Abstract:
Voice over IP (VoIP) is one of the most commonly used technologies. Due to the low cost of using VoIP, unlike traditional PSTN networks, it is rapidly growing and widely ...Show MoreMetadata
Abstract:
Voice over IP (VoIP) is one of the most commonly used technologies. Due to the low cost of using VoIP, unlike traditional PSTN networks, it is rapidly growing and widely distributed in both personal and commercial areas. Since the VoIP uses the same routes like common Internet traffic, a risk arises regarding a safety of that service. In this paper a method for protecting the system of Voice over Internet Protocol from unauthorized access and calls to paid services is proposed. The method includes the two parts. A first part contains the 11 steps based on detecting the attacker to observe the log. file on the Asterisk server and File2ban using. Since a large number of IP addresses can be accumulated, the second part of the method is based on applying the fuzzy logic for improving its effectiveness. The case study is described, and its outcomes confirmed the correctness of the used fuzzy subsystem, as well as the correctness of the proposed method in whole.
Published in: 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
Date of Conference: 28-30 June 2018
Date Added to IEEE Xplore: 04 April 2019
ISBN Information: