O'Reilly logo

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition by David Endler, Mark Collier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 12UC NETWORK INFRASTRUCTURE DENIAL OF SERVICE (DOS)

We had no idea that this would turn into a global and public infrastructure.

—Vint Cerf, one of the founding fathers of the Internet

Although there is an average of 7,000 DDoS attacks each day, most online customers have no idea what is happening.

—Prolexic on defending against DDoS attacks, 2012

UC applications such as voice and video are much more sensitive to network bandwidth issues than most other applications in your environment. Why? Because all UC conversations have specific bandwidth and latency requirements in order to sound clear, as compared to traditional network data applications such as email and web applications, which are a little more forgiving. In this chapter, we ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required