3,293 research outputs found

    Preventing Distributed Denial-of-Service Attacks on the IMS Emergency Services Support through Adaptive Firewall Pinholing

    Full text link
    Emergency services are vital services that Next Generation Networks (NGNs) have to provide. As the IP Multimedia Subsystem (IMS) is in the heart of NGNs, 3GPP has carried the burden of specifying a standardized IMS-based emergency services framework. Unfortunately, like any other IP-based standards, the IMS-based emergency service framework is prone to Distributed Denial of Service (DDoS) attacks. We propose in this work, a simple but efficient solution that can prevent certain types of such attacks by creating firewall pinholes that regular clients will surely be able to pass in contrast to the attackers clients. Our solution was implemented, tested in an appropriate testbed, and its efficiency was proven.Comment: 17 Pages, IJNGN Journa

    Security in Peer-to-Peer SIP VoIP

    Get PDF
    VoIP (Voice over Internet Protocol) is one of the fastest growing technologies in the world. It is used by people all over the world for communication. But with the growing popularity of internet, security is one of the biggest concerns. It is important that the intruders are not able to sniff the packets that are transmitted over the internet through VoIP. Session Initiation Protocol (SIP) is the most popular and commonly used protocol of VoIP. Now days, companies like Skype are using Peer-to-Peer SIP VoIP for faster and better performance. Through this project I am improving an already existing Peer-to-Peer SIP VoIP called SOSIMPLE P2P VoIP by adding confidentiality in the protocol with the help of public key cryptography

    The Virtual Device: Expanding Wireless Communication Services Through Service Discovery and Session Mobility

    Get PDF
    We present a location-based, ubiquitous service architecture, based on the Session Initiation Protocol (SIP) and a service discovery protocol that enables users to enhance the multimedia communications services available on their mobile devices by discovering other local devices, and including them in their active sessions, creating a 'virtual device.' We have implemented our concept based on Columbia University's multimedia environment and we show its feasibility by a performance analysis

    Development of iSpeak: A voice activated Relationship Management System

    Get PDF
    A constant source of frustration for subscribers of mobile telephony in Nigeria is the quality of customer care service. The ubiquitous IVR systems deployed by service providers often ends in long and winding texting of digits that terminate in calls to agents with poor CRM attitudes. Automation of most of the functions of the human agent goes a long way in mitigating this problem. This paper describes iSpeak – a system designed to reduce the human–to–human (H2H) interaction in the complaint-lodging and solution provision process to a minimal level where it is not possible to eradicate it totally by a replacement with human–to–system (H2S) interactivity. iSpeak has an inherent capacity for improving the efficiency and drastically cutting CRM cost of corporate organizations. This comes with the attendant advantage of improved business-customer relationship. Keywords – Automatic Speech Recognition, Customer Care Service, Speech-control, Customer Voice Model, Voice Print, Voice Recognition

    Reliable Session Initiation Protocol

    Get PDF

    Evaluating and improving firewalls for ip-telephony environments

    Get PDF
    Firewalls are a well established security mechanism for providing access control and auditing at the borders between different administrative network domains. Their basic architecture, techniques and operation modes did not change fundamentally during the last years. On the other side new challenges emerge rapidly when new innovative application domains have to be supported. IP-Telephony applications are considered to have a huge economic potential in the near future. For their widespread acceptance and thereby their economic success they must cope with established security policies. Existing firewalls face immense problems here, if they - as it still happens quite often - try to handle the new challenges in a way they did with "traditional applications". As we will show in this paper, IP-Telephony applications differ from those in many aspects, which makes such an approach quite inadequate. After identifying and characterizing the problems we therefore describe and evaluate a more appropriate approach. The feasibility of our architecture will be shown. It forms the basis of a prototype implementation, that we are currently working on
    • …
    corecore