About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Publication
VoIP MaSe 2006
Conference paper
Threat assessment of IP based voice systems
Abstract
In this paper, we will provide an analysis of the potential threats to the reliability and security of IP based voice systems including; Voice over IP and IP Telephony. For each of the threat categories we will explore the potential methods of attacks and detail various mitigation approaches. These mitigation approaches may help to minimize or eliminate the exposure. Finally, we will provide a set of summary recommendations for dealing with each of the threat categories. © 2006 IEEE.