Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








59 Hits in 2.8 sec

Voice pharming attack and the trust of VoIP

Xinyuan Wang, Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera
2008 Proceedings of the 4th international conference on Security and privacy in communication netowrks - SecureComm '08  
Such an unauthorized call diversion capability enables a new attack, called voice pharming, against VoIP users, where the attacker transparently diverts selected VoIP calls to the bogus IVR (interactive  ...  In this paper, we seek to fill this gap by investigating the trust issues of currently deployed VoIP systems and their implications to the VoIP users.  ...  Acknowledgement The authors would like to thank the anonymous reviewers for their insightful comments that helped to improve the presentation of this paper.  ... 
doi:10.1145/1460877.1460908 dblp:conf/securecomm/WangZYJW08 fatcat:kfg4ikctizbetitd3bvkjfecg4

Security Issues in VoIP Telecommunication Networks [chapter]

Xiaohui Yang, Ram Dantu, Duminda Wijesekera
2012 Handbook on Securing Cyber-Physical Critical Infrastructure  
In the later sections, we will illustrate the organization of the small World VoIP (SW-VoIP) with details on the P2PSIP operations, functions, and its improvement in performance over the currently deployed  ...  Finally, we will summarize the different categories of security issues that are present in VoIP systems and provide an overview of the solutions detailed in the preceding sections.  ...  ACKNOWLEDGEMENTS We would like to thank Kalyan Pathapati Subbu, Vikram Chandrasekaran, Srikanth Jonnada and Chaitra Urs for all the editing support and help provided.  ... 
doi:10.1016/b978-0-12-415815-3.00030-3 fatcat:2tfkcsyugjhfjgijtzwqwmg7ia

VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploits

R. Farley, Xinyuan Wang
2012 2012 IEEE Network Operations and Management Symposium  
We then empirically tested our design in conjunction with deployed Vonage VoIP services against a large body of attacks including billing, call redirection, voice pharming, and complex MITM exploits.  ...  the underlying VoIP protocol.  ...  These VoIP exploits could shake the long-held trust people have in voice communication.  ... 
doi:10.1109/noms.2012.6211937 dblp:conf/noms/FarleyW12 fatcat:hi56im5v6jhyplkvcxtmds3lbm

An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems [chapter]

Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Farley, Xuxian Jiang
2009 Lecture Notes in Computer Science  
the voicemail servers of both the caller and the callee of selected VoIP calls; and 3) make spam calls to VoIP subscribers even if Do Not Disturb is enabled.  ...  We have implemented a number of attacks and experimented with VoIP services by leading VoIP service providers Vonage, AT&T and Gizmo.  ...  Acknowledgments This work was partially supported by NSF Grants CNS-0524286 and CCF-0728771.  ... 
doi:10.1007/978-3-642-00843-6_6 fatcat:y3gyje42lfaixgxeczyicyld3u

A Survey of Voice over IP Security Research [chapter]

Angelos D. Keromytis
2009 Lecture Notes in Computer Science  
We present a survey of Voice over IP security research.  ...  We also briefly discuss the implications of our findings with respect to actual vulnerabilities reported in a variety VoIP products.  ...  This work was supported by the French National Research Agency (ANR) under Contract ANR-08-VERS-017.  ... 
doi:10.1007/978-3-642-10772-6_1 fatcat:5z7aiao4vjhh7fqx2enkbexu3i

On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers

Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui Yang, Xuxian Jiang
2009 Proceedings of the 4th International Symposium on Information, Computer, and Communications Security - ASIACCS '09  
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems.  ...  attack on a Vonage phone, as long as the remote attacker knows the phone number and the IP address of the Vonage phone.  ...  Acknowledgement This work was partially supported by NSF Grants CNS-0524286 and CCF-0728771.  ... 
doi:10.1145/1533057.1533069 dblp:conf/ccs/ZhangWFYJ09 fatcat:kzvgunhkbzhwdjafmtgny5kaoq

A Comprehensive Survey of Voice over IP Security Research

Angelos D. Keromytis
2012 IEEE Communications Surveys and Tutorials  
We also find that the overwhelming majority of the surveyed work takes a black box view of VoIP systems that avoids examining their internal structure and implementation.  ...  We discuss the implications of our findings with respect to vulnerabilities reported in a variety of VoIP products.  ...  These vulnerabilities permit for large-scale voice pharming, where unsuspecting users are directed to fake interactive voice response systems or human representatives.  ... 
doi:10.1109/surv.2011.031611.00112 fatcat:qxpbre5q2zhwhkjeb63t2bkr2a

Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation [chapter]

Ryan Farley, Xinyuan Wang
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
of the client.  ...  As more and more people are using VoIP softphones in their laptop and smart phones, vulnerabilities in VoIP protocols and systems could introduce new threats to the computer that runs the VoIP softphone  ...  [24] investigated the trust of several leading VoIP services (e.g., Vonage, AT&T) and showed that their VoIP calls can be transparently diverted and redirected-leading to voice pharming attacks on the  ... 
doi:10.1007/978-3-319-04283-1_7 fatcat:4pd6ic5v4nhmjnux6p56752vke

Phishing: A Serious Threat to Online Banking

Subasish Mohanty, Biswajit Rout
2011 Interscience Management Review  
Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies.  ...  Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.  ...  Voice over Internet Protocol (VoIP) is becoming a popular alternative to traditional phone lines.  ... 
doi:10.47893/imr.2011.1075 fatcat:r7w53celfnbaplhnu5o25nz57a

CYBER CRIME : A Review

Somesh Kumar
2024 Zenodo  
businesses, and uphold security and trust in the digital realm.  ...  Cybercrime, a broad category of illicit activities conducted via computer networks and the internet, spans a spectrum of malicious behaviours.  ...  Vishing, a portmanteau of "voice" and "phishing," leverages the trust associated with traditional landline telephone services to deceive victims.  ... 
doi:10.5281/zenodo.10671270 fatcat:4g64hplnprgqbpt5jh7qdoufye

An Advanced Taxonomy for Social Engineering Attacks

Hussain Aldawood, Geoffrey Skinner
2020 International Journal of Computer Applications  
This study creates an advanced taxonomy of social engineering attacks with the aim of facilitating the development and implementation of better prevention measures, stressing the importance of organizational  ...  Although the types of attacks are different i.e. social, physical, technical or socio-technical, the process is the same.  ...  Omar Aldulaijan, GNS General Manager, for sharing his pearls of wisdom with us during the course of this research.  ... 
doi:10.5120/ijca2020919744 fatcat:kfbvjknhbbew3ebbkdy7vmouce

Social Engineering Attacks: A Survey

Fatima Salahdine, Naima Kaabouch
2019 Future Internet  
Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust.  ...  This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/fi11040089 fatcat:sboj52i2pvcvrev6powu63zlo4

Prevention of Voice Phishing through Analysis of Telephone Call Voice Characteristic

Hyung Woo Park, Jong Bae Kim, Myung Jin Bae
2018 International Journal of Engineering & Technology  
In the voice of phone call, It is because the communication system mainly conveys the voice and does not convey the facial expression, environmental situation, and psychological state of the other person  ...  The voices recorded by victims of actual telephone fraud were analyzed and the characteristics were summarized.  ...  Types of Voice Phishing Voice phishing is causing a lot of damage, the type of attack is classified according to the type of attack, damage type, and aggressiveness.  ... 
doi:10.14419/ijet.v7i3.33.18525 fatcat:dpwglt6nk5hdrg6eouba7goika

Identifying Methods of Web Attacks towards Minimizing their Effects on Websites

Joshua John, S. Z. Bugi, Muripshaka Yibis
2014 International Journal of Applied Information Systems  
The result showed that only two, (MITM and Web based) out of the eleven were not significant while the remaining nine were significant.  ...  and Mobile Phishing, depicting methods used by phishers to carry out their attacks against unsuspecting victims who are the internet users were presented to respondents to indicate their level of agreement  ...  It is believed to be one of the newest breakthroughs in telecommunications; it uses VOIP -Voice over Internet Protocol -to conduct it.Mobile Phishing: All respondents agree that GSM devices are used in  ... 
doi:10.5120/ijais14-451184 fatcat:xauifkkzkngh7a5xwjsipwvkuq

Phishing - A Growing Threat to E-Commerce [article]

M. Tariq Banday, Jameel A. Qadri
2011 arXiv   pre-print
attacks, DoS attacks, and other threats combine to attack businesses and customers.  ...  In today's business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest  ...  First, criminals can take advantage of cheap, anonymous Internet calling available by using Voice over Internet Protocol (VoIP), which also allows the criminal to use simple software programs to set up  ... 
arXiv:1112.5732v1 fatcat:6rcxjz32z5fhrhe6yg252fky4e
« Previous Showing results 1 — 15 out of 59 results