Security for SIP-Based VoIP Networks

1st Edition

Threat Modeling, Hardening, and Countermeasures

Author:

  • Vinay Rao
  • Print book

    Info/Buy

     Not Yet Available

    Pre Order

    Description

    Voice over Internet Protocol (VoIP) is eroding the use of traditional wired phone service in the home and business. The market leader is tripling subscription rates in one year which will continue to rise. As with any new technology now that it is up and running concerns turn to the security of the information being transmitted. Due to the fact that VoIP networks are often implemented over the public Internet they are left open to attacks. Vinay Rao offers a well-structured and in-depth look at VoIP security with an emphasis on SIP-based applications. He will explain protocol fundamentals, review threat analysis and hardening of security. Real-world issues and countermeasures will be discussed extensively resulting in a basic security checklist on which to base future security implementation architecture schemes.

    Key Features

    • Reduced operating costs, portability, and accessibility of VoIP has created a migration to this technology and a new platform for engineers to secure
    • General security methodologies thoroughly explained allowing the reader to adapt and evolve problem solving abilities
    • Learn to secure against identity theft, impersonation, denial or service

    Readership

    VoIP Network Architects, Service Providers, IT Managers, Graduate Students

    Table of Contents

    PART I: THE FUNDAMENTALS Technology Overview Telecommunications Networks Data Communications Networks Cryptography Fundamentals Voice Over IP A Brief Introduction to VoIP Voice Over IP Architecture SESSION INITIATION PROTOCOL (SIP) SIP Fundamentals Introduction to SIP SIP Architecture PART II: The SIP-Based VoIP Ecosystem SIP Associated Protocols and Services Opterational Overview PART III: Securing SIP-Based VoIP Section I: Threat Modeling Threat Assessment SIP Threat Assessment Models Section II: Hardening and Countermeasures Hardening Mechanisms Secure SIP and RTP Firewall and NAT Traversal Section III: Security Analysis Basic Security Analysis Toolkit The Evolution of Threats Appendices

    Details

    No. of pages:
    352
    Language:
    English
    Copyright:
    © 2020
    Imprint:
    Newnes
    Print ISBN:
    9780750685276
    Electronic ISBN:
    9780080558486