This HTML5 document contains 49 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n22http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n15http://purl.org/net/nknouf/ns/bibtex#
n13http://localhost/temp/predkladatel/
n21http://linked.opendata.cz/resource/domain/vavai/projekt/
n6http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n11http://linked.opendata.cz/resource/domain/vavai/subjekt/
n9http://linked.opendata.cz/ontology/domain/vavai/
n14https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n16http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F61989100%3A27240%2F12%3A86084368%21RIV13-MSM-27240___/
n5http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n18http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n20http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n7http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n17http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n10http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F61989100%3A27240%2F12%3A86084368%21RIV13-MSM-27240___
rdf:type
n9:Vysledek skos:Concept
dcterms:description
The paper deals with the need to enhance security of the VoIP infrastructure. There are several ways to achieve an enhancement in security. We opted for the honeypot which can provide us information about attacker’s behaviour. We will examine in particular a VoIP honeypot referred to as Artemisa. It is one of many existing honeypots tailored for IP telephony. The paper describes its function and application within a real IP telephony infrastructure. The aim of another tested honeypot is to gather data about the attacks while simulating a SSH server. The gathered information could be crucial for further improvements of the existing security mechanism in our VoIP network. The paper deals with the need to enhance security of the VoIP infrastructure. There are several ways to achieve an enhancement in security. We opted for the honeypot which can provide us information about attacker’s behaviour. We will examine in particular a VoIP honeypot referred to as Artemisa. It is one of many existing honeypots tailored for IP telephony. The paper describes its function and application within a real IP telephony infrastructure. The aim of another tested honeypot is to gather data about the attacks while simulating a SSH server. The gathered information could be crucial for further improvements of the existing security mechanism in our VoIP network.
dcterms:title
Malicious Traffic Monitoring and its Evaluation in VoIP Infrastructure Malicious Traffic Monitoring and its Evaluation in VoIP Infrastructure
skos:prefLabel
Malicious Traffic Monitoring and its Evaluation in VoIP Infrastructure Malicious Traffic Monitoring and its Evaluation in VoIP Infrastructure
skos:notation
RIV/61989100:27240/12:86084368!RIV13-MSM-27240___
n9:predkladatel
n11:orjk%3A27240
n3:aktivita
n20:P
n3:aktivity
P(7E09021)
n3:dodaniDat
n10:2013
n3:domaciTvurceVysledku
n6:7890230 n6:3398226 n6:3174182 n6:8051283
n3:druhVysledku
n8:D
n3:duvernostUdaju
n18:S
n3:entitaPredkladatele
n16:predkladatel
n3:idSjednocenehoVysledku
147913
n3:idVysledku
RIV/61989100:27240/12:86084368
n3:jazykVysledku
n7:eng
n3:klicovaSlova
VoIP honeypot; VoIP attacks; Kippo; honeypot; Artemisa
n3:klicoveSlovo
n5:Artemisa n5:honeypot n5:VoIP%20attacks n5:Kippo n5:VoIP%20honeypot
n3:kontrolniKodProRIV
[61CD8DDB568B]
n3:mistoKonaniAkce
Praha
n3:mistoVydani
New York
n3:nazevZdroje
TSP 2012 : 35th International Conference on Telecommunications and Signal Processing : July 3-4, 2012, Prague, Czech Republic
n3:obor
n17:JC
n3:pocetDomacichTvurcuVysledku
4
n3:pocetTvurcuVysledku
4
n3:projekt
n21:7E09021
n3:rokUplatneniVysledku
n10:2012
n3:tvurceVysledku
Macura, Lukáš Řezáč, Filip Šafařík, Jakub Vozňák, Miroslav
n3:typAkce
n22:WRD
n3:wos
000308143100049
n3:zahajeniAkce
2012-07-03+02:00
s:numberOfPages
4
n15:hasPublisher
IEEE
n14:isbn
978-1-4673-1116-8
n13:organizacniJednotka
27240