IDS mailing list archives

RE: Voice over IP applications vulnerabilites/attacks ?


From: Avi Chesla <avic () V-Secure com>
Date: Tue, 14 Jan 2003 15:00:55 +0200

Hi,

Excellent articles and master's thesis.

Thank you.

Your thesis mainly talks about the detection algorithms. Do you have
something about the prevention algorithms as well?

All,

Do you or anyone else familiar with products that focus on the VoIP area
(SIP proxy vulnerabilities) mainly in the detection of flood attacks (DDoS
or DoS) ?.

Best Regards,

Avi Chesla  
 


-----Original Message-----
From: Brennen Reynolds [mailto:brennen-ml () off-pisteconsulting com] 
Sent: Saturday, January 04, 2003 1:38 AM
To: Avi Chesla; focus-ids () securityfocus com
Subject: RE: Voice over IP applications vulnerabilites/attacks ?


Avi,

        I have spent a good part of the past year working with IP telephony
and evaluating the weaknesses associated with it. I have written several
papers about my work including an IEEE Communication magazine article
(http://www.off-pisteconsulting.com/research/pubs/ieee_comm.pdf), a paper
for the upcoming NDSS conference
(http://www.off-pisteconsulting.com/research/pubs/ndss03-reynolds.pdf) and
my Master's thesis
(http://www.off-pisteconsulting.com/research/pubs/reynolds-ms_thesis.pdf).
The thesis is the most comprehensive document on the subject. If you have
any questions about the material please let me know.

Brennen Reynolds
Off-Piste Consulting, LLC

-----Original Message-----
From: Avi Chesla [mailto:avic () V-Secure com]
Sent: Thursday, January 02, 2003 9:14 AM
To: 'focus-ids () securityfocus com'
Subject: Voice over IP applications vulnerabilites/attacks ?


Hi,

Is anyone familiar with Voice over IP vulnerabilities/Intrusions, 
floods etc ?

I heard Checkpoint has some new protection capabilities concerning the 
issue.


Avi



*** eSafe scanned this email for malicious content ***
*** IMPORTANT: Do not open attachments from unrecognized senders  ***



Current thread: