The paper deals with the need to provide security of the VoIP (Voice over IP) architecture. It is not entirely trivial matter to ensure the security of the VoIP services and attacks on telecommunication solutions, built on VoIP technology, grow with an increasing number of active users. In many situations, it is necessary to detect and analyze these attacks, monitor their progress and then prepare an effective defense against them. The best way how to detect attacks on VoIP infrastructure is implementing VoIP Honeypots. We have developed our honeypot solution. The main motivation for the development of our own honeypot for VoIP service is a nonexistent actively developed project with a similar purpose, which is adapted to the new security threats and which is developed according to the needs of the telecommunications market. Honeypot for VoIP services is implemented purely in software and honeypot is able to deal with various types of attacks. The entire solution is based on a Linux platform and it is prepared in a virtual environment for the simplest deployment and clustering possible.
Ladislav Behan, Lukas Kapicak, and Jakub Jalowiczor, "Development and implementation of VoIP honeypots with wide range of analysis," Proc. SPIE 10630, Cyber Sensing 2018, 106300S (Presented at SPIE Defense + Security: April 18, 2018; Published: 3 May 2018); https://doi.org/10.1117/12.2304602.
Conference Presentations are recordings of oral presentations given at SPIE conferences and published as part of the conference proceedings. They include the speaker's narration along with a video recording of the presentation slides and animations. Many conference presentations also include full-text papers. Search and browse our growing collection of more than 12,000 conference presentations, including many plenary and keynote presentations.