All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Development and implementation of VoIP honeypots with wide range of analysis

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F18%3A10239790" target="_blank" >RIV/61989100:27240/18:10239790 - isvavai.cz</a>

  • Result on the web

    <a href="https://www.spiedigitallibrary.org/conference-proceedings-of-spie/10630/106300S/Development-and-implementation-of-VoIP-honeypots-with-wide-range-of/10.1117/12.2304602.short?SSO=1" target="_blank" >https://www.spiedigitallibrary.org/conference-proceedings-of-spie/10630/106300S/Development-and-implementation-of-VoIP-honeypots-with-wide-range-of/10.1117/12.2304602.short?SSO=1</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1117/12.2304602" target="_blank" >10.1117/12.2304602</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Development and implementation of VoIP honeypots with wide range of analysis

  • Original language description

    The paper deals with the need to provide security of the VoIP (Voice over IP) architecture. It is not entirely trivial matter to ensure the security of the VoIP services and attacks on telecommunication solutions, built on VoIP technology, grow with an increasing number of active users. In many situations, it is necessary to detect and analyze these attacks, monitor their progress and then prepare an effective defense against them. The best way how to detect attacks on VoIP infrastructure is implementing VoIP Honeypots. We have developed our honeypot solution. The main motivation for the development of our own honeypot for VoIP service is a nonexistent actively developed project with a similar purpose, which is adapted to the new security threats and which is developed according to the needs of the telecommunications market. Honeypot for VoIP services is implemented purely in software and honeypot is able to deal with various types of attacks. The entire solution is based on a Linux platform and it is prepared in a virtual environment for the simplest deployment and clustering possible. (C) 2018 SPIE.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2018

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of SPIE - The International Society for Optical Engineering. Volume 10630

  • ISBN

    978-1-5106-1771-1

  • ISSN

    0277-786X

  • e-ISSN

    1996-756X

  • Number of pages

    9

  • Pages from-to

  • Publisher name

    SPIE

  • Place of publication

    Bellingham

  • Event location

    Orlando

  • Event date

    Apr 17, 2018

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000449558300021