Voice over IP Security A Comprehensive Survey of Vulnerabilities and
Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infr
- PDF / 4,133,132 Bytes
- 96 Pages / 439.37 x 666.142 pts Page_size
- 109 Downloads / 203 Views
For other titles published in this series, go to www.springer.com/series/10028
Angelos D. Keromytis
Voice over IP Security A Comprehensive Survey of Vulnerabilities and Academic Research
Angelos D. Keromytis Department of Computer Science Mail Code 0401 Columbia University 1214 Amsterdam Avenue 10027 New York USA [email protected]
ISSN 2191-5768 e-ISSN 2191-5776 ISBN 978-1-4419-9865-1 e-ISBN 978-1-4419-9866-8 DOI 10.1007/978-1-4419-9866-8 Springer New York Dordrecht Heidelberg London Library of Congress Control Number: 2011926000 © The Author, 2011 All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)
To the four women in my life: Elizabeth, Penelope, Julia and Sia. And to my dad, Dennis.
Preface
When I decided to do a sabbatical with Symantec Research Labs Europe in the beautiful French Riviera, I was asked to work on a project about Voice over IP (VoIP) security. The goal of the VAMPIRE Project1 was to understand the threats and vulnerabilities of VoIP systems, and to inform the direction of further research efforts. Although I was interested in this problem space, I only knew the subject from the point of view of a security researcher who has not studied VoIP itself in any great depth. As such, this project served as an ideal vehicle in educating me about VoIP security. This book is the result of more than 18 months’ work to learn what the challenges and opportunities are in securing VoIP. It is primarily addressed to students and researchers who want to learn about VoIP security, and is meant as both an introduction to the problem space and an extensive reference to related work as of early 2011. It is also intended as a case study on how to approach and map out a new research area. The structure of this book reflects my learning process. We start by learning the lay of the land (Overview of VoIP Systems). We then proceed to find out what actual problems are encountered by VoIP systems by looking at reported vulnerabilities (Survey and Analysis of VoIP/IMS Vulnerabilities). Finally, we explore as much of the prior work in this space as I could find (Survey of VoIP Security Research Literature). The book concludes with some comparative analysis and practical recommendations for securing VoIP systems and infrastructures. This work would n
Data Loading...