A system and method are provided for detecting extension attacks made to a
communication enterprise, and taking appropriate remedial action to
prevent ongoing attacks and future attacks. One or more attributes of a
suspect call are analyzed, and a risk is associated with each analyzed
attribute. An overall risk or assessment is then made of the analyzed
attributes, attack attributes are logged, and one or more remedial
actions may be triggered as a result of the analyzed call attributes. The
remedial actions may include recording the call, notifying an
administrator of a suspect call, or isolating the communication
enterprise from the attack by terminating the call or shutting down
selected communication endpoints to prevent calls being made to those
extensions. Rules may be applied to the analyzed attributes in order to
trigger the appropriate remedial action. The call attributes analyzed may
include call destination, call direction, call type, time of day of the
call, call duration, whether a call source is spoofed, call volume from a
particular call source, and hash values created for a suspect media
stream.