970 research outputs found

    AN ANALYSIS OF VOICE OVER INTERNET PROTOCOL (VOIP) AND ITS SECURITY IMPLEMENTATION

    Get PDF
    Voice over Internet Protocol (VoIP) has been in existence for a number of years but only quite recently has it developed into mass adoption. As VoIP technology penetrates worldwide telecommunications markets, the advancements achieved in performance, cost reduction, and feature supportmake VoIP a convincingproposition for service providers, equipment manufacturers, and end users. Since the introduction of mass-market VoIP services over broadband Internet in 2004, security and safeguarding are becoming a more important obligation in VoIP solutions. The purpose of this final year project is to study and analyze VoIP and implement the security aspect using Secure Real-time Transport Protocol (SRTP) end-to-end media encryption in the Universiti Teknologi PETRONAS (UTP) laboratory. Extensive research, evaluation of case studies, literature reviews, network analysis, as well as testing and experimentation are the methods employed in achieving a secure and reliable VoIP network. With the given time frame and adequate resources, the study and analysis of VoIP and implementation of SRTP should prove to be very successful

    A method for forensic artifact collection, analysis and incident response in environments running Session Initiation Protocol (SIP) and Session Description protocol

    Get PDF
    In this paper, we perform an analysis of SIP, a popular voice over IP (VoIP) protocol and propose a framework for capturing and analysing volatile VoIP data in order to determine forensic readiness requirements for effectively identifying an attacker. The analysis was performed on real attack data and the findings were encouraging. It seems that if appropriate forensic readiness processes and controls are in place, a wealth of evidence can be obtained. The type of the end user equipment of the internal users, the private IP, the software that is used can help build a reliable baseline information database. On the other hand the private IP addresses of the potential attacker even during the presence of NAT services, as well as and the attack tools employed by the malicious parties are logged for further analysis

    TABLE OF CONTENTS

    Get PDF
    Once you are aware of the benefits and applications of Voice over IP, it is too good to resist. Perhaps that is why vendors are flooding the market with VOIP products and services. The following paper analyzes the various issues in the evolving VOIP technology and the challenges in the development of VOIP products. It then presents the features of few VOIP Products offered by the leaders in this field, how well they handle the issues and som

    Creation of value with open source software in the telecommunications field

    Get PDF
    Tese de doutoramento. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 200

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue Network Security: An Achilles Heel for Organizations of All Sizes Providing Backup in a VolP World Security Concerns Shift lnward Cell Phones, Land Lines, and E911 Security Checklists Higher Ed\u27s Tricky Equation: Directories Help Balance Availability with Security Disaster Recovery Planning Essentials Passing the Test of productivity Interview President\u27s Message From the Executive Director Here\u27s My Advic

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue Network Security: An Achilles Heel for Organizations of All Sizes Providing Backup in a VolP World Security Concerns Shift lnward Cell Phones, Land Lines, and E911 Security Checklists Higher Ed\u27s Tricky Equation: Directories Help Balance Availability with Security Disaster Recovery Planning Essentials Passing the Test of productivity Interview President\u27s Message From the Executive Director Here\u27s My Advic

    Comparison of different ways to avoid internet traffic interception

    Get PDF
    Projecte fet en col.laboració amb la Norwegian University of Science and Technology. Department of Telematic EngineeringEnglish: The main objective of this thesis is to analyze and compare different ways to avoid the Internet traffic eavesdropping (carried out both by governments or malicious particulars). The analysis consists on a description of the different protocols and technologies involved in each option as well as the difficulties to implement them and the technical knowledge of the users in order to take profit of them

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This This The Strategic Accommodation of Change Good Advice: Clean Out Your Closets (and More) Making Decisions to Remove Legacy Cable ADVERTORIAL: Best Practices for lP Telephony lmplementation ADVERTORIAL: VolP Security: Myth or Reality? ln-Room Phones: Nice or Necessary? Voice and Network Department Convergence Making Communications Accessible lnstitutional Excellence Award: Sinclair Community College Interview President\u27s Message From the Executive Director Here\u27s My Advic
    • …
    corecore