All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Analysis of the IP Telephony Security Issues Using Automatic Neural Network Classifier

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F63839172%3A_____%2F16%3A10130739" target="_blank" >RIV/63839172:_____/16:10130739 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.1109/SOFTCOM.2016.7772119" target="_blank" >http://dx.doi.org/10.1109/SOFTCOM.2016.7772119</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/SOFTCOM.2016.7772119" target="_blank" >10.1109/SOFTCOM.2016.7772119</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Analysis of the IP Telephony Security Issues Using Automatic Neural Network Classifier

  • Original language description

    The complexity and robustness of the currently used IP telephony infrastructures requires systematic monitoring of the network against security threats, where captured incidents are often used as a source of information for further research and analytical optimization of the monitored topologies. This article presents an analysis of IP telephony security issues which were clasiffied using neural networks and it also describes a novel design of the clasiffication itself. To capture individual incidents a distributed honeypot network with the autonomous probes has been developed too and the interconnection of the proposed mechanisms leads into a comprehensive system of frequent attacks detection. These security threats are currently used by attackers to penetrate an IP telephony network elements, and their effective detection can reduce a growing number of abused users. First two chapters describe used technologies and the current state of the art. The following part defines the architecture of the proposed system and the fourth passage is then formed by the analysis of the classified data results obtained. These are then evaluated in the final discussion and conclusion.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/LM2010005" target="_blank" >LM2010005: Large Infrastructure CESNET</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2016

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)

  • ISBN

    978-1-5090-2578-7

  • ISSN

    1847-358X

  • e-ISSN

  • Number of pages

    5

  • Pages from-to

  • Publisher name

    IEEE

  • Place of publication

    Neuveden

  • Event location

    Split, Croatia

  • Event date

    Sep 22, 2016

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000391433200046