Browse > Article
http://dx.doi.org/10.6109/jkiice.2012.16.4.737

A Study of Wired and wireless VoIP vulnerability analysis and hacking attacks and security  

Kwon, Se-Hwan (호서대학교 벤처전문대학원)
Park, Dea-Woo (호서대학교 벤처전문대학원)
Abstract
Recently VoIP has provided voice(both wired and wireless from IP-based) as well as the transmission of multimedia information. VoIP used All-IP type, Gateway type, mVoIP etc. Wired and wireless VoIP has security vulnerabilities that VoIP call control signals, illegal eavesdropping, service misuse attacks, denial of service attack, as well as wireless vulnerabilities etc. from WiFi Zone. Therefore, the analysis of security vulnerabilities in wired and wireless VoIP and hacking incidents on security measures for research and study is needed. In this paper, VoIP (All-IP type, and for Gateway type) for system and network scanning, and, IP Phone to get the information and analysis of the vulnerability. All-IP type and Gateway type discovered about the vulnerability of VoIP hacking attacks (Denial of Service attacks, VoIP spam attacks) is carried out. And that is a real VoIP system installed and operated in the field of security measures through research and analysis is proposed.
Keywords
VoIP; mobile Smart Phone; Vulnerability Analysis; Hacking Attack; Security measures;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 국가정보원, 국가공공기관 VoIP정보보호가이드라인, 국가정보원, 2009.
2 천우성, 박대우, 양종한, "Smart Phone VoIP 서비스에 대한 공격과 도청 연구," 한국해양정보통신학회 논문지, 제15권, 제6호, pp. 1313-1319, 2011.
3 Jin-Young Song, Dea-Woo Park, "A Study on Wi-Fi Hacking Attack using Web," Lecture Notes in Computer Science 6935, pp.464-471, 2011.   DOI   ScienceOn
4 안영두, 이순흠, "SIP 기반 유무선 통합 컨퍼런스 시스템 개발," 한국정보기술학회논문지, 제5권, 제3호, 2007.
5 이혜정, 정석태, "모바일 단말기를 이용한 실시간 B2B 시스템 구현," 한국해양정보통신학회논문지, 제10권, 제1호, pp. 1-6, 2006.
6 한국인터넷진흥원, 인터넷전화 보안위협 보안정책, 한국인터넷진흥원, 2010.
7 한국정보화진흥원, 행정기관 인터넷전화 보안 대응모델 개발 연구, 한국정보화진흥원, 2011.
8 What is T wifi zone?, http://blog.naver.com/PostView.nhn?blogId=hepi2&logNo=100109967051
9 Hwan-Kuk Kim, Kyoung-Hee Ko, Seok-Woong Yoon, Chang-Yong Lee, Jeong-Wook Kim, Hyun- Cheol Jeong, "A study on the security requirements for construction of secure FMC environment," Journal of Korean Society for Internet Information, pp. 793-796, 2010.
10 olleh WiFi Zone, http://first.nespot.com/intro.html