Communications - Scientific Letters of the University of Zilina 2013, 15(11):191-196 | DOI: 10.26552/com.C.2013.2A.191-196
IP Telephony Server Emulation for Monitoring and Analysis of Malicious Activity in VOIP Network
- 1 Department of Telecommunications, Faculty of Electrical Engineering and Computer Science, VSB-TU Ostrava, Ostrava-Poruba, Czech Republic
The paper aims at gathering information about attacks from real internet infrastructure and their analysis. For this purpose, we prepared a set of honeypots monitoring various aspects of VoIP infrastructure including SIP endpoint and SSH terminal emulation. SIP endpoints are registered with real SIP registrar and the incoming calls are routed to a honeypot according the rules in dialplan. The honeypot gathers valuable data about hacker's activity with no threat to production systems. Analysis of the honeypot data is crucial for further improvement of existing security mechanisms in VoIP networks. The paper describes the honeypot's behaviour and brings an analysis of a detected malicious activity as well.
Keywords: Artemisa, Dionaea, Kippo, VoIP attacks, VoIP honeypot
Published: July 31, 2013 Show citation
ACS | AIP | APA | ASA | Harvard | Chicago | Chicago Notes | IEEE | ISO690 | MLA | NLM | Turabian | Vancouver |
References
- SPITZNER, L.: Honeypots: Tracking Hackers, Addison-Wesley Professional, 2002.
- KLIMO, M., KOVACIKOVA, M., SEGEC, P.: Selected Issues of IP Telephony, Communications - Scientific Letters of the University of Zilina, vol. 6, No. 4, pp. 63-70, 2004.
Go to original source...
- DUHA, J., DADO, M., JARINA, R.: Communication Technologies and Services, Communications - Scientific Letters of the University of Zilina, vol. 5, No. 3, pp. 33-35, 2003.
- SISALEM, D., KUTHAN, J., ELHERT, T. S., FRAUNHOFER, F.: Denial of Service Attacks Targeting SIP VoIP Infrastructure: Attack Scenarios and Prevention Mechanisms. IEEE Network, 2006.
Go to original source...
- PROVOS, N., HOLZ, T.: Virtual Honeypots, Addison-Wesley Professional, 2007.
- REZAC, F., VOZNAK, M., TOMALA, K., ROZHON, J., VYCHODIL, J.: Security Analysis System to Detect Threats on a SIP VoIP Infrastructure Elements, Advances in Electrical and Electronic Engineering, vol. 9, No. 5, pp. 225-23, 2011.
Go to original source...
- VOZNAK, M., REZAC, F.: Web-based IP Telephony Penetration System Evaluating Level of Protection from Attacks and Threats, WSEAS Transactions on Communications, vol. 10, No. 2, pp. 66-76, February 2011.
- JOSHI, R. C., SARDANA, A.: Honeypots: A New Paradigm to Information Security, Science Publishers, 2011.
Go to original source...
- ENDLER, D., COLLIER, M.: Hacking Exposed VoIP, McGraw-Hill Osborne Media, 2009.
- SAFARIK, J., VOZNAK, M., REZAC, F., MACURA, L.: Malicious Traffic Monitoring and its Evaluation in VoIP Infrastructure, 35th Intern. Conference on Telecommunications and Signal Processing, TSP, Prague, pp. 259-262, 2012.
Go to original source...
- VOZNAK, M., SAFARIK, J.: DoS Attacks Targeting SIP Server and Improvements of Robustness, Intern. J. of Mathematics and Computers in Simulation, vol. 6, No. 1, pp. 177-184, 2012.
- VOZNAK, M., REZAC, F.: Threats to Voice over IP Communications Systems, WSEAS Transactions on Computers, vol. 9, No. 11, pp. 1348-1358, November 2010.
This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.