top of page
floating-spheres-3d-rendering-empty-spac

Resources

Here we collect articles related to VoIP Security analysis: studies, academic publications, news articles, our own design perspective articles, and importantly security auditing tools. The material referred to from this page is published by third parties and does represent their views.

intuitive_labs_website_icons_1-60.png
intuitive_labs_website_icons_1-65.png
intuitive_labs_website_icons_1-61.png
intuitive_labs_website_icons_1-66.png
intuitive_labs_website_icons_1-62.png
intuitive_labs_website_icons_1-67.png
intuitive_labs_website_icons_1-63.png
intuitive_labs_website_icons_1-68.png
intuitive_labs_website_icons_1-64.png
intuitive_labs_website_icons_1-69.png

BOOKS

2009: Sisalem et al: SIP Security

OUR ARTICLES ON SECURITY DESIGN

Complexity


requires specialisation. We think this argument counts even more in the security realm where complexity invites attackers to find security holes and makes audits more difficult. As VoIP is currently one of the most complex protocols, we think specialised VoIP solutions are the right choice and security is best served by a professional service operated by experts in a cloud. This is why we focus on implementing VoIP security by Analytics as a Services tools.

Security


has not been the part of the Internet architecture from early on. When it began to catch up, it changed many aspects of the Internet architecture. Today, Software-Defined-Networks and manageable security devices help to answer dynamically to security threats and reduce Time-To-Respond. See our view how middleboxes emerged. Our software architecture aims to be highly effective even in the age of cloud and encryption by correlating various sources of data and generating automated security response.

Intuition + Data + Algorithms


is what makes a program today. We put a parallel to Niklaus Wirth's equations from seventies that placed an equation between Programs and Data + Algorithms. We think the shift from Data to Big Data needs to be compensated on the Algorithm side of the equation by something stronger: that is Algorithms specialised on looking for a needle in haystack. We think that is exactly what Intuition is. We create software that implements intuition and helps to find abnormal network conditions that are hard to find otherwise.

Open-source


has been fueling innovation in the past two decades. Importantly for us, shift to cloud has created credible business models for open-source companies. See how we perceive the evolution of open-source business model in the past two decades. We keep using open-source for building our software and disclose source code publicly with our commercially licensed software, while keeping the primary focus on offering a complete and comprehensive cloud service.

VULNERABILITY REPORTS AND INCIDENT ANALYSIS

SIP SECURITY TOOLS AND SERVICES

CESNET: SIP Penetration Tests

SIP Vicious Penetration tool

Mr. SIP-based Audit and Attack Tool

ApiBan - Reputation Site

VIDEO PRESENTATIONS

2021: Intuitive's Jiri Kuthan on ClueCon

2020: Sandro Gauci: Offensive Security

2017: Sandro Gauci: RTC fuzzing also as PDF

NEWS ARTICLES

2022, Jan 11: Intuitive Labs: the intuitive VoIP analytics service received Cybersecurity Excellence Award from TMCNet

2021, Oct 28: Intuitive Labs:  sipcmbeat, SIP security analytics probe, released

2020: Adrian Taylor: The most famous DDoS Attacks in History

2019: Eric Priezkaln: A Breakdown of the CFCA Fraud Survey results, see also the CFCA Press Release

2019: Dan Godin: Microsoft catches Russian state hackers using IoT devices to breach networks

2019 (DE): Fabian A. Scherschel: VoIP Sicherheitslücken: Viele Büro Telefonanlagen grundlegend unsicher (VoIP security gaps: Many PBXes insecure)

2019: Irwin Lazar: The Threat of Tall Fraud Persists

2019: Vilija Simkiene: Europol survey: Telecom fraud is on the rise

ACADEMIC PUBLICATIONS

WEB ARTICLES AND WHITEPAPERS

COMPANY SURVEYS

OTHER RESOURCES SITES

Books
Our Articles on Security Design
Vulnerability Reports and Incident Analysis
SIP Security Tools and Services
Video Presentations
News Articles
Academic Publictions
Web Articles and Whitepapers
Company Surveys
Other Resources Sites
bottom of page