| تعداد نشریات | 61 |
| تعداد شمارهها | 2,203 |
| تعداد مقالات | 17,958 |
| تعداد مشاهده مقاله | 55,160,539 |
| تعداد دریافت فایل اصل مقاله | 28,874,897 |
تحلیل و اولویتبندی چالشهای امنیتی وُیپ | ||
| مطالعات مدیریت کسب و کار هوشمند | ||
| مقاله 6، دوره 7، شماره 25، مهر 1397، صفحه 183-218 اصل مقاله (1.55 M) | ||
| نوع مقاله: مقاله پژوهشی | ||
| شناسه دیجیتال (DOI): 10.22054/ims.2018.9744 | ||
| نویسندگان | ||
| سعید بختیاری1؛ اسماعیل زارع* 2 | ||
| 1عضو هیئت علمی، گروه فناوری اطلاعات، دانشگاه علوم انتظامی امین، تهران | ||
| 2کارشناس ارشد مدیریت فناوری اطلاعات، دانشگاه علوم انتظامی امین. (نویسنده مسئول)، ezaree1354@chmail.ir | ||
| چکیده | ||
| معماری شبکه آیپی ازنقطهنظر امنیتی شکننده است و وُیپ نیز که از استانداردهای این شبکه استفاده میکند با حملات متعدد مورد آسیب قرار میگیرد، حملاتی که کاهش کیفیت و در مواردی قطع خدمات و اتلاف منابع وُیپ را به دنبال دارد. در این راستا تأمین امنیت وُیپ امری ضروری است و بهطورمعمول اعمال راهکارهای امنیتی در سامانهها ازجمله وُیپ موجب کندی و کاهش کیفیت عملکرد و افزایش هزینههای راهاندازی و نگهداشت میشود؛ بنابراین مدیران فناوری اطلاعات میبایست راهکارهای امنیتی با درجهی اولویت بالا را مدنظر قرار دهند. برای این کار با مرور ادبیات تحقیق، ماتریس جامع امنیت وُیپ مشتمل بر فهرست جامعی از چالشهای امنیتی وُیپ و راهکارهای مقابله استخراج گردید که کمک بسزایی در هوشمندی و مدیریت ریسک سازمانها مینماید. نتایج بهدستآمده در این مقاله نشان داد که انجام سه راهکار «جداسازی VLANهای ترافیک صوت و داده»، «احراز هویت سیگنالینگ» و «احراز هویت درگاه» بیشترین تأثیر مثبت را بر امنیت وُیپ دانشگاه علوم انتظامی خواهد داشت. نتایج حاصل با توصیهها و راهکارهای مقابله امنیتی ذکرشده توسط تحقیقات قبلی و مؤسسات معتبر امنیتی کاملاً مطابق و همراستا است و فقط اولویتهای پیشنهادی جابجا شده است. لذا در برنامههای راهبردی فناوری اطلاعات سازمان و تصمیمگیری و نظارت مدیران فناوری اطلاعات سه راهکار مذکور میبایست در اولویت بهکارگیری وُیپ لحاظ گردد. | ||
| کلیدواژهها | ||
| وُیپ؛ امنیت؛ چالش؛ راهکار مقابله | ||
| مراجع | ||
|
سعدآبادی. ع، امیرشاهی. ب، (1395)، تشخیص حملات انکار سرویس توزیعشده با استفاده از سیستم خبره، فصلنامهمطالعاتمدیریتفناوریاطلاعات، سال پنجم، شماره 17، 63-92 Aziz, A. Hoffstadt, D. Rathgeb, E. & Dreibholz, T. (2014, 2-4 June 2014). A distributed infrastructure to analyse SIP attacks in the Internet. Paper presented at the 2014 IFIP Networking Conference. Butcher, D. Li, X. & Guo, J. (2007). Security Challenge and Defense in VoIP Infrastructures. IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews). Chiappetta, S. Mazzariello, C. Presta, R. & Romano, S. P. (2013). An anomaly-based approach to the analysis of the social behavior of VoIP users. Computer Networks, 57(6), 1545-1559. Coulibaly, E. & Liu, L. H. (2010). Security Of VoIP Networks. Ding, Y. & Horster, P. (1995). Undetectable On-line Password Guessing Attacks. Farley, R. & Wang, X. (2014). Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation. International Journal of Critical Infrastructure Protection. Ghafarian, A. Seno, S. A. H. & Dehghani, M. (2016). An Empirical Study of Security of VoIP System. Hosseinpour, M. Hosseini Seno, S. A. Yaghmaee Moghaddam, M. H. & Khosravi roshkhari, H. (2016). Modeling SIP Normal Traffic to Detect and Prevent SIP-VoIP Flooding Attacks Using Fuzzy Logic. Hussain, M. Gupta, P. Bano, S. & Kulkarni, V. (2016). High-Performance and Cost-Effective VoIP Security Techniques for Operations on IPv4, IPv6, and IPv4IPv6 Networks. Keromytis, A. D. (2012). A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tutorials. Lutiis, P. D. & Lombardo, D. (2009, 26-29 Oct. 2009). An innovative way to analyze large ISP data for IMS security and monitoring. Paper presented at the 2009 13th International Conference on Intelligence in Next Generation Networks. Manunza, L. Marseglia, S. & Romano, S. P. (2017). Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks. Journal of Network and Computer Applications. Pecori, R. & Veltri, L. (2016). 3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications. Computer Communications. Perez-Botero, D. & Donoso, Y. (2011). VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures. Phithakkitnukoon, S. Dantu, R. & Baatarjav, E.A. (2008). VoIP Security — Attacks and Solutions. Information Security Journal: A Global Perspective. Shan, L. & Jiang, N. (2009). Research on Security Mechanisms of SIP-Based VoIP System. Paper presented at the 2009 Ninth International Conference on Hybrid Intelligent Systems. Sonwane, G. D. & Chandavarkar, B. R. (2013). Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network. Paper presented at the 2013 2nd International Conference on Advanced Computing, Networking and Security. Tsiatsikas, Z. Geneiatakis, D. Kambourakis, G. & Keromytis, A. D. (2015). An efficient and easily deployable method for dealing with DoS in SIP services. Computer Communications. Vennila, G. & Manikandan, M. (2016). A Scalable Detection Technique for Real-time Transport Protocol (RTP) Flooding Attacks in VoIP Network. Procedia Computer Science. Wallace, K. (2009). Cisco-Voice-over-IP-CVOICE. Xin, J. (2007). Security Issues and Countermeasure for VoIP. Zhang, L. Tang, S. & Zhu, S. (2016). An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. Journal of Network and Computer Applications.
سعدآبادی. ع، امیرشاهی. ب، (1395)، تشخیص حملات انکار سرویس توزیعشده با استفاده از سیستم خبره، فصلنامهمطالعاتمدیریتفناوریاطلاعات، سال پنجم، شماره 17، 63-92 Aziz, A. Hoffstadt, D. Rathgeb, E. & Dreibholz, T. (2014, 2-4 June 2014). A distributed infrastructure to analyse SIP attacks in the Internet. Paper presented at the 2014 IFIP Networking Conference. Butcher, D. Li, X. & Guo, J. (2007). Security Challenge and Defense in VoIP Infrastructures. IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews). Chiappetta, S. Mazzariello, C. Presta, R. & Romano, S. P. (2013). An anomaly-based approach to the analysis of the social behavior of VoIP users. Computer Networks, 57(6), 1545-1559. Coulibaly, E. & Liu, L. H. (2010). Security Of VoIP Networks. Ding, Y. & Horster, P. (1995). Undetectable On-line Password Guessing Attacks. Farley, R. & Wang, X. (2014). Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation. International Journal of Critical Infrastructure Protection. Ghafarian, A. Seno, S. A. H. & Dehghani, M. (2016). An Empirical Study of Security of VoIP System. Hosseinpour, M. Hosseini Seno, S. A. Yaghmaee Moghaddam, M. H. & Khosravi roshkhari, H. (2016). Modeling SIP Normal Traffic to Detect and Prevent SIP-VoIP Flooding Attacks Using Fuzzy Logic. Hussain, M. Gupta, P. Bano, S. & Kulkarni, V. (2016). High-Performance and Cost-Effective VoIP Security Techniques for Operations on IPv4, IPv6, and IPv4IPv6 Networks. Keromytis, A. D. (2012). A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tutorials. Lutiis, P. D. & Lombardo, D. (2009, 26-29 Oct. 2009). An innovative way to analyze large ISP data for IMS security and monitoring. Paper presented at the 2009 13th International Conference on Intelligence in Next Generation Networks. Manunza, L. Marseglia, S. & Romano, S. P. (2017). Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks. Journal of Network and Computer Applications. Pecori, R. & Veltri, L. (2016). 3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications. Computer Communications. Perez-Botero, D. & Donoso, Y. (2011). VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures. Phithakkitnukoon, S. Dantu, R. & Baatarjav, E.A. (2008). VoIP Security — Attacks and Solutions. Information Security Journal: A Global Perspective. Shan, L. & Jiang, N. (2009). Research on Security Mechanisms of SIP-Based VoIP System. Paper presented at the 2009 Ninth International Conference on Hybrid Intelligent Systems. Sonwane, G. D. & Chandavarkar, B. R. (2013). Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network. Paper presented at the 2013 2nd International Conference on Advanced Computing, Networking and Security. Tsiatsikas, Z. Geneiatakis, D. Kambourakis, G. & Keromytis, A. D. (2015). An efficient and easily deployable method for dealing with DoS in SIP services. Computer Communications. Vennila, G. & Manikandan, M. (2016). A Scalable Detection Technique for Real-time Transport Protocol (RTP) Flooding Attacks in VoIP Network. Procedia Computer Science. Wallace, K. (2009). Cisco-Voice-over-IP-CVOICE. Xin, J. (2007). Security Issues and Countermeasure for VoIP. Zhang, L. Tang, S. & Zhu, S. (2016). An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. Journal of Network and Computer Applications.
v
سعدآبادی. ع، امیرشاهی. ب، (1395)، تشخیص حملات انکار سرویس توزیعشده با استفاده از سیستم خبره، فصلنامهمطالعاتمدیریتفناوریاطلاعات، سال پنجم، شماره 17، 63-92 Aziz, A. Hoffstadt, D. Rathgeb, E. & Dreibholz, T. (2014, 2-4 June 2014). A distributed infrastructure to analyse SIP attacks in the Internet. Paper presented at the 2014 IFIP Networking Conference. Butcher, D. Li, X. & Guo, J. (2007). Security Challenge and Defense in VoIP Infrastructures. IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews). Chiappetta, S. Mazzariello, C. Presta, R. & Romano, S. P. (2013). An anomaly-based approach to the analysis of the social behavior of VoIP users. Computer Networks, 57(6), 1545-1559. Coulibaly, E. & Liu, L. H. (2010). Security Of VoIP Networks. Ding, Y. & Horster, P. (1995). Undetectable On-line Password Guessing Attacks. Farley, R. & Wang, X. (2014). Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation. International Journal of Critical Infrastructure Protection. Ghafarian, A. Seno, S. A. H. & Dehghani, M. (2016). An Empirical Study of Security of VoIP System. Hosseinpour, M. Hosseini Seno, S. A. Yaghmaee Moghaddam, M. H. & Khosravi roshkhari, H. (2016). Modeling SIP Normal Traffic to Detect and Prevent SIP-VoIP Flooding Attacks Using Fuzzy Logic. Hussain, M. Gupta, P. Bano, S. & Kulkarni, V. (2016). High-Performance and Cost-Effective VoIP Security Techniques for Operations on IPv4, IPv6, and IPv4IPv6 Networks. Keromytis, A. D. (2012). A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tutorials. Lutiis, P. D. & Lombardo, D. (2009, 26-29 Oct. 2009). An innovative way to analyze large ISP data for IMS security and monitoring. Paper presented at the 2009 13th International Conference on Intelligence in Next Generation Networks. Manunza, L. Marseglia, S. & Romano, S. P. (2017). Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks. Journal of Network and Computer Applications. Pecori, R. & Veltri, L. (2016). 3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications. Computer Communications. Perez-Botero, D. & Donoso, Y. (2011). VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures. Phithakkitnukoon, S. Dantu, R. & Baatarjav, E.A. (2008). VoIP Security — Attacks and Solutions. Information Security Journal: A Global Perspective. Shan, L. & Jiang, N. (2009). Research on Security Mechanisms of SIP-Based VoIP System. Paper presented at the 2009 Ninth International Conference on Hybrid Intelligent Systems. Sonwane, G. D. & Chandavarkar, B. R. (2013). Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network. Paper presented at the 2013 2nd International Conference on Advanced Computing, Networking and Security. Tsiatsikas, Z. Geneiatakis, D. Kambourakis, G. & Keromytis, A. D. (2015). An efficient and easily deployable method for dealing with DoS in SIP services. Computer Communications. Vennila, G. & Manikandan, M. (2016). A Scalable Detection Technique for Real-time Transport Protocol (RTP) Flooding Attacks in VoIP Network. Procedia Computer Science. Wallace, K. (2009). Cisco-Voice-over-IP-CVOICE. Xin, J. (2007). Security Issues and Countermeasure for VoIP. Zhang, L. Tang, S. & Zhu, S. (2016). An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. Journal of Network and Computer Applications.
سعدآبادی. ع، امیرشاهی. ب، (1395)، تشخیص حملات انکار سرویس توزیعشده با استفاده از سیستم خبره، فصلنامهمطالعاتمدیریتفناوریاطلاعات، سال پنجم، شماره 17، 63-92 Aziz, A. Hoffstadt, D. Rathgeb, E. & Dreibholz, T. (2014, 2-4 June 2014). A distributed infrastructure to analyse SIP attacks in the Internet. Paper presented at the 2014 IFIP Networking Conference. Butcher, D. Li, X. & Guo, J. (2007). Security Challenge and Defense in VoIP Infrastructures. IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews). Chiappetta, S. Mazzariello, C. Presta, R. & Romano, S. P. (2013). An anomaly-based approach to the analysis of the social behavior of VoIP users. Computer Networks, 57(6), 1545-1559. Coulibaly, E. & Liu, L. H. (2010). Security Of VoIP Networks. Ding, Y. & Horster, P. (1995). Undetectable On-line Password Guessing Attacks. Farley, R. & Wang, X. (2014). Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation. International Journal of Critical Infrastructure Protection. Ghafarian, A. Seno, S. A. H. & Dehghani, M. (2016). An Empirical Study of Security of VoIP System. Hosseinpour, M. Hosseini Seno, S. A. Yaghmaee Moghaddam, M. H. & Khosravi roshkhari, H. (2016). Modeling SIP Normal Traffic to Detect and Prevent SIP-VoIP Flooding Attacks Using Fuzzy Logic. Hussain, M. Gupta, P. Bano, S. & Kulkarni, V. (2016). High-Performance and Cost-Effective VoIP Security Techniques for Operations on IPv4, IPv6, and IPv4IPv6 Networks. Keromytis, A. D. (2012). A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tutorials. Lutiis, P. D. & Lombardo, D. (2009, 26-29 Oct. 2009). An innovative way to analyze large ISP data for IMS security and monitoring. Paper presented at the 2009 13th International Conference on Intelligence in Next Generation Networks. Manunza, L. Marseglia, S. & Romano, S. P. (2017). Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks. Journal of Network and Computer Applications. Pecori, R. & Veltri, L. (2016). 3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications. Computer Communications. Perez-Botero, D. & Donoso, Y. (2011). VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures. Phithakkitnukoon, S. Dantu, R. & Baatarjav, E.A. (2008). VoIP Security — Attacks and Solutions. Information Security Journal: A Global Perspective. Shan, L. & Jiang, N. (2009). Research on Security Mechanisms of SIP-Based VoIP System. Paper presented at the 2009 Ninth International Conference on Hybrid Intelligent Systems. Sonwane, G. D. & Chandavarkar, B. R. (2013). Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network. Paper presented at the 2013 2nd International Conference on Advanced Computing, Networking and Security. Tsiatsikas, Z. Geneiatakis, D. Kambourakis, G. & Keromytis, A. D. (2015). An efficient and easily deployable method for dealing with DoS in SIP services. Computer Communications. Vennila, G. & Manikandan, M. (2016). A Scalable Detection Technique for Real-time Transport Protocol (RTP) Flooding Attacks in VoIP Network. Procedia Computer Science. Wallace, K. (2009). Cisco-Voice-over-IP-CVOICE. Xin, J. (2007). Security Issues and Countermeasure for VoIP. Zhang, L. Tang, S. & Zhu, S. (2016). An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. Journal of Network and Computer Applications.
سعدآبادی. ع، امیرشاهی. ب، (1395)، تشخیص حملات انکار سرویس توزیعشده با استفاده از سیستم خبره، فصلنامهمطالعاتمدیریتفناوریاطلاعات، سال پنجم، شماره 17، 63-92 Aziz, A. Hoffstadt, D. Rathgeb, E. & Dreibholz, T. (2014, 2-4 June 2014). A distributed infrastructure to analyse SIP attacks in the Internet. Paper presented at the 2014 IFIP Networking Conference. Butcher, D. Li, X. & Guo, J. (2007). Security Challenge and Defense in VoIP Infrastructures. IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews). Chiappetta, S. Mazzariello, C. Presta, R. & Romano, S. P. (2013). An anomaly-based approach to the analysis of the social behavior of VoIP users. Computer Networks, 57(6), 1545-1559. Coulibaly, E. & Liu, L. H. (2010). Security Of VoIP Networks. Ding, Y. & Horster, P. (1995). Undetectable On-line Password Guessing Attacks. Farley, R. & Wang, X. (2014). Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation. International Journal of Critical Infrastructure Protection. Ghafarian, A. Seno, S. A. H. & Dehghani, M. (2016). An Empirical Study of Security of VoIP System. Hosseinpour, M. Hosseini Seno, S. A. Yaghmaee Moghaddam, M. H. & Khosravi roshkhari, H. (2016). Modeling SIP Normal Traffic to Detect and Prevent SIP-VoIP Flooding Attacks Using Fuzzy Logic. Hussain, M. Gupta, P. Bano, S. & Kulkarni, V. (2016). High-Performance and Cost-Effective VoIP Security Techniques for Operations on IPv4, IPv6, and IPv4IPv6 Networks. Keromytis, A. D. (2012). A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tutorials. Lutiis, P. D. & Lombardo, D. (2009, 26-29 Oct. 2009). An innovative way to analyze large ISP data for IMS security and monitoring. Paper presented at the 2009 13th International Conference on Intelligence in Next Generation Networks. Manunza, L. Marseglia, S. & Romano, S. P. (2017). Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks. Journal of Network and Computer Applications. Pecori, R. & Veltri, L. (2016). 3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications. Computer Communications. Perez-Botero, D. & Donoso, Y. (2011). VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures. Phithakkitnukoon, S. Dantu, R. & Baatarjav, E.A. (2008). VoIP Security — Attacks and Solutions. Information Security Journal: A Global Perspective. Shan, L. & Jiang, N. (2009). Research on Security Mechanisms of SIP-Based VoIP System. Paper presented at the 2009 Ninth International Conference on Hybrid Intelligent Systems. Sonwane, G. D. & Chandavarkar, B. R. (2013). Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network. Paper presented at the 2013 2nd International Conference on Advanced Computing, Networking and Security. Tsiatsikas, Z. Geneiatakis, D. Kambourakis, G. & Keromytis, A. D. (2015). An efficient and easily deployable method for dealing with DoS in SIP services. Computer Communications. Vennila, G. & Manikandan, M. (2016). A Scalable Detection Technique for Real-time Transport Protocol (RTP) Flooding Attacks in VoIP Network. Procedia Computer Science. Wallace, K. (2009). Cisco-Voice-over-IP-CVOICE. Xin, J. (2007). Security Issues and Countermeasure for VoIP. Zhang, L. Tang, S. & Zhu, S. (2016). An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. Journal of Network and Computer Applications.
| ||
|
آمار تعداد مشاهده مقاله: 912 تعداد دریافت فایل اصل مقاله: 753 |
||