O'Reilly logo

Voice over IP Security by Patrick Park

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Analysis and Simulation of Current Threats

This chapter covers the simulation, analysis, and mitigation of the following threats:

Several of the chapters in Part I introduced concepts and ideas behind current threats and protection methods at a high level. This chapter digs into the topic to find practical information that can be applied to real VoIP service environments.

In this chapter, you see the details of the threats and the methodology of protection. These are the threats that this chapter covers:

  • Denial of Service (intentional and unintentional flooding)

  • Malformed messages

  • Sniffing/eavesdropping

  • Spoofing/identity theft

  • VoIP spam

Each section will ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required