||Recover from Voice over IP (VoIP) Device Masquerades or Voice over IP (VoIP) Server Compromise: If a Voice over IP (VoIP) server has been compromised, Service Provider and Network Operators should disconnect the server; the machine can be rebooted and reinitialized. Redundant servers can take over the network load and additional servers can be brought on-line if necessary. In the case of VoIP device masquerading, if the attack is causing limited harm, logging can be turned on and used for tracking down the offending device. Law enforcement can then be involved as appropriate. If VoIP device masquerading is causing significant harm, the portion of the network where the attack is originating can be isolated. Logging can then be used for tracking the offending device.
||Cable; Internet/Data; Wireline
||Service Provider; Network Operator
||Cyber Security;Intrusion Detection;Network Design;Network Operations;
||PacketCable Security specification. Cross reference with 7-7-8535 developed under NRIC.