Evaluation of and Mitigation against Malicious Traffic in SIP-based VoIP Applications in a Broadband Internet Environment (2010)
Type of ContentTheses / Dissertations
Thesis DisciplineComputer Science
Degree NameMaster of Science
PublisherUniversity of Canterbury. Computer Science and Software Engineering
Voice Over IP (VoIP) telephony is becoming widespread, and is often integrated into computer networks. Because of his, it is likely that malicious software will threaten VoIP systems the same way traditional computer systems have been attacked by viruses, worms, and other automated agents. While most users have become familiar with email spam and viruses in email attachments, spam and malicious traffic over telephony currently is a relatively unknown threat. VoIP networks are a challenge to secure against such malware as much of the network intelligence is focused on the edge devices and access environment.
A novel security architecture is being developed which improves the security of a large VoIP network with many inexperienced users, such as non-IT office workers or telecommunication service customers. The new architecture establishes interaction between the VoIP backend and the end users, thus providing information about ongoing and unknown attacks to all users. An evaluation of the effectiveness and performance of different implementations of this architecture is done using virtual machines and network simulation software to emulate vulnerable clients and servers through providing apparent attack vectors.
KeywordsVoice over IP (VoIP); Session Initiation Protocol (SIP); Denial of Service (DoS); malware; Intrusion Detection System (IDS); event correlation; security architecture
RightsCopyright Tobias Wulff
Showing items related by title, author, creator and subject.
Towards understanding the initial adoption of online retail stores in a low internet penetration context: An exploratory work in Ghana Jibril AB; Kwarteng MA; Pilik M; Botha E; Osakwe CN (MDPI AG, 2020)© 2020 by the author. Online shopping has become increasingly popular in the past two decades. Yet, despite its popularity, the use of online stores on the African continent pales in comparison to other parts of the world. ...
Performance and security analysis of flexible random virtual internet protocol multiplexing on a virtualised network. Dishington, Cole (University of Canterbury, 2019)With the interconnection of services and customers, network attacks are now capable of large amounts of damage. Defending against these attacks is difficult, especially with an asymmetric disadvantage between defender ...
Development and evaluation of a secure web gateway with messaging functionality : utilizing existing ICAP and open-source tools to notify and protect end users from Internet security threats. Pearce, Michael Bruce (University of Canterbury. Computer Science and Software Engineering, 2010)Secure web gateways aim to protect end user systems against web based threats. Many proprietary commercial systems exist. However, their mechanisms of operation are not generally publicly known. This project undertook ...