首页> 外文会议>Pan African International Conference on Information Science, Computing and Telecommunications >Securing VoIP network: An overview of applied approaches and analysis
【24h】

Securing VoIP network: An overview of applied approaches and analysis

机译:保护VoIP网络:应用方法和分析概述

获取原文

摘要

VoIP is becoming more and more popular and as such a potential target for hackers. Providing security for VoIP services is therefore pertinent for telecommunications. Without correct mechanisms to ensure callers' authentication, transmission confidentiality and availability of the service, security of the VoIP users is at risk. The fact that VoIP relies on IP infrastructure make it vulnerable to any attack that targets the network. Consequently, whatever may be the nature of the attack, there is a good chance that the attacker is capitalizing on a weakness in the VoIP protocol being used. VoIP is different from other IP services in the sense that its security is normally treated as one of the service properties configurable by the user. This article provides an overview of the VoIP security configuration requirement, aimed at empowering public VoIP user With the strategies to mitigate threats.
机译:VoIP正在变得越来越受欢迎,并且是黑客的潜在目标。因此,为电信提供VoIP服务的安全性。如果没有正确的机制,以确保呼叫者的身份验证,传输机密性和服务的可用性,VoIP用户的安全性有风险。 VoIP依赖于IP基础架构的事实使其容易受到网络的任何攻击。因此,无论是什么可能是攻击的性质,攻击者正在利用所使用的VoIP协议中的弱点有很大的机会。 VoIP与其他IP服务不同,因为它的安全性通常被视为用户可配置的服务属性之一。本文概述了VoIP安全配置要求,旨在赋予公共VoIP用户具有减轻威胁的策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号