This HTML5 document contains 46 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n7http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n11http://purl.org/net/nknouf/ns/bibtex#
n10http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F63839172%3A_____%2F12%3A00007302%21RIV13-MSM-63839172/
n16http://linked.opendata.cz/resource/domain/vavai/projekt/
n13http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n15http://linked.opendata.cz/resource/domain/vavai/subjekt/
n14http://linked.opendata.cz/ontology/domain/vavai/
n18https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
rdfshttp://www.w3.org/2000/01/rdf-schema#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n4http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n22http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n19http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n12http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n17http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n9http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n8http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F63839172%3A_____%2F12%3A00007302%21RIV13-MSM-63839172
rdf:type
n14:Vysledek skos:Concept
rdfs:seeAlso
https://tnc2012.terena.org/core/presentation/61
dcterms:description
High popularity of VoIP in last few years leads to higher concern of hackers. Many solutions of VoIP servers are created,but security was not always the top feature of these solutions. IP telephony infrastructure provides also other services,which are not related only to VoIP traffic. All these factors lead to a situation,when a VoIP server easily becomes a target of attacks. A wide spectrum of attacks can be done against VoIP,starting from misuse attacks,congestion of existing infrastructure to a completely (or partially) denial of service. Very popular are also SPIT attacks - an analogy to spam e-mail messages. Typical SPIT attacks are unwanted,automatically dialed prerecorded calls with commercial content. This paper deals with the need of application for automatic testing VoIP server robustness against different types of attacks. High popularity of VoIP in last few years leads to higher concern of hackers. Many solutions of VoIP servers are created,but security was not always the top feature of these solutions. IP telephony infrastructure provides also other services,which are not related only to VoIP traffic. All these factors lead to a situation,when a VoIP server easily becomes a target of attacks. A wide spectrum of attacks can be done against VoIP,starting from misuse attacks,congestion of existing infrastructure to a completely (or partially) denial of service. Very popular are also SPIT attacks - an analogy to spam e-mail messages. Typical SPIT attacks are unwanted,automatically dialed prerecorded calls with commercial content. This paper deals with the need of application for automatic testing VoIP server robustness against different types of attacks.
dcterms:title
Security Evaluation of Multimedia System Security Evaluation of Multimedia System
skos:prefLabel
Security Evaluation of Multimedia System Security Evaluation of Multimedia System
skos:notation
RIV/63839172:_____/12:00007302!RIV13-MSM-63839172
n14:predkladatel
n15:ico%3A63839172
n3:aktivita
n12:P
n3:aktivity
P(LM2010005)
n3:dodaniDat
n8:2013
n3:domaciTvurceVysledku
n13:8051283 n13:7890230 n13:3174182
n3:druhVysledku
n17:D
n3:duvernostUdaju
n22:S
n3:entitaPredkladatele
n10:predkladatel
n3:idSjednocenehoVysledku
167177
n3:idVysledku
RIV/63839172:_____/12:00007302
n3:jazykVysledku
n19:eng
n3:klicovaSlova
Countermeasures; IPS; SIP server defense; VoIP attacks; Penetration tests
n3:klicoveSlovo
n4:VoIP%20attacks n4:IPS n4:Penetration%20tests n4:Countermeasures n4:SIP%20server%20defense
n3:kontrolniKodProRIV
[3C14ECA5AC4F]
n3:mistoKonaniAkce
Reykjavik
n3:mistoVydani
Reykjavik
n3:nazevZdroje
Proc. TNC2012 - Networking to Services (Selected Papers)
n3:obor
n9:IN
n3:pocetDomacichTvurcuVysledku
3
n3:pocetTvurcuVysledku
3
n3:projekt
n16:LM2010005
n3:rokUplatneniVysledku
n8:2012
n3:tvurceVysledku
Vozňák, Miroslav Šafařík, Jakub Řezáč, Filip
n3:typAkce
n7:WRD
n3:zahajeniAkce
2012-05-21+02:00
s:numberOfPages
10
n11:hasPublisher
TERENA
n18:isbn
978-90-77559-00-0