This chapter covers the simulation, analysis, and mitigation of the following threats:
CHAPTER 6Analysis and Simulation of Current Threats
Several of the chapters in Part I introduced concepts and ideas behind current threats and protection methods at a high level. This chapter digs into the topic to find practical information that can be applied to real VoIP service environments.
In this chapter, you see the details of the threats and the methodology of protection. These are the threats that this chapter covers:
• Denial of Service (intentional and unintentional flooding)
• Malformed messages
• Sniffing/eavesdropping
• Spoofing/identity ...
Get Voice over IP Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.