Cloned Identity Threats In Packetcable (2002)

By Alexander Medvinsky, Jay Strater, Motorola Broadband

MTA clones might lead to service theft, breach of privacy, and denial of service. This paper proposes techniques that may be utilized by an IP Telephony service provider to detect and disable cloned MTAs and investigates what MTA configurations make sense for tamper proof hardware. It also considers techniques involving CMTS and DHCP server configuration and filtering options for limiting the geographic distribution of MTA clones.

By clicking the "Download Paper" button, you are agreeing to our terms and conditions.

Similar Papers

Cloned Identity Threats In Packetcable
By Alexander Medvinsky, Jay Strater, Motorola Broadband
2002
Deploying Enhanced IP Services Using Packetcable Multimedia QOS Control
By Gerry White, Motorola Broadband Network Infrastructure Solutions Group
2004
Seamless Mobility Between Home Networks And Cable Services
By Jay Strater, Gordon Beacham
2005
Is The DOCSIS CMTS Sufficient For Packetcable?
By Burcak Beser, Pacific Broadband Communications
2001
Adapting Proven Technology to Counter IoT Threats
By Petr Peterka, Verimatrix
2017
VoIP Services: PacketCable Delivers A Comprehensive System
By David McIntosh, Maria Stachelek, CableLabs
2002
Packetcable: A New Interactive Cable System Technology
By Paul Baran, Packetcable Inc.
1982
Using Digital Identity to Drive Personalization, User Experience and Monetization
By Doug Fantuzzi, Amdocs Media & Entertainment Solutions
2017
Building Competitive Systems: A Packetcable Perspective
By Burcak Beser, Juniper Networks
2003
Migrating To IMS And Packetcable 2.0: How To Transition To New Multimedia And Fixed Mobile Applications
By Jonathan Rosenberg
2006
More Results >>