Fraud Attacks in VoIP-Based Communications Systems (Risk Analysis, Prevention, Protection, Detection)

This paper explains how fraud on modern VoIP-Systems works and which attacks are executed. This was examined practically by the example of a honey pot PBX, which ran for about 3 months and was monitored accordingly. Furthermore, this paper presents possibilities of how to protect productive VoIP sys...

Full description

Bibliographic Details
Main Authors: Benedikt Machens, Olaf Gebauer, Diederich Wermser
Format: Article
Language:English
Published: Anhalt University of Applied Sciences 2017-03-01
Series:Proceedings of the International Conference on Applied Innovations in IT
Subjects:
Online Access:https://icaiit.org/paper.php?paper=5th_ICAIIT/S1_1