The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A mix is a communication proxy that hides the relationship between incoming and outgoing messages. Routing traffic through a path of mixes is a powerful tool for providing privacy. When mixes are used for interactive communication, such as VoIP and web browsing, attackers can undermine user privacy by observing timing information along the path. Mixes can prevent these attacks by inserting dummy packets...
Research, Development and Evaluation Commission once hold an Internet election of “Top Ten Complaints”, the result showed that the overabundance of phone and Internet fraud was included. This result represents that the phone and Internet fraud trouble people a lot. Thus, this paper will first discuss the analysis of the crime mode of phone and Internet fraud and the collect the security threats of...
Voice over Internet protocol is the ability of transmitting voice using the Internet protocol. This paper addresses an introduction to VoIP, threats of VoIP and studies previous works of secure VoIP. We also propose practical implementations for securing VoIP by using Java and Android. Finally we give security analysis of our implementation and analyze different protocols involved in making VoIP more...
During the last years, Internet facilities like email, the world-wide-web (WWW), and e-commerce have generated a boost of Internet growth, making offering services possible in fundamentally new ways. One of these services is Voice over IP (VoIP), also named Internet Telephony (IP telephony). With most major telecommunications carriers preparing for VoIP mass deployment, the security of service cannot...
As the number of VoIP users increase and as the deployment of SIP devices gains ground, security has risen as a potential issue worthy of our consideration. VoIP is an application running on the data network and as such, inherits the security issues common to IP. The man-in-the-middle (MitM) attacks and the denial of service (DoS) attacks are the hackneyed and evil cyber attacks in the IP which can...
In the last few years the number and impact of security attacks over the Internet, and in particular against VoIP, have been continuously increasing. To face this issue, the use of intrusion detection systems (IDSs) has emerged as a key element in network and application security. In this paper we address the problem considering a novel statistical technique for detecting attacks towards the SIP protocol...
A home gateway (HG) connects the residential network to ISPs for offering services like Internet access, VoIP, IPTV, etc. Its sensitivity to faults and the increasing failure challenges are often perceived by users, giving rise to a lack of trustworthiness in the HG. In order to tackle this kind of problem, a provider needs to improve the HG's resilience, and also to assess the dependability and security...
The main idea of the third generation (3G) networks is to merge two of the most important communication systems: cellular networks and Internet. The IP multimedia subsystem (IMS) defined by 3GPP is a technology designed to provide robust multimedia services across roaming boundaries and over diverse access technologies. In this communication converged world, the challenging issues are security and...
SIP is an application-level signaling protocol that manages a mutual multimedia communication session. Presently, SIP is widely used with Internet messaging, games and with VoIP (voice over IP) due to advantages such as its simplicity, flexibility and variety of protocols. However, SIP is associated with many types of security issues and requires a countermeasure device against call-disturbance attacks...
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the Internet. However, how to authenticate each other and agree on a session key has not been efficiently solved. In 2007, Wang and Zhang proposed a key agreement protocol and a new authentication and key agreement mechanism for SIP. In this paper, we prove that Wang and Zhang's key agreement protocol...
The traditional E.164 codepsilas regularity enables the scoundrel to be possible not after the telecommunication userpsilas permission on easily the segment to userpsilas telephone number. It is difficult to meet the VoIP protection needs for using the packet filtering technology with the network-level gatekeeper defense mechanism. This paper proposed a VoIP access authorization verifying center (AAVC)...
This paper proposes lawful interception scheme for secure VoIP (Voice over IP) communications using TTP (Trusted Third Party). The proposed scheme is that TTP creates a master key and send it to VoIP terminals, and VoIP terminals create session keys for media traffic encryption using master key. TTP sends session key to law enforcement agency for decrypting encrypted media traffic. This scheme enables...
With growth of Internet and wireless IP network, multimedia systems can be accessed from any-where and anytime. However, efficient real-time services are open and challenging research problem. To implement real-time services such as VoIP over wireless access network, IP header compression scheme can be used for saving bandwidth. Enhanced compressed RTP (ECRTP) has been used for lossy link and high...
The recent and massive deployment of voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. In this paper, we will present a new attack against the authentication mechanism of SIP. This attack allows to perform toll fraud and call hijacking. We will detail the formal specification method that allowed to detect this...
Security threats for voice-over IP (VoIP) networks are becoming a major concern as its popularity increases. New attacks are developed that target directly the underlying SIP protocol. To detect such kinds of attacks we present a specification-based detection framework to recognise deviation from its expected behaviour. We present an implementation and show with measurements that this method is capable...
With the actual expansion in communication systems, data channels are taking more importance, especially in mobile data networks. But in some cases the transmission over data channels is not possible or not convenient, which makes the data transmission over voice channel an interesting alternative. Firstly, the operators of mobile phone networks (GSM, GPRS) tend to limit the access to the Internet...
Low rate DoS attacks are emerging threats to the TCP traffic, and the VoIP traffic in the Internet. They are hard to detect as they intelligently send attack traffic inside the network to evade current router based congestion control mechanisms. We propose a practical attack model in which botnets that can pose a serious threat to the Internet are considered. Under this model, an attacker can scatter...
Voice over Internet protocol (VoIP) is becoming increasingly popular due to its significant advantages regarding cost and support of enhanced multimedia services. Despite of the substantial advantages of using the Internet as the transmission medium for voice calls, we can foresee many undesirable uses, especially in terms of spam. VoIP technology may provide new means for the transmission of bulk...
Mission-critical telecom servers are being ported from their safe PSTN haven to the Internet to cator to the VoIP user base increasing failures due to greater susceptibility to attacks. Virtual machines are becoming increasing popular for deploying servers because they allow checkpointing and live migration facilities. The challenges are dealing with non-virtual state elements, like ongoing network...
After the U.S. Congress passed the landmark wiretapping law, law enforcement officers now could conduct a wiretap centrally on a carrier's network by duplicating a phone call digitally and directing the copy to police headquarters. Starting on 14 May, the 1994 law, the Communications Assistance for Law Enforcement Act (CALEA), will also apply to some voice over Internet Protocol providers (VoIP),...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.