• Title/Summary/Keyword: IP

Search Result 6,850, Processing Time 0.032 seconds

A Study of Wired and wireless VoIP vulnerability analysis and hacking attacks and security (유무선 VoIP 취약점 분석과 해킹공격 및 보안 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.737-744
    • /
    • 2012
  • Recently VoIP has provided voice(both wired and wireless from IP-based) as well as the transmission of multimedia information. VoIP used All-IP type, Gateway type, mVoIP etc. Wired and wireless VoIP has security vulnerabilities that VoIP call control signals, illegal eavesdropping, service misuse attacks, denial of service attack, as well as wireless vulnerabilities etc. from WiFi Zone. Therefore, the analysis of security vulnerabilities in wired and wireless VoIP and hacking incidents on security measures for research and study is needed. In this paper, VoIP (All-IP type, and for Gateway type) for system and network scanning, and, IP Phone to get the information and analysis of the vulnerability. All-IP type and Gateway type discovered about the vulnerability of VoIP hacking attacks (Denial of Service attacks, VoIP spam attacks) is carried out. And that is a real VoIP system installed and operated in the field of security measures through research and analysis is proposed.

A Study of VoIP Secure Gateway (VOIP 보안 게이트웨이에 관한 연구)

  • Park Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.237-244
    • /
    • 2005
  • IP-Internet Telephony Service has not vet been achieved that of operating an IP-PBX service and a consumer Internet telephone services using VoIP technologies. In this paper, i suggest that the technologies of the VoIP Secure Gateway have connecting and securing for IP-Internet Telephony Service which makes If telephony protocols, firewall VPN tunneling, using Application Level Gateway, connection of the VoIP Secure Gateway. I suggest of telecommunication technologies that are enables an enterprise If-PBX service to interoperate with a consumer IP telephony service through a firewall. Also, I have proposed the solutions of security problems which was the security for VoIP Secure Gateway.

  • PDF

The development of a VoIP system with Mobile IP in all-IP networks (유무선통합 All-IP망에서 Mobile IP기반 VoIP시스템 개발)

  • 김경수;조계호;김원태;박용진
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.109-111
    • /
    • 2003
  • 본 논문은 최근 활성화되고 있는 VoIP 서비스 기술에 이동성을 보장하기 위해 Mobile IP기술을 접목시킨 시스템을 설계하고 개발한다. PDA와 같은 임베디드 시스템의 제한된 자원을 효율적으로 이용하기 위한 VoIP 서비스용 시스템에 필요한 요구사항과 문제점들을 분석하고 해결책을 제시한다. 또 이동환경에서의 VoIP 서비스를 제공하기 위해 Mobile IP 통신 모듈을 선계하고 구현한다. 유무선 통합 실험망을 이용하여, 개발된 Mobile IP 기반 VoIP시스템의 기능을 검증하고 향후 방안을 제시한다.

  • PDF

A Study on the VoIP Security Countermeasure of SIP-based (SIP(Session Initiation Protocol) 기반의 VoIP 보안 대책 연구)

  • Tae, Jang-Won;Kwak, Jin-Suk
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.421-428
    • /
    • 2013
  • Voice over IP refers to technology that enables routing of voice conversations over the Internet or a TCP/IP network. VoIP communication costs cheaper than traditional analog phone. Phone calls can be made to anywhere / anyone: Both to VoIP numbers as well as people with normal phone numbers. VoIP protocol equipment available today follows the SIP standard. Older VoIP equipment though would follow H 323, MGCP, Megaco/H.248. A SIP server is the main component of an IP PBX, dealing with the setup of all SIP calls in the TCP/IP network. A SIP server is also referred to a Asterisk IP-PBX. A VoIP telephone, also known as a SIP phone or a softphone, allows the user to make phone calls to any softphone, mobile or PC by using App store. A VoIP telephone can be a simple software-based softphone. However, the SIP Server and the program is vulnerable to VoIP attacks. In this paper, eavesdropping attacks tested by using the Asterisk SIP server. Eavesdropping attacks and TLS security methods apply to VoIP system. TLS can be applied to determine whether the eavesdropping available for VoIP Environments.

Hacking Attacks and Security Measures on All-IP Method and Gateway Method (All-IP방식과 Gateway방식에 대한 해킹공격과 보안대책)

  • Kwon, Se-Hwan;Park, Dea-Woo;Yoon, Kyung-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.265-268
    • /
    • 2011
  • Voice over Internet protocol(VoIP) is support a VoIP service as All-IP method and Gateway method etc. All-IP method to the unit in an Internet environment by applying both the IP service is an VoIP system. Gateway method, using a normal phone call in a way that the Internet is using VoIP. In this paper, scanning and analyze the vulnerability for VoIP systems and networks from All-IP method and the Gateway method In the test bed. All-IP method and Gateway method found in the VoIP vulnerabilities, hacking attack, a denial of service attacks and VoIP spam attacks are carried out. Through analysis of post-attack security measures is proposed.

  • PDF

Curriculum model plans to extend the IP training base (IP(지식재산권) 교육 저변확대를 위한 교과운영모델 방안)

  • Jo, Jaeshin;Song, Yosoon
    • Journal of Digital Contents Society
    • /
    • v.17 no.5
    • /
    • pp.329-338
    • /
    • 2016
  • As the creative economy is considered important recently, learner-centered IP(Intellectual Property) education has proliferated rapidly to universities, and there are greater attention and demand on IP education. On the other hand, there are lack of curriculums and an accreditation for IP education. This paper is to propose IP education module and emphasize the need of the accreditation for IP education and its authentication plan. This paper will also show the need of specialists and educational curriculum in the field of IP, the current status and the analyse of the IP education, and the trend of IP courses in intellectual-property-leading universities. It subsequently examines the domestic education accreditation system and the National Competency Standard(NCS) curriculum and suggests the IP education 8 courses model as a curriculum management model, the standard curriculum of the IP educational system, and the instructional module.

The Dynamic Flow Classification Method According to the VC Usage in IP Switching (IP 스위칭에서 VC 사용량에 따른 동적 흐름 분류 방법)

  • 박세환;박광채
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.1
    • /
    • pp.73-79
    • /
    • 2001
  • IP Switching is a new routing technology Proposed to improve the Performance of IP routers. Flow classification is one of the key issues in IP Switching. To achieve better performance, flow classification should be matched to the varying IP traffic and an IP switch should make use of its hardware switching resources as fully as possible. This paper proposes an dynamic flow classification method for IP Switching. By dynamically adjusting the values of its control parameters in response to the present usage of the hardware switching resources, this dynamic method can efficiently match the varying IP traffic and thus improve the performance of an IP switch.

  • PDF

A Cost-Effective IP Paging Scheme for Hierarchical Mobile IP Networks (계층적 이동 IP 네트워크에서의 비용 효율적인 IP 페이징 기법)

  • Kong, Ki-Sik
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.84-90
    • /
    • 2011
  • Handling paging mechanism at the IP layer (i.e., IP paging) makes it possible to support heterogeneous wireless access technologies, providing energy-saving and reduced location registration signaling overhead over IP-based mobile networks. However, IP paging may rather cause adverse effects under active communication environments because of significant paging signaling overhead and frequent paging delay. Therefore, in order to solve these problems, a cost-effective IP paging scheme is proposed in this paper, which enables a mobile node to perform selective registration and paging based on its profile information. Numerical results indicate that the proposed scheme has apparent potential to mitigate considerable paging signaling overhead and frequent paging delay in IP-based hierarchical mobile networks.

VoIP service performance improvements of MANET based on Diffserv (Diffserv기반 MANET에서 VoIP 서비스 성능 개선)

  • Yoon, Tong-il;Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.777-779
    • /
    • 2009
  • Study for VoIP in MANET is mainly focused on transmission performance or voice quality of VoIP traffic as single traffic. In this study, VoIP performance is analyzed of MANET which has several types of traffics. Diffserv scheme is used to process the traffics. It is showed that VoIP traffic performance is improved by differv scheme, as a result of analysis for VoIP and FTP traffic. Simulator, which is implemented with NS-2 package and VoIP patch, is used.

  • PDF

Hardware based set-associative IP address lookup scheme (하드웨어 기란 집합연관 IP 주소 검색 방식)

  • Yun Sang-Kyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8B
    • /
    • pp.541-548
    • /
    • 2005
  • IP lookup and forwarding process becomes the bottleneck of packet transmission as IP traffic increases. Previous hardware-based IP address lookup schemes using an index-based table are not memory-efficient due to sparse distribution of the routing prefixes. In this paper, we propose memory-efficient hardware based IP lookup scheme called set-associative IP address lookup scheme, which provides the same IP lookup speed with much smaller memory requirement. In the proposed scheme, an NHA entry stores the prefix and next hop together. The IP lookup procedure compares a destination IP address with eight entries in a corresponding set simultaneously and finds the longest matched prefix. The memory requirement of the proposed scheme is about $42\%$ of that of Lin's scheme. Thus, the set-associative IP address lookup scheme is a memory-efficient hardware based IP address lookup scheme.