Kamas S., Aydin M. A.

ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, vol.17, no.1, pp.3213-3218, 2017 (ESCI) identifier identifier


In telecommunication technology VoIP protocol has become a very popular technology as it is cheap, efficient. Also it has easy deployment. While it has lots of advantages it brings lots of vulnerabilities. These are Man in the middle Attack, Replay Attack, Teardown Attacks, Flooding Attacks, Toll Fraud and SPIT (Spam over IP Telephony). Spam over IP Telephony (SPIT) is an known threat in the Voice over IP Networks (VoIP). Even though evolved from email spam, SPIT is more obstructive and intrusive in nature. SPIT attack is called important threat of reliability and availability of VoIP system and also it is difficult to make SPIT call in PSTN (Public Switched Telephone Network) system. In this work It is tried to say how SPIT attacks occur, how attackers do it and also it is mentioned that prevention mechanisms and compare them in terms of feasibility, advantages and disadvantages..