Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Security analysis and countermeasures assessment against spit attacks on VoIP systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Scata, M. ; Dept. of Comput. Sci. & Telecommun. Eng., Univ. of Catania, Catania, Italy ; La Corte, A.

Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voice over IP has become a valid alternative to the Public Switched Telephone Network and it has a new paradigm for providing telephony services at a lower cost and higher flexibility. In the meantime, with Voice over IP the privacy becomes so hard and the benefits introduced are as strong as the security problems, like Spam over Internet Telephony. People have more attention on the spam voice issue, because of the great danger of this threat. Thus, in this paper we want to propose and introduce a new protection model against Spam over Internet Telephony attack, through a user-profile framework. This framework allows to identify the optimal counter-measures to be taken against this threat, according to the user assessment, that receives a certain number of calls during an observation period. We define general profiles based on certain parameters, and with a user-profile matching we can identifies the best security path which must be applied.

Published in:

Internet Security (WorldCIS), 2011 World Congress on

Date of Conference:

21-23 Feb. 2011