"P(7E09021)" . "Macura, Luk\u00E1\u0161" . "2012-07-03+02:00"^^ . "Malicious Traffic Monitoring and its Evaluation in VoIP Infrastructure"@en . . . "\u0158ez\u00E1\u010D, Filip" . . . . . . "The paper deals with the need to enhance security of the VoIP infrastructure. There are several ways to achieve an enhancement in security. We opted for the honeypot which can provide us information about attacker\u2019s behaviour. We will examine in particular a VoIP honeypot referred to as Artemisa. It is one of many existing honeypots tailored for IP telephony. The paper describes its function and application within a real IP telephony infrastructure. The aim of another tested honeypot is to gather data about the attacks while simulating a SSH server. The gathered information could be crucial for further improvements of the existing security mechanism in our VoIP network." . "27240" . . "RIV/61989100:27240/12:86084368!RIV13-MSM-27240___" . "147913" . . "978-1-4673-1116-8" . "Malicious Traffic Monitoring and its Evaluation in VoIP Infrastructure" . "[61CD8DDB568B]" . "IEEE" . . . "RIV/61989100:27240/12:86084368" . . "Malicious Traffic Monitoring and its Evaluation in VoIP Infrastructure"@en . "TSP 2012 : 35th International Conference on Telecommunications and Signal Processing : July 3-4, 2012, Prague, Czech Republic" . . "Praha" . . . . "4"^^ . "New York" . "000308143100049" . "\u0160afa\u0159\u00EDk, Jakub" . "4"^^ . "Malicious Traffic Monitoring and its Evaluation in VoIP Infrastructure" . . "The paper deals with the need to enhance security of the VoIP infrastructure. There are several ways to achieve an enhancement in security. We opted for the honeypot which can provide us information about attacker\u2019s behaviour. We will examine in particular a VoIP honeypot referred to as Artemisa. It is one of many existing honeypots tailored for IP telephony. The paper describes its function and application within a real IP telephony infrastructure. The aim of another tested honeypot is to gather data about the attacks while simulating a SSH server. The gathered information could be crucial for further improvements of the existing security mechanism in our VoIP network."@en . . . . . "Voz\u0148\u00E1k, Miroslav" . . "VoIP honeypot; VoIP attacks; Kippo; honeypot; Artemisa"@en . "4"^^ .