Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation.
Ryan FarleyXinyuan WangPublished in: Int. J. Crit. Infrastructure Prot. (2014)
Keyphrases
- countermeasures
- security flaws
- security risks
- security vulnerabilities
- security mechanisms
- denial of service
- dos attacks
- information security
- buffer overflow
- computer systems
- web services
- data corruption
- security issues
- traffic analysis
- attack scenarios
- security breaches
- attack graphs
- packet loss
- computer technology
- security threats
- malicious attacks
- network architecture
- watermarking scheme
- resource constrained
- risk management
- denial of service attacks
- malicious users
- authentication scheme
- mobile devices
- unauthorized access
- neural network
- mobile ad hoc networks
- response time
- input output
- quality of service