Capture and Analysis of Malicious Traffic in VoIP Environments Using a Low Interaction Honeypot


The quantity of users of VoIP services is increasing each year. Consequently, VoIP systems get additional engaging for attackers. This paper describes the implementation of an occasional interaction honeypot for monitoring illegal activities in VoIP environments. The honeypot operated throughout ninety two days and collected 3502 events connected to the SIP protocol. The analysis of the results permits understanding the modus operandi of the attacks targeted to VoIP infrastructures. These results may be used to boost defense mechanisms like firewalls and intrusion detection systems.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Cost-Optimal Caching for D2D Networks With User Mobility: Modeling, Analysis, and Computational Approaches - 2018ABSTRACT:Caching well-liked files at the user equipments (UEs) provides an efficient way to alleviate
PROJECT TITLE :Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure - 2018ABSTRACT:This Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is based on a weakest-link security
PROJECT TITLE: Design for Testability Support for Launch and Capture Power Reduction in Launch Off Shift and Launch Off Capture Testing - 2014 ABSTRACT: At-speed or maybe faster-than-at-speed testing of VLSI circuits aims for
PROJECT TITLE :Simulation, Analysis, and Verification of Substrate Currents for Layout Optimization of Smart Power ICsABSTRACT:Today circuit failures in Smart Power ICs because of substrate couplings are partially addressed during
PROJECT TITLE :Bridging the Gap: Using Technology to Capture the Old and Encourage the NewABSTRACT:For the first time in our employer?s history, our workforce has four generations working along simultaneously, every with its unique

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry