IP Telephony Server Emulation for Monitoring and Analysis of Malicious Activity in VOIP Network
IP Telephony Server Emulation for Monitoring and Analysis of Malicious Activity in VOIP Network
Author(s): Jakub Safarik, Miroslav Voznak, Filip Rezac, Lukas MacuraSubject(s): Security and defense, ICT Information and Communications Technologies
Published by: Žilinská univerzita v Žilině
Keywords: Artemisa; Dionaea; Kippo; VoIP attacks; VoIP honeypot;
Summary/Abstract: The paper aims at gathering information about attacks from real internet infrastructure and their analysis. For this purpose, we prepared a set of honeypots monitoring various aspects of VoIP infrastructure including SIP endpoint and SSH terminal emulation. SIP endpoints are registered with real SIP registrar and the incoming calls are routed to a honeypot according the rules in dialplan. The honeypot gathers valuable data about hacker's activity with no threat to production systems. Analysis of the honeypot data is crucial for further improvement of existing security mechanisms in VoIP networks. The paper describes the honeypot's behaviour and brings an analysis of a detected malicious activity as well.
Journal: Komunikácie - vedecké listy Žilinskej univerzity v Žiline
- Issue Year: 15/2013
- Issue No: 2A
- Page Range: 191-196
- Page Count: 6
- Language: English