Skip to main content

Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7873))

Abstract

Voice over IP systems are more and more replacing Public Switched Telephone Network infrastructures. The number of voice telephony installations and the number of Session Initiation Protocol users is constantly increasing. Attacks against Voice over IP systems are becoming more imaginative and many attacks can cause financial damage, e.g., attackers gain money or create costs for the victim. Therefore, the dependency on available and secure Voice over IP systems to conduct secure business is given. We provide an environment to uncover real-world toll fraud attacks by collecting data using a Voice over IP honeynet solution.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Allouni, H., Rohiem, A.E., Hashem, M., El-moghazy, A., Ahmed, A.E.-A.: Voip denial of service attacks classification and implementation. In: National Radio Science Conference (NRSC), pp. 1–12 (2009)

    Google Scholar 

  2. Blake, E.A.: Network security: Voip security on data network–a guide. In: InfoSecCD 2007: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, pp. 1–7. ACM, New York (2007)

    Google Scholar 

  3. Butcher, D., Li, X., Guo, J.: Security challenge and defense in voip infrastructures. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 37(6), 1152–1162 (2007)

    Article  Google Scholar 

  4. Dainotti, A., King, A., Claffy, K., Papale, F., Pescapè, A.: Analysis of a ”/0” stealth scan from a botnet. In: Proceedings of the 2012 ACM Conference on Internet Measurement Conference, IMC 2012, pp. 1–14. ACM, New York (2012)

    Chapter  Google Scholar 

  5. Endler, D., Collier, M.: Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions. McGraw-Hill, Inc., New York (2007)

    Google Scholar 

  6. Gauci, S.: Distributed sip scanning during halloween weekend, http://blog.sipvicious.org/2010/11/distributed-sip-scanning-during.html (last accessed: January 12, 2013)

  7. Gruber, M., Fankhauser, F., Taber, S., Schanes, C., Grechenig, T.: Trapping and analyzing malicious voip traffic using a honeynet approach. In: The 6th International Conference on Internet Technology and Secured Transactions (ICITST), pp. 442–447 (December 2011)

    Google Scholar 

  8. Hofbauer, S., Beckers, K., Quirchmayr, G., Sorge, C.: A lightweight privacy preserving approach for analyzing communication records to prevent voip attacks using toll fraud as an example. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 992–997 (June 2012)

    Google Scholar 

  9. Hoffstadt, D., Marold, A., Rathgeb, E.: Analysis of sip-based threats using a voip honeynet system. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 541–548 (June 2012)

    Google Scholar 

  10. Nassar, M., State, R., Festor, O.: Voip malware: Attack tool & attack scenarios. In: IEEE International Conference on Communications, ICC 2009, pp. 1–6 (June 2009)

    Google Scholar 

  11. Ruiz-Agundez, I., Penya, Y.K., Bringas, P.G.: Fraud detection for voice over IP services on next-generation networks. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds.) WISTP 2010. LNCS, vol. 6033, pp. 199–212. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  12. SANS Internet Storm Center. Port details — sans internet storm center, http://isc.sans.edu/port.html?port=5060 (last accessed: January 12, 2013)

  13. Spitzner, L.: The honeynet project: trapping the hackers. IEEE Security & Privacy Magazine 1(2), 15–23 (2003)

    Article  Google Scholar 

  14. Valli, C., Al-Lawati, M.: Developing robust voip router honeypots using device fingerprints. In: 1st International Cyber Resilience Conference (August 2010)

    Google Scholar 

  15. VoIP Security Alliance. Voipsa, voip security and privacy threat taxonomy, http://www.voipsa.org/Activities/VOIPSA_Threat_Taxonomy_0.1.pdf (last accessed: January 12, 2013)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gruber, M., Schanes, C., Fankhauser, F., Moutran, M., Grechenig, T. (2013). Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38631-2_49

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38630-5

  • Online ISBN: 978-3-642-38631-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics