About: Monitoring of Malicious Traffic in IP Telephony Infrastructure     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : http://linked.opendata.cz/ontology/domain/vavai/Vysledek, within Data Space : linked.opendata.cz associated with source document(s)

AttributesValues
rdf:type
rdfs:seeAlso
Description
  • The technical report aims at monitoring and analysis of malicious traffic in Voice over IP networks. The traffic is monitored via prepared set of honeypot applications,which can monitor various aspects of nowadays IP telephony infrastructure - from an end-point-device to PBX (Private branch exchange) functionality emulation. Using a honeypot brings valuable data about attacks with no threat to production systems. Grouping honeypots in different locations into one cloud solution provides more accurate data and independent results. An analysis of a honeypot data is crucial for further improvement of existing security mechanism in IP telephony infrastructure. The report contains information about each honeypot included in proposed cloud solution with an analysis of a detected malicious activity.
  • The technical report aims at monitoring and analysis of malicious traffic in Voice over IP networks. The traffic is monitored via prepared set of honeypot applications,which can monitor various aspects of nowadays IP telephony infrastructure - from an end-point-device to PBX (Private branch exchange) functionality emulation. Using a honeypot brings valuable data about attacks with no threat to production systems. Grouping honeypots in different locations into one cloud solution provides more accurate data and independent results. An analysis of a honeypot data is crucial for further improvement of existing security mechanism in IP telephony infrastructure. The report contains information about each honeypot included in proposed cloud solution with an analysis of a detected malicious activity. (en)
Title
  • Monitoring of Malicious Traffic in IP Telephony Infrastructure
  • Monitoring of Malicious Traffic in IP Telephony Infrastructure (en)
skos:prefLabel
  • Monitoring of Malicious Traffic in IP Telephony Infrastructure
  • Monitoring of Malicious Traffic in IP Telephony Infrastructure (en)
skos:notation
  • RIV/63839172:_____/12:00007394!RIV13-MSM-63839172
http://linked.open...avai/riv/aktivita
http://linked.open...avai/riv/aktivity
  • P(LM2010005)
http://linked.open...vai/riv/dodaniDat
http://linked.open...aciTvurceVysledku
http://linked.open.../riv/druhVysledku
http://linked.open...iv/duvernostUdaju
http://linked.open...titaPredkladatele
http://linked.open...dnocenehoVysledku
  • 151656
http://linked.open...ai/riv/idVysledku
  • RIV/63839172:_____/12:00007394
http://linked.open...riv/jazykVysledku
http://linked.open.../riv/klicovaSlova
  • VoIP honeypot; VoIP attacks; Kippo; honeypot; Dionaea; Artemisa (en)
http://linked.open.../riv/klicoveSlovo
http://linked.open...i/riv/kodPristupu
http://linked.open...ontrolniKodProRIV
  • [40312963FD91]
http://linked.open...telVyzkumneZpravy
  • CESNET
http://linked.open...in/vavai/riv/obor
http://linked.open...ichTvurcuVysledku
http://linked.open...cetTvurcuVysledku
http://linked.open...vavai/riv/projekt
http://linked.open...UplatneniVysledku
http://linked.open...iv/tvurceVysledku
  • Vozňák, Miroslav
  • Řezáč, Filip
  • Šafařík, Jakub
http://linked.open...rzeVyzkumneZpravy
  • Technické zpávy CESNET, 2012
Faceted Search & Find service v1.16.118 as of Jun 21 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3240 as of Jun 21 2024, on Linux (x86_64-pc-linux-gnu), Single-Server Edition (126 GB total memory, 58 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software