Multiple design patterns for Voice over IP (VoIP) security

Zahid Anwar, William Yurcik, Ralph E. Johnson, Munawar Hafiz, Roy H. Campbell

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Design patterns capture software solutions to specific problems that have evolved over time and reflect many iterations of work. Documenting such patterns promotes proven design and software reuse. There has been a growing amount of work documenting design patterns for security, however, little work specific to VoIP security. In 2005 NIST released a report on recommendations and best practices for securing VoEP, however it lacks the structure, terminology, and ease-of-understanding needed for both technical and non-technical audiences that is an inherent feature of design patterns. In this paper we document three design patterns for VoIP implementations related to specific security problems: (1) secure traversal of firewalls and NATs; (2) detecting and mitigating DDoS attacks; and (3) securing against eavesdropping. With many VoIP vendors rushing products to market with overlapping functionality and requirements for interoperability, documenting design patterns is poised to become an important part of secure programming processes for VoIP.

Original languageEnglish (US)
Title of host publication25th IEEE International Performance, Computing, and Communications Conference, 2006, IPCCC 2006
Pages485-492
Number of pages8
DOIs
StatePublished - 2006
Event25th IEEE International Performance, Computing, and Communications Conference, 2006, IPCCC 2006 - Phoenix, AZ, United States
Duration: Apr 10 2006Apr 12 2006

Publication series

NameConference Proceedings of the IEEE International Performance, Computing, and Communications Conference
Volume2006

Other

Other25th IEEE International Performance, Computing, and Communications Conference, 2006, IPCCC 2006
Country/TerritoryUnited States
CityPhoenix, AZ
Period4/10/064/12/06

Keywords

  • Internet telephony
  • Secure traversal of firewalls and NATs
  • Security design patterns
  • Threat modeling
  • VoIP security

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Multiple design patterns for Voice over IP (VoIP) security'. Together they form a unique fingerprint.

Cite this