This chapter covers the simulation, analysis, and mitigation of the following threats:
Several of the chapters in Part I introduced concepts and ideas behind current threats and protection methods at a high level. This chapter digs into the topic to find practical information that can be applied to real VoIP service environments.
In this chapter, you see the details of the threats and the methodology of protection. These are the threats that this chapter covers:
Denial of Service (intentional and unintentional flooding)
Each section will ...