Date Added: Dec 2012
In this paper, the authors aim at gathering information about attacks from real internet infrastructure and their analysis. For this purpose, they prepared a set of honeypots monitoring various aspects of now-a-days VoIP infrastructure, from emulating an end point device through SIP proxy to SSH terminal emulation. All these application called honeypots bring valuable data about hacker's activity with no threat to the running system. Grouping single honeypots in one cloud solution enables to gather more data on hacker activities and to provide results with higher information value. Analysis of a honeypot data is crucial for further improvement of existing security mechanisms in VoIP networks.