{"title":"利用随机过程方法实现一个VoIP仿真网络","authors":"L. Behan, J. Rozhon, M. Voznák","doi":"10.1109/DS-RT47707.2019.8958656","DOIUrl":null,"url":null,"abstract":"It is not an entirely trivial matter to ensure the security of VoIP services and analyze attacks on telecommunication solutions the possible gains of which are attracting a growing number of active attackers. In many situations, it is necessary to detect and analyze these attacks, monitor their progress and then prepare an effective defence against them. The best way how to detect attacks on VoIP infrastructure is by implementing VoIP honeypot. To attract the highest number of attackers possible, our VoIP honeypots create fake VoIP traffic among themselves. This feature is based on a Markov chains principle. In this paper, we provide a complete implementation of a SIP emulation model which ensures the exchange process of SIP signaling messages between the honeypots.","PeriodicalId":377914,"journal":{"name":"2019 IEEE/ACM 23rd International Symposium on Distributed Simulation and Real Time Applications (DS-RT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementation of a VoIP simulation network by using stochastic process methods\",\"authors\":\"L. Behan, J. Rozhon, M. Voznák\",\"doi\":\"10.1109/DS-RT47707.2019.8958656\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is not an entirely trivial matter to ensure the security of VoIP services and analyze attacks on telecommunication solutions the possible gains of which are attracting a growing number of active attackers. In many situations, it is necessary to detect and analyze these attacks, monitor their progress and then prepare an effective defence against them. The best way how to detect attacks on VoIP infrastructure is by implementing VoIP honeypot. To attract the highest number of attackers possible, our VoIP honeypots create fake VoIP traffic among themselves. This feature is based on a Markov chains principle. In this paper, we provide a complete implementation of a SIP emulation model which ensures the exchange process of SIP signaling messages between the honeypots.\",\"PeriodicalId\":377914,\"journal\":{\"name\":\"2019 IEEE/ACM 23rd International Symposium on Distributed Simulation and Real Time Applications (DS-RT)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE/ACM 23rd International Symposium on Distributed Simulation and Real Time Applications (DS-RT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DS-RT47707.2019.8958656\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE/ACM 23rd International Symposium on Distributed Simulation and Real Time Applications (DS-RT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DS-RT47707.2019.8958656","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementation of a VoIP simulation network by using stochastic process methods
It is not an entirely trivial matter to ensure the security of VoIP services and analyze attacks on telecommunication solutions the possible gains of which are attracting a growing number of active attackers. In many situations, it is necessary to detect and analyze these attacks, monitor their progress and then prepare an effective defence against them. The best way how to detect attacks on VoIP infrastructure is by implementing VoIP honeypot. To attract the highest number of attackers possible, our VoIP honeypots create fake VoIP traffic among themselves. This feature is based on a Markov chains principle. In this paper, we provide a complete implementation of a SIP emulation model which ensures the exchange process of SIP signaling messages between the honeypots.