首页> 外文会议>International Symposium on Information, Computer, and Communications Security >On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
【24h】

On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers

机译:关于从远程攻击者启动中间人攻击的可行性

获取原文
获取外文期刊封面目录资料

摘要

The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM who is in the VoIP signaling and/or media path can easily wiretap, divert and even hijack selected VoIP calls by tempering with the VoIP signaling and/or media traffic. Since all previously identified MITM attacks on VoIP require the adversary initially in the VoIP signaling and/or media path, there is a common belief that it is infeasible for a remote attacker, who is not initially in the VoIP path, to launch any MITM attack on VoIP. This makes people think that securing all the nodes along the normal path of VoIP traffic is sufficient to prevent MITM attacks on VoIP.
机译:中间人(MITM)攻击被证明是对现有VoIP协议和系统的安全和信任的最严重威胁之一。例如,在VoIP信令和/或媒体路径中的MITM可以通过用VoIP信令和/或媒体流量回火来容易地窃听,转移甚至劫持所选择的VoIP调用。由于所有先前识别的VoIP上的MITM攻击都需要初始在VoIP信令和/或媒体路径中的敌人,因此常见的信念是对远程攻击者来说是不可行的,谁不在VoIP路径中发射任何Mitm攻击在VoIP上。这使人们认为沿着VoIP流量的正常路径确保所有节点足以防止对VoIP上的MITM攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号