Main Article Content
Voice over IP (VoIP) technology has promptly developed since it has brought back the flexibility and cost saving for businesses in the communication field. Recently, attackers have been constantly trying to exploit security vulnerabilities of VoIP. The aim of this paper is to focus on VoIP system and its security vulnerabilities. We briefly overview the VoIP architecture in the first section. Next, Session Initiation Protocol (SIP) will be basically discussed as well as its operation. The different attacks to VoIP system based on common VoIP security vulnerabilities will be mentioned in the final section, we also present the approaches that how to counter those attacks in the same part.
BDUJST needs publishing rights to publish and disseminate research articles. A publishing agreement between the authors and BDUJST should be determined. This agreement deals with the transfer or license of the copyright to BDUJST and authors retain significant rights to use and share the published articles. Copyright is used to protect published articles’ description of experiments and results. BDUJST has the right to protect and defend authors’ works and reputation and take allegations of infringement, plagiarism, ethic disputes and fraud seriously.