Development and implementation of VoIP honeypots with wide range of analysis
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F18%3A10239790" target="_blank" >RIV/61989100:27240/18:10239790 - isvavai.cz</a>
Result on the web
<a href="https://www.spiedigitallibrary.org/conference-proceedings-of-spie/10630/106300S/Development-and-implementation-of-VoIP-honeypots-with-wide-range-of/10.1117/12.2304602.short?SSO=1" target="_blank" >https://www.spiedigitallibrary.org/conference-proceedings-of-spie/10630/106300S/Development-and-implementation-of-VoIP-honeypots-with-wide-range-of/10.1117/12.2304602.short?SSO=1</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1117/12.2304602" target="_blank" >10.1117/12.2304602</a>
Alternative languages
Result language
angličtina
Original language name
Development and implementation of VoIP honeypots with wide range of analysis
Original language description
The paper deals with the need to provide security of the VoIP (Voice over IP) architecture. It is not entirely trivial matter to ensure the security of the VoIP services and attacks on telecommunication solutions, built on VoIP technology, grow with an increasing number of active users. In many situations, it is necessary to detect and analyze these attacks, monitor their progress and then prepare an effective defense against them. The best way how to detect attacks on VoIP infrastructure is implementing VoIP Honeypots. We have developed our honeypot solution. The main motivation for the development of our own honeypot for VoIP service is a nonexistent actively developed project with a similar purpose, which is adapted to the new security threats and which is developed according to the needs of the telecommunications market. Honeypot for VoIP services is implemented purely in software and honeypot is able to deal with various types of attacks. The entire solution is based on a Linux platform and it is prepared in a virtual environment for the simplest deployment and clustering possible. (C) 2018 SPIE.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
—
Continuities
S - Specificky vyzkum na vysokych skolach
Others
Publication year
2018
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Proceedings of SPIE - The International Society for Optical Engineering. Volume 10630
ISBN
978-1-5106-1771-1
ISSN
0277-786X
e-ISSN
1996-756X
Number of pages
9
Pages from-to
—
Publisher name
SPIE
Place of publication
Bellingham
Event location
Orlando
Event date
Apr 17, 2018
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
000449558300021