Malicious traffic monitoring and its evaluation in VoIP infrastructure
| dc.contributor.author | Šafařík, Jakub | |
| dc.contributor.author | Vozňák, Miroslav | |
| dc.contributor.author | Řezáč, Filip | |
| dc.contributor.author | Macura, Lukáš | |
| dc.date.accessioned | 2012-11-13T12:26:33Z | |
| dc.date.available | 2012-11-13T12:26:33Z | |
| dc.date.issued | 2012 | |
| dc.description.abstract | The paper deals with the need to enhance security of the VoIP infrastructure. There are several ways to achieve an enhancement in security. We opted for the honeypot which can provide us information about attacker’s behaviour. We will examine in particular a VoIP honeypot referred to as Artemisa. It is one of many existing honeypots tailored for IP telephony. The paper describes its function and application within a real IP telephony infrastructure. The aim of another tested honeypot is to gather data about the attacks while simulating a SSH server. The gathered information could be crucial for further improvements of the existing security mechanism in our VoIP network. | cs |
| dc.description.source | Scopus | cs |
| dc.format.extent | 1160967 bytes | cs |
| dc.format.mimetype | application/pdf | cs |
| dc.identifier.citation | 2012 35th International Conference on Telecommunications and Signal Processing TSP : proceedings : July 3-4, 2012 Prague, Czech Republic. [Piscataway] : IEEE, c2012. s. 259-262. | cs |
| dc.identifier.doi | 10.1109/TSP.2012.6256294 | |
| dc.identifier.isbn | 978-1-4673-1118-2 | |
| dc.identifier.location | Není ve fondu ÚK | cs |
| dc.identifier.uri | http://hdl.handle.net/10084/95718 | |
| dc.language.iso | en | cs |
| dc.publisher | IEEE | cs |
| dc.relation.ispartofseries | 2012 35th International Conference on Telecommunications and Signal Processing TSP : proceedings : July 3-4, 2012 Prague, Czech Republic | cs |
| dc.relation.projectid | info:eu-repo/grantAgreement/EC/FP7/218086 | cs |
| dc.relation.uri | http://dx.doi.org/10.1109/TSP.2012.6256294 | cs |
| dc.rights | c2012 IEEE | cs |
| dc.rights.access | restrictedAccess | |
| dc.subject | Artemisa | cs |
| dc.subject | honeypot | cs |
| dc.subject | honeypot | cs |
| dc.subject | VoIP attacks | cs |
| dc.subject | VoIP attacks | cs |
| dc.title | Malicious traffic monitoring and its evaluation in VoIP infrastructure | cs |
| dc.type | article | cs |
| dc.type.status | Peer-reviewed | cs |
| dc.type.version | publishedVersion | cs |
Files
License bundle
1 - 1 out of 1 results
Loading...
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: