VoIP (Voice Over Internet Protocol) has become popular among organisations and users. Its ability to converge voice, images and data in the same network makes it more flexible and cost effective compared to the traditional telephone system. However, it comes with a number of security constraints in the midst of these advantages. We give an overview of VoIP protocols and the vulnerabilities that accompany them, as well as the classification of threats that are associated with VoIP. We also present popular attacks on VoIP systems, and measures to mitigate such attacks. We suggest more research on some areas, while encouraging the adoption of some already proposed security approaches Download
Instant paper submission
Free plagiarism checking
No copyright transfer
Subject specific journals
Author loyalty reward