Security Threats in VOIP full report
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar topics
Active In SP

Posts: 559
Joined: Mar 2010
31-03-2010, 07:49 AM

VOIP (voice on internet protocol)
Security Threats in VOIP

VoIP Security Tools

What Is IP Telephony
VoIP Phone
Working of VoIP
Protocols in IP Telephony

IP Telephony
IP telephony is a technology in which IP
networks are being used as the medium
to transmit voice traffic.
Voice over IP (VoIP)
Describes an IP telephony deployment where the IP network used
as the medium to transmit voice traffic is a managed IP network.
Voice on the Net (VON)
Describes an IP telephony deployment where the IP network used
as the medium to transmit voice traffic is the Internet.

Working of VoIP Phone
VoIP Phone
Requires broadband internet access and regular house
phones which plug into an analog telephone adapter (ATA).

Working of VoIP
works by the two-way transmission of voice over a
packet-switched IP network

VoIP phone
call server

Protocols in IP Telephony
Signaling protocols
perform session management and are responsible for
Locating a user
Session establishment
Session setup negotiation
Modifying a session
Tearing down a session

Vulnerabilities Confidentiality
Refers to the protection of data from being read by
an unauthorized user.
Includes the unauthorized modification or deletion of
voice/data content.
Storage and transportation facilities for an information
system are accessible to authorized users

Data Link Layer

Network Layer
Transport Layer
Application Layer

Network Interface Layer
Network Layer
Transport Layer
Application Layer

Bandwidth consumption
Comprise of flooding the network
with a specific type of traffic.
Resource Starvation attacks
Flood a device (opposed to links
in a bandwidth consumption attack).
Routing Attacks
Involve manipulating routing information or protocols
in order to intercept / interrupt legitimate traffic.
Programming Flaws
Unintended bugs in software that can be exploited by
other user in order to gain access to a system .

VoIP Security Tools
VoIP systems become more prevalent and risk grows,
network engineers need to make sure the proper
precautions are taken to prevent security breaches.
Some testing tools

First publicly available vulnerability scanner for VoIP networks.

SIP Message generator
Used to test issues or generate demonstration attacks
SIP component discovery
Useful for identifying targets for analysis.
SIP vulnerability scanner
Used to verify the robustness and security of SIP phones,
proxy servers and registrar servers .

Windows-based GUI design
Reports are generated in an easy
to read html page
Checks both the robustness and the
presence of security features

Lack of information
SIP device failed to locate the Asterisk server
Issues arose on required SiVuS to be restarted.
authentication were found to report inaccurate
Running the test cases repeatedly fails to find
a target on the first attempt

None of the security tools evaluated were significantly
effective for mitigating security risks in SIP-based
VoIP networks
Early stages of adoption, attacks have been either
largely unheard of or undetected
Particularly important to prevent DoS attacks
All tools today are still under heavy development and
will no doubt evolve as VoIP adoption increases
VoIP specific security tools should play an important
role in securing systems.

References B. Charney, "VoIP threats 'must be dealt with now,'
CNET, 8 Feb. 2005;
J. E. Canavan, Fundamentals of Network Security,
Boston: Artech House, 2001
L.N.Vikram,Web Design And Multimedia Applications
4th Edition, Pearson Educations
Sikinder S.R.R.C, Voice On Internet Protocol A Basic
Approach, Charles House,2007
Digit magazine

Attached Files
.ppt   voip presentation.ppt (Size: 493.5 KB / Downloads: 166)
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: threats to voip, seminar report on security in voip, voip security report doc, voip security seminar reports, info charney com loc es, voip attack ppt, full report on security threats in the world wide web,
Popular Searches: computer security threats report, security threats seminar report, are nokia s partners its threats, project report on voip pdf, ppt wireless security with multi threats, specify the four categories of security threats information security, potential threats to mobile network security ppt for technical seminar,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  web spoofing full report computer science technology 13 8,869 20-05-2016, 11:59 AM
Last Post: Dhanabhagya
  Security using colors and Armstrong numbers Moiz ansari 2 148 21-10-2015, 12:10 PM
Last Post: mkaasees
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,413 31-03-2015, 09:08 AM
Last Post: Guest
  security features of atm ppt jaseelati 0 268 16-02-2015, 04:47 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 268 13-02-2015, 02:01 PM
Last Post: jaseelati
  security features of atm abstract jaseelati 0 275 17-01-2015, 04:13 PM
Last Post: jaseelati
  android full report computer science technology 57 73,075 24-09-2014, 05:05 PM
Last Post: Michaelnof
  steganography full report project report tiger 23 25,697 01-09-2014, 11:05 AM
Last Post: computer science crazy
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,194 13-05-2014, 10:16 AM
Last Post: seminar project topic
Video Random Access Memory ( Download Full Seminar Report ) computer science crazy 2 2,380 10-05-2014, 09:44 AM
Last Post: seminar project topic