Main Article Content
Voice over Internet Protocol (VoIP) technology marks an obvious advance for the development of the telecommunications network. Comparing to Public Switched Telephone Network (PSTN), VoIP oﬀers enormous beneﬁts for the business, the lower cost of building the system, multimedia connectivity and scalability. VoIP has become targeted victims for attackers because of the popularity of VoIP technology. However, most of organizations are unaware or ignore the security issues with VoIP. The main focus on this paper is to introduce and exploit security vulnerabilities in VoIP system, especially security of Session Initiation Protocol (SIP) protocol. We also discuss how to prevent attacks that target to VoIP system and protect our system.
BDUJST needs publishing rights to publish and disseminate research articles. A publishing agreement between the authors and BDUJST should be determined. This agreement deals with the transfer or license of the copyright to BDUJST and authors retain significant rights to use and share the published articles. Copyright is used to protect published articles’ description of experiments and results. BDUJST has the right to protect and defend authors’ works and reputation and take allegations of infringement, plagiarism, ethic disputes and fraud seriously.