VoIP Protocols: A technical guide
Like all new technologies, VoIP implementations require careful design, testing and analysis to identify and eliminate security vulnerabilities, and reduce the risk of compromise. Here we will review the two main protocols that power VoIP -- Session Initiation Protocol (SIP) and H.323 -- and their known vulnerabilities, as well as how functional protocol testing ("fuzzing") can help defeat such problems.
Learn more about the two main VoIP protocols and their strengths and weaknesses.
Get more information on VoIP protocols and their security vulnerabilities.
This was first published in June 2007