Security for SIP-Based VoIP Networks

1st Edition

Threat Modeling, Hardening, and Countermeasures


Print book


 Not Yet Available

Pre Order


Voice over Internet Protocol (VoIP) is eroding the use of traditional wired phone service in the home and business. The market leader is tripling subscription rates in one year which will continue to rise. As with any new technology now that it is up and running concerns turn to the security of the information being transmitted. Due to the fact that VoIP networks are often implemented over the public Internet they are left open to attacks. Vinay Rao offers a well-structured and in-depth look at VoIP security with an emphasis on SIP-based applications. He will explain protocol fundamentals, review threat analysis and hardening of security. Real-world issues and countermeasures will be discussed extensively resulting in a basic security checklist on which to base future security implementation architecture schemes.

Key Features

  • Reduced operating costs, portability, and accessibility of VoIP has created a migration to this technology and a new platform for engineers to secure
  • General security methodologies thoroughly explained allowing the reader to adapt and evolve problem solving abilities
  • Learn to secure against identity theft, impersonation, denial or service


VoIP Network Architects, Service Providers, IT Managers, Graduate Students

Table of Contents

PART I: THE FUNDAMENTALS Technology Overview Telecommunications Networks Data Communications Networks Cryptography Fundamentals Voice Over IP A Brief Introduction to VoIP Voice Over IP Architecture SESSION INITIATION PROTOCOL (SIP) SIP Fundamentals Introduction to SIP SIP Architecture PART II: The SIP-Based VoIP Ecosystem SIP Associated Protocols and Services Opterational Overview PART III: Securing SIP-Based VoIP Section I: Threat Modeling Threat Assessment SIP Threat Assessment Models Section II: Hardening and Countermeasures Hardening Mechanisms Secure SIP and RTP Firewall and NAT Traversal Section III: Security Analysis Basic Security Analysis Toolkit The Evolution of Threats Appendices


No. of pages:
© 2020
Electronic ISBN:
Print ISBN:

About the author