Threat Assessment of IP Based Voice Systems

In this paper, we will provide an analysis of the potential threats to the reliability and security of IP based voice systems including; Voice over IP and IP Telephony. For each of the threat categories we will explore the potential methods of attacks and detail various mitigation approaches. These mitigation approaches may help to minimize or eliminate the exposure. Finally, we will provide a set of summary recommendations for dealing with each of the threat categories.

By: William J. Rippon

Published in: Proceedings of 1st IEEE Workshop on VoIP Management and Security VoIP MaSe'06, Piscataway, NJ, , IEEE, p.19-28 in 2006

Please obtain a copy of this paper from your local library. IBM cannot distribute this paper externally.

Questions about this service can be mailed to reports@us.ibm.com .