Automated Hacker Mitigation

7528

Automated Hacker Mitigation

Voice networks connected to Internet are constant targets for Voice Hackers trying to compromise systems to make free phone calls. This paper explores the implementation of the log scanner ‘Fail2ban’ in conjunction with custom perl scripts to add IP Access List entries to Cisco routers and switches to block Hackers.

asterisk, digium, Atlanta, 2012, Astricon, TMC