Fraud Attacks in VoIP-Based Communications Systems (Risk Analysis, Prevention, Protection, Detection)
This paper explains how fraud on modern VoIP-Systems works and which attacks are executed. This was examined practically by the example of a honey pot PBX, which ran for about 3 months and was monitored accordingly. Furthermore, this paper presents possibilities of how to protect productive VoIP sys...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Anhalt University of Applied Sciences
2017-03-01
|
Series: | Proceedings of the International Conference on Applied Innovations in IT |
Subjects: | |
Online Access: | https://icaiit.org/paper.php?paper=5th_ICAIIT/S1_1 |