Captura e Análise de Tráfego Malicioso em Ambientes VoIP Usando um Honeypot de Baixa Interatividade
(Capture and Analysis of Malicious Traffic in VoIP Environments Using a Low Interaction Honeypot)
Ivan Riboldi Jordão da Silva Vargas (firstname.lastname@example.org), João Henrique Kleinschmidt (email@example.com)
Universidade Federal do ABC
This paper appears in: Revista IEEE América Latina
Publication Date: March 2015
Volume: 13, Issue: 3
The number of users of VoIP services is increasing every year. Consequently, VoIP systems get more attractive for attackers. This paper describes the implementation of a low interaction honeypot for monitoring illegal activities in VoIP environments. The honeypot operated during 92 days and collected 3502 events related to the SIP protocol. The analysis of the results allows understanding the modus operandi of the attacks targeted to VoIP infrastructures. These results may be used to improve defense mechanisms such as firewalls and intrusion detection systems.
security, honeypot, VoIP, SIP, atacks
Documents that cite this
This function is not implemented yet.
[PDF Full-Text (441)]