Deterring VoIP protocol attacks with fuzzing

Standard VoIP protocols are rife with security issues. However, with fuzzing, most of these weaknesses can be identified and patched. This tip examines this technique as well as points out a few examples.

Standard VoIP protocols are rife with security issues. However, with fuzzing, value-added resellers (VARs) and systems integrators can identify and patch most of these weaknesses. This tip examines this technique as well as points out a few examples.

How to use fuzzing to deter VoIP protocol attacks

Functional protocol testing, also known as "black-box testing" or "fuzzing," sends many diverse input messages to a vendor's implementation, exercising error handling routines and generating conditions never anticipated by the protocol designers or software developers.

Testing alone cannot defeat all attacks against VoIP. How you choose to deploy, configure and use your VoIP products is equally important. However, tests like these can help you reduce the inherent risk posed by SIP and H.323 protocols.

Learn more about functional protocol testing and VoIP.

Get more information on VoIP protocols and their security vulnerabilities.

For a full glossary of voice terminology, view this list of VoIP protocols.

This was last published in December 2006

Dig Deeper on Voice over IP (VoIP) and unified communications services and technology

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

Close