Capture and Analysis of Malicious Traffic in VoIP Environments Using a Low Interaction Honeypot


The quantity of users of VoIP services is increasing each year. Consequently, VoIP systems get additional engaging for attackers. This paper describes the implementation of an occasional interaction honeypot for monitoring illegal activities in VoIP environments. The honeypot operated throughout ninety two days and collected 3502 events connected to the SIP protocol. The analysis of the results permits understanding the modus operandi of the attacks targeted to VoIP infrastructures. These results may be used to boost defense mechanisms like firewalls and intrusion detection systems.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Attention in Reasoning Dataset, Analysis, and Modeling ABSTRACT: Although attention has become an increasingly popular component in deep neural networks for the purpose of both interpreting data and improving
PROJECT TITLE :Cost-Optimal Caching for D2D Networks With User Mobility: Modeling, Analysis, and Computational Approaches - 2018ABSTRACT:Caching well-liked files at the user equipments (UEs) provides an efficient way to alleviate
PROJECT TITLE :Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure - 2018ABSTRACT:This Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is based on a weakest-link security
PROJECT TITLE: Design for Testability Support for Launch and Capture Power Reduction in Launch Off Shift and Launch Off Capture Testing - 2014 ABSTRACT: At-speed or even faster-than-at-speed VLSI circuit testing aims at high-quality
PROJECT TITLE :Modeling, Analysis, and Scheduling of Cluster Tools With Two Independent ArmsABSTRACT:Twin-armed cluster tools for semiconductor manufacturing sometimes have had two arms fixed in opposite directions. Recently,

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry