{"title":"A Novel Approach to Avoid Billing Attack on VOIP System","authors":"Narendra M. Shekokar, Satish R. Devane","volume":38,"journal":"International Journal of Computer and Information Engineering","pagesStart":340,"pagesEnd":345,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/4447","abstract":"
In a recent year usage of VoIP subscription has increased tremendously as compare to Public Switching Telephone System(PSTN). A VoIP subscriber would like to know the exact tariffs of the calls made using VoIP. As the usage increases, the rate of fraud is also increases, causing users complain about excess billing. This in turn hampers the growth of VoIP .This paper describe the common frauds and attack on VoIP based system and make an attempt to solve the billing attack by creating secured channel between caller and callee.<\/p>\r\n","references":"[1] Rohit Dhamankar \"Intrusion Prevention: The Future of VoIP Security\",\r\n(online).Available:http:\/\/www.tippingpoint.com\/pdf\/resources\/whitepap\r\ners\/503160-001_TheFutureofVoIPSecurity.pdf , 2004.\r\n[2] J.Roshenburg et al., \"SIP: Session Initiation Protocol\", IETF RFC 3261,\r\nJune 2002.\r\n[3] ITU, \"Draft revised recommendation H323 V5\", Geneva, 20-30, May\r\n2003.\r\n[4] Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Xuxian Jiang, \"Billing\r\nAttacks on SIP-Based VoIP Systems\", Proceeding of the fIrst USENIX\r\nworkshop on offensive Technology, August 06-10,2007.\r\n[5] Secure SIP VoIP traffics,\r\n(online).Available :http:\/\/www.techword.com\/networking\/features\r\n[6] Atul Kahate,\"Cryptography and Network Security\", 3rd Edition Tata\r\nMcGraw-Hill ,2003.\r\n[7] A draft on \"Introduction to SSL\"\r\n(online).Available:http:\/\/docs.sun.com\/source\/816-6156-\r\n10\/contents.htm,1998\r\n[8] H. Abdelnur, V. Cridlig, R. State and O. Festor, \"VoIP Security\r\nAssessment: Methods and Tools\", IEEE conference on VoIP MaSe\r\n2006.\r\n[9] Yanlan Ding, Guiping Su, \"Intrusion detection system for signal based\r\nSIP attack through timed HCPN\", Second IEEE international\r\nConference on Availability, Reliability, Security 2007.","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 38, 2010"}