Security Analysis of VoIP Networks Through Penetration Testing

被引:0
|
作者
Ochang, Paschal A. [1 ]
Irving, Philip [2 ]
机构
[1] Fed Univ Lafia, Dept Comp Sci, Lafia, Nasarawa State, Nigeria
[2] Univ Sunderland, Dept Comp Engn & Technol, Sunderland, Tyne & Wear, England
关键词
VoIP; Penetration testing; Ethical Hacking; Security analysis; SIP;
D O I
10.1007/978-3-319-67642-5_50
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Voice over Internet Protocol (VoIP) is gradually becoming the de facto standard in communications technology and it is now viewed as a cheap alternative to Public Switched Telephone Networks (PSTN) due to its low cost and flexibility. However the flexibility and ability of VoIP to provide a converged data and voice network comes with security vulnerabilities and threats some of which are as a result of the existing IP architecture. However, the use of penetration tests can provide a framework for analysing and identifying vulnerabilities and flaws in a VoIP network which in turn can assist in enhancing security. This research presents how a comprehensive VoIP network security level can be attained by carrying out penetration tests through Ethical Hacking. In this research the VoIP Security Alliance (VoIPSA) taxonomy was used to classify VoIP threats which lead to the design of a penetration test which was carried out against a VoIP network in other to identify vulnerabilities and exploits relating to the VoIPSA threat classification. This resulted in the development of a VoIP penetration testing methodology suitable for VoIP Networks. The developed penetration testing methodology successfully identified vulnerabilities in the VoIP deployment which assisted in providing security recommendations.
引用
收藏
页码:601 / 610
页数:10
相关论文
共 50 条
  • [1] Employing penetration testing as an audit methodology for the security review of VoIP - Tests and examples
    Tryfonas, Theodore
    Sutherland, Iain
    Pompogiatzis, Ioannis
    [J]. INTERNET RESEARCH, 2007, 17 (01) : 61 - 87
  • [2] Security Quality Assurance through Penetration Testing
    Shaukat, Kamran
    Faisal, Amber
    Masood, Rabia
    Usman, Ayesha
    Shaukat, Usman
    [J]. PROCEEDINGS OF THE 2016 19TH INTERNATIONAL MULTI-TOPIC CONFERENCE (INMIC), 2016, : 131 - 136
  • [3] Autonomous Security Analysis and Penetration Testing
    Chowdhary, Ankur
    Huang, Dijiang
    Mahendran, Jayasurya Sevalur
    Romo, Daniel
    Deng, Yuli
    Sabur, Abdulhakim
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020), 2020, : 508 - 515
  • [4] QoS and Security in VOIP Networks through Admission Control Mechanism
    Ul Arifeen, Fahan
    Ali, Muhammad
    Ashraf, Sajjad
    [J]. 2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, : 373 - 380
  • [5] Vulnerability Assessment for Applications Security Through Penetration Simulation and Testing
    Lachkov, Petar
    Tawalbeh, Lo'ai
    Bhatt, Smriti
    [J]. JOURNAL OF WEB ENGINEERING, 2022, 21 (07): : 2187 - 2208
  • [6] Evaluating the Security of Enterprise VoIP Networks
    Thermos, Peter
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 328 - 336
  • [7] Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing
    Ankele, Ralph
    Marksteiner, Stefan
    Nahrgang, Kai
    Vallant, Heribert
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [8] Security Awareness in Smart Homes and Internet of Things Networks through Swarm-Based Cybersecurity Penetration Testing
    Schiller, Thomas
    Caulkins, Bruce
    Wu, Annie S.
    Mondesire, Sean
    [J]. INFORMATION, 2023, 14 (10)
  • [9] Cyber Security Analysis using Vulnerability Assessment and Penetration Testing
    Shinde, Prashant S.
    Ardhapurkar, Shrikant B.
    [J]. 2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,
  • [10] Analysis of Blockchain Security: Classic attacks, Cybercrime and Penetration Testing
    Kaushik, Shreshta
    El Madhoun, Nour
    [J]. 2023 EIGHTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES, MOBISECSERV, 2023,