• Title/Summary/Keyword: Instant Messaging

Search Result 72, Processing Time 0.028 seconds

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

Cryptanalysis and Remedy Scheme on Qiu et al.'s Enhanced Password Authentication Scheme for SIP (SIP를 위한 Qiu등의 개선된 패스워드 인증 기법에 대한 보안 분석 및 강화 기법)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.249-256
    • /
    • 2020
  • The session initiation protocol (SIP) is a signaling protocol, which is used to controlling communication session creation, manage and finish over Internet protocol. Based on it, we can implement various services like voice based electronic commerce or instant messaging. Recently, Qiu et al. proposed an enhanced password authentication scheme for SIP. However, this paper withdraws that Qiu et al.'s scheme is weak against the off-line password guessing attack and has denial of service problem. Addition to this, we propose an improved password authentication scheme as a remedy scheme of Qiu et al.'s scheme. For this, the proposed scheme does not use server's verifier and is based on elliptic curve cryptography. Security validation is provided based on a formal validation tool ProVerif. Security analysis shows that the improved authentication scheme is strong against various attacks over SIP.

Interworking of SIP Authentication with DIAMETER and Security Analysis (SIP와 DIAMETER의 인증 연동 및 안전성 분석)

  • 박성준;정수환;이병길;김현곤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.426-435
    • /
    • 2004
  • The DIAMETER protocol provides Authentication, Authorization, and Accounting (AAA) transactions across the Internet. SIP(Session Initiation Protocol) will be used for new types of signaling, such as instant messaging and application level mobility across networks. And SIP will be a major signaling protocol for next generation wireless networks. But the Digest authentication scheme is not using a secure method of user authentication in SIP, and it is vulnerable to man-in-the-middle attacks or dictionary attacks. This study focused on designing a SIP proxy for interworking with AAA server with respect to user authentication and security analysis. We compared and analyzed the security aspects of the scenarios and propose two proposals that a response which include the user address and password-based mutual authentication and key agreement protocol. It is claimed to be more secure against common attacks than current scenarios.

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

A Study on a New SIP Presence Service using Partial Publication and Extended Call Processing Language (부분 Publication 및 확장 호처리언어를 사용한 새로운 SIP 프레즌스 서비스에 관한 연구)

  • Lee, Ki-Soo;Jang, Choon-Seo;Jo, Hyun-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.34-41
    • /
    • 2007
  • The presence service which provides user's presence information by subscription and notification is one of SIP(session initiation protocol) extension services, and it is used importantly in VoIP(Voice over IP) and Instant Messaging service. In this paper, we propose a new method in which users can combine and control presence service and call processing services in various ways by extending call processing language, and only changed parts of the presence information are published instead of full presence information document. Each user registers full presence information document with his own call processing script during the first publication to a presence server. The presence server executes these call processing scripts, so it can provide various services with combination of presence service and call processing services during the presence subscriptions and notifications. Afterwards, users publish only changed parts of the presence information and the presence server notify only these changed parts to watchers. Therefore the efficiency of the overall system can be improved. The performance of our proposed model is evaluated by experiments.

DEVS Simulation of Spam Voice Signal Detection in VoIP Service (VoIP 스팸 콜 탐지를 위한 음성신호의 DEVS 모델링 및 시뮬레이션)

  • Kim, Ji-Yeon;Kim, Hyung-Jong;Cho, Young-Duk;Kim, Hwan-Kuk;Won, Yoo-Jae;Kim, Myuhng-Joo
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.75-87
    • /
    • 2007
  • As the VoIP service quality is getting better and many shortcomings are being overcome, users are getting interested in this service. Also, there are several additional features that provide a convenience to users such as presence service, instant messaging service and so on. But, as there are always two sides of rein, some security issues have users hesitate to make use of it. This paper deals with one of the issues, the VoIP spam problem. We took into account the signal pattern of voice message in spam call and we have constructed voice signal models of normal call, normal call with noise and spam call. Each voice signal case is inserted into our spam decision algorithm which detects the spam calls based on the amount of information in the call signal. We made use of the DEVS-$Java^{TM}$ for our modeling and simulation. The contribution of this work is in suggestion of a way to detect voice spam call signal and testing of the method using modeling and simulation methodology.

  • PDF

Twitter User Information based Users Similarity Ranking System (트위터 사용자 정보 기반의 유사성 순위 시스템)

  • Yang, Xi-tong;Kim, Jae-Yoon;Kumar, Sajan;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.1051-1053
    • /
    • 2015
  • Twitter is using Tweets to post 140 characters at a time to interact with different people around the world. In addition, Twitter will also provide speed, such as instant messaging by providing the follow feature. This was used for increasing the number of users because of the tweeter, a portion of the life was due to the popularity of smart phones. However, because of the large amount of data of the tweeter has a disadvantage similar to the user information or user information is not recommended. In this paper, in order to compensate for this problem to establish a ranking filter the similarity information based on a user's system, we propose that the user or the like similar to the user information. The system proposed in this paper consists of the collected data and modules to collect data using a user account in the filtering and the like to the tweeter module. These modules use the Open API and Mahout designed and implemented.

  • PDF

A Study on the User Experience of Instant Messaging Services in Elementary School -Focused on Kakao Talk application- (초등학생 메신저 서비스의 사용자 경험 연구 -카카오톡 애플리케이션을 중심으로-)

  • Lee, Jong-won;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.17 no.6
    • /
    • pp.327-333
    • /
    • 2019
  • The purpose of this study is to suggest areas for improvement of KakaoTalk. KakaoTalk is used by everyone in Korea, and even elementary school students have been using it a lot recently. Therefore, to help parents feel safe about their children using KakaoTalk, and to ensure that children are not worried about their parents when using them, I would like to examine each user's experience to pinpoint the problem. As a method of study, a survey and interview was conducted on eight parents and eight children using KakaoTalk. Through this, the parents could not trust KakaoTalk in terms of reliability when they saw their children using KakaoTalk. Based on this research, we hope to improve KakaoTalk through further research so that parents and children can use Kakao Talk safely.

A Study on Conceptual Design of Local Community Knowledge Information System Based on Public Library 2.0 (Public Library 2.0 기반 지역 커뮤니티지식정보시스템 개념적 설계)

  • Park, Mi-Young;Seung, Hyon-Woo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.21 no.1
    • /
    • pp.193-209
    • /
    • 2010
  • It is library service innovation that leading change as cultural leader in advance of original technology of knowledge information, sharing and forming a new system, creating a new knowledge in feedback relationship, and constructing a specified unique library in active interaction. The purpose of this study is to provide public library a new vision based on pubic library 2.0 service model through library service innovation in digital knowledge information age. This study aims to improvement community knowledge information system of conceptual design based on public library 2.0. It is summarized as follows: First, library 2.0 service model is proposed with library 2.0 definition, principle and essential factor through literal and e-journal search. Second, application case is searched centering around library 2.0 cooperating technology of blogs, wiki, instant messaging, podcast, social networking, flickr. Third, public library new vision is proposed by definition and principle of public library 2.0. This study is conceptual design for next generation public library and is needed follow research for system implementation and test.

Human Visual System-Aware Optimal Power-Saving Color Transformation for Mobile OLED Devices (모바일 OLED 디스플레이를 위한 인간 시각 만족의 최적 전력 절감 색 변환)

  • Lee, Jae-Hyeok;Kim, Eun-Sil;Kim, Young-Jin
    • Journal of KIISE
    • /
    • v.43 no.1
    • /
    • pp.126-134
    • /
    • 2016
  • Due to the merits of OLED displays such as fast responsiveness, wide view angle, and power efficiency, their use has increased. However, despite the power efficiency of OLED displays, the portion of their power consumption among the total power consumption is still high since user interaction-based applications such as instant messaging, video play, and games are frequently used. Their power consumption varies significantly depending on the display contents and thus color transformation is one of the low-power techniques used in OLED displays. Prior low-power color transformation techniques have not been rigorously studied in terms of satisfaction of the human visual system, and have not considered optimal visual satisfaction and power consumption at the same time in relation to color transformation. In this paper, we propose a novel low-power color transformation technique which strictly considers human visual system-awareness as well as optimization of both visual satisfaction and power consumption in a balanced way. Experimental results show that the proposed technique achieves better human visual satisfaction in terms of visuality and also shows on average 13.4% and 22.4% improvement over a prior one in terms of power saving.