VoIP Protocols: A technical guide
Like all new technologies, VoIP implementations require careful design, testing and analysis to identify and eliminate security vulnerabilities, and reduce the risk of compromise. Here we will review the two main protocols that power VoIP -- Session Initiation Protocol (SIP) and H.323 -- and their known vulnerabilities, as well as how functional protocol testing ("fuzzing") can help defeat such problems.
Learn more about the two main VoIP protocols and their strengths and weaknesses.
Get more information on VoIP protocols and their security vulnerabilities.
For a full glossary of voice terminology, view this list of VoIP protocols.
This was first published in June 2007