skip to main content
10.1145/1409908.1409938acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Network security: VoIP security on data network--a guide

Published:28 September 2007Publication History

ABSTRACT

Information Security has emerged as one of the biggest concerns that network administrators and other stakeholders face today. Most data custodians face Information Security risks on a daily basis; thus, it is up to Information Security professionals to research these threats and exploits to secure private information from unauthorized access and mismanagement. It can be easily stated that familiarity with a particular technology can be helpful in securing information. It can also be stated that new and emerging technologies are harder to secure, but not impossible.

This paper will consider and focus on both technical and legal aspects, and approaches on how to secure Voice over Internet Protocol (VoIP) Data Network's facility to facility traffic in particular. Both technical and legal aspects are important in protecting VoIP Networks. This paper will take the following approach: The History of VoIP and short comings, Security Issues of VoIP (current gaps), Current Solutions for the current security issues, Future Solutions for VoIP security and Future concerns more specifically the passing of Communications Assistance to Law Enforcement Act (CALEA) and its impact on VoIP security.

References

  1. Frequently Asked Questions. (2007). Federal Communications Commission. Retrieved February 9, 2007 from http://www.fcc.gov/voip/Google ScholarGoogle Scholar
  2. Internet Security Systems, Ahead of the Threat. VoIP: The Evolving Solution and the Evolving Threat. Retrieved February 15, 2007 from http://www.iss.net/documents/whitepapers/ISS_VoIP_White_paper.pdfGoogle ScholarGoogle Scholar
  3. IPSec. (2007). Webopedia. Retrieved February 9, 2007 fromhttp://www.webopedia.com/TERM/I/IPSec.htmlGoogle ScholarGoogle Scholar
  4. IP Sec Protocol Overview. (2007) Freesoft.com. Retrieved February 15, 2007 from http://www.freesoft.org/CIE/Topics/141.htmGoogle ScholarGoogle Scholar
  5. The History of VoIP. (2005). WhichVoIP.com. Retrieved February 9, 2007 http://www.whichvoip.com/voip/articles/voip_history.htmGoogle ScholarGoogle Scholar
  6. Telecom Policy Report. (2005). The FCC and CALEA: What Price Collaboration? Retrieved March 27, 2007 from http://findarticles.com/p/articles/mi_m0PJR/is_2005_Dec_5a i_n15896054Google ScholarGoogle Scholar
  7. VoIP spam from SearchVoIP.com. (2007). SearchVoIP.com. Retrieved February 9, 2007 from http://searchvoip.techtarget.com/sDefinition/0,290660,sid66_gci1024458,00.htmlGoogle ScholarGoogle Scholar
  8. VOIP Toll Fraud. (2007). VoIP-news. Retrieved February 9, 2007 from http://www.voip-news.com/voip-infowiki/index.php/VoIP_toll_fraudGoogle ScholarGoogle Scholar
  9. Aginsky, A. (1995). Focus on: How to combat toll fraud Retrieved February 15, 2007 from http://www.findarticles.com/p/articles/mi_qa3629/is_199511/ai_n8728125Google ScholarGoogle Scholar
  10. Curran, P. Just how risky is a phone call over the Internet. Retrieved February 13, 2007 from http://www.microsoft.com/uk/business/security/VoIP.mspxGoogle ScholarGoogle Scholar
  11. Dzucbeck, F. (2007). Hype vs. reality in VoIP security.Google ScholarGoogle Scholar
  12. Retrieved February 15, 2007 form NetworkWorld.com Materna, B. (2006). VoIP Security Hacking HighlightsGoogle ScholarGoogle Scholar
  13. Need for Proactive Solutions. Retrieved March 2, 2007 from http://www.tmcnet.com/channels/voip/articles/1546-voip-security-hack-highlights-need-proactive-solutions.htmGoogle ScholarGoogle Scholar
  14. Rosenberg, J. (2006). Secure caller ID for VoIP. Retrieved February 15, 2007 from NetworkWorld, November 27, 2006. Vol23, Num 46. www.networkworld.comGoogle ScholarGoogle Scholar
  15. Sathish, P. (2006). VoIP Security Challenges: 25 Ways to Secure your VoIP Network. Retrieved February 11, 2007 from http://www.voiplowdown.com/2006/12/voip_security_c.htmlGoogle ScholarGoogle Scholar
  16. Greene, T. (2006). Net pioneers sound security alarm over VoIP wiretaps. Retrieved March 2, 2007 from http://www.networkworld.com/news/2006/061906-caleavoip.htmlGoogle ScholarGoogle Scholar
  17. Draven, J. (2007). VoIP Phones and their Downsides http://www.voiceoverip-articles.com/voip-products/voip-phones-and-their-downsides/Google ScholarGoogle Scholar

Index Terms

  1. Network security: VoIP security on data network--a guide

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader