environment.
Keywords
References
- [1] Hallock J.A. Brief history of VoIP. Evolution and Trends in Digital Media Technologies, 2004. http://www.joehallock.com/edu/pdfs/Hallock_J_VoIP_Past.pdf.
- [2] Bell, P. (2019). No Lifeline for Wireline: Fixed Voice Continues to Fall. https://blog.telegeography.com/no-lifeline-for-wireline.
- [3] Coulibaly, E., Liu,L. Security of VoIP networks. In: 2nd International Conference on Computer Engineering and Technology (ICCET) 2010, pp. 104-108. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5485790
- [4] Thermos,P., Takanen, A., Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures. Boston, USA. Adison-Wesley, 2007.
- [5] Porter, T. Threats to VoIP Communications Systems'. Syngress Force Emerging Threat Analysis. 2006, pp. 3-25.
- [6] Mirjalili, M., Nowroozi, A., & Alidoosti, M. A survey on web penetration test. Advances in Computer Science: An International Journal, 3(6), No.12, November 2014, pp. 107-121
- [7] Samant, N. Automated penetration testing. PhD, San Jose State University, United States, 2011.
- [8] Bhatt, P., Yano, E., & Gustavsson, P. Towards a framework to detect multi-stage advanced persistent threats attacks. 2014 IEEE 8th international symposium on service oriented system engineering. IEEE, 2014.
Details
Primary Language
English
Subjects
Computer Software
Journal Section
Research Article
Publication Date
February 28, 2021
Submission Date
January 28, 2021
Acceptance Date
February 10, 2021
Published in Issue
Year 2021 Volume: 1 Number: 1