Ga. Tech, BellSouth, Internet Security Systems initiate VoIP security research partnership

Sep 27, 2006

The Georgia Tech Information Security Center (GTISC) today announced it is creating a partnership with BellSouth and Internet Security Systems to explore security surrounding the emerging Voice over Internet Protocol (VoIP) technology.

As communication services migrate to Internet-based platforms, it is important that the security and dependability users expect in the current public switched networks be maintained with these new converged technologies. At the GTISC VoIP Security Summit held in April 2005, GTISC initiated a dialogue with security and telecommunications industry leaders, including ISS and BellSouth, to proactively address security associated with this emerging technology.

"At GTISC, we feel strongly that security should not be an after-thought with VoIP," said Mustaque Ahamad, principal investigator and director of GTISC. "By partnering with proven industry leaders ISS and BellSouth, GTISC will be able to lead the research efforts necessary to better understand VoIP threats and explore techniques that are well suited for securing VoIP devices, protocols and services."

Internet Security Systems and BellSouth have committed to a two-year research program totaling $300,000. This funding will enable GTISC faculty and graduate students to work with ISS and BellSouth technologists to develop and evaluate solutions that address VoIP security. In return, BellSouth and ISS will have access to the resulting intellectual property.

"Internet Security Systems was one of the first security companies to provide coverage for VoIP protocols in our products," said Christopher Rouland, chief technology officer at Internet Security Systems. "We look forward to working with experts at GTISC and BellSouth to further our understanding of VoIP vulnerabilities and how best to mitigate them for our customers."

"BellSouth is committed to ensuring security is an integral component in all our products and services and working with GTISC and ISS is one way to continue that focus with next generation products such as VoIP" said John Heveran, VP-Chief Information Security Officer, BellSouth.

Convergence of Internet technologies with traditional telecommunications services creates opportunities for added flexibility, lower costs and enhanced services and applications. However, to fully enable the benefits it is vital that any vulnerabilities be identified and addressed early. The researchers plan to conduct a security analysis of VoIP protocols and implementations and explore issues such as VoIP authentication for dealing with voice spam, modeling of VoIP traffic and device behavior, mobile phone security, and security of VoIP applications running on user agents.

Source: Georgia Institute of Technology

Explore further: Digital dilemma: How will US respond to Sony hack?

add to favorites email to friend print save as pdf

Related Stories

Recommended for you

Digital dilemma: How will US respond to Sony hack?

Dec 18, 2014

The detective work blaming North Korea for the Sony hacker break-in appears so far to be largely circumstantial, The Associated Press has learned. The dramatic conclusion of a Korean role is based on subtle ...

UN General Assembly OKs digital privacy resolution

Dec 18, 2014

The U.N. General Assembly has approved a resolution demanding better digital privacy protections for people around the world, another response to Edward Snowden's revelations about U.S. government spying.

Online privacy to remain thorny issue: survey

Dec 18, 2014

Online privacy will remain a thorny issue over the next decade, without a widely accepted system that balances user rights and personal data collection, a survey of experts showed Thursday.

Spain: Google News vanishes amid 'Google Tax' spat

Dec 16, 2014

Google on Tuesday followed through with a pledge to shut down Google News in Spain in reaction to a Spanish law requiring news publishers to receive payment for content even if they are willing to give it away.

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.