• Title/Summary/Keyword: Internet protocol (IP)

Search Result 716, Processing Time 0.033 seconds

Implementation of Extracting Specific Information by Sniffing Voice Packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.209-214
    • /
    • 2020
  • VoIP technology has been widely used for exchanging voice or image data through IP networks. VoIP technology, often called Internet Telephony, sends and receives voice data over the RTP protocol during the session. However, there is an exposition risk in the voice data in VoIP using the RTP protocol, where the RTP protocol does not have a specification for encryption of the original data. We implement programs that can extract meaningful information from the user's dialogue. The meaningful information means the information that the program user wants to obtain. In order to do that, our implementation has two parts. One is the client part, which inputs the keyword of the information that the user wants to obtain, and the other is the server part, which sniffs and performs the speech recognition process. We use the Google Speech API from Google Cloud, which uses machine learning in the speech recognition process. Finally, we discuss the usability and the limitations of the implementation with the example.

Implementation of LAN-based TCP/IP Protocol Analyzer using the object-oriented programming (객체지향형 언어를 사용한 LAN 기반의 TCP/IP 프로토콜 분석기 구현)

  • 이시현;강정진;장학신;조병순;최규민;정중수
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.3
    • /
    • pp.86-92
    • /
    • 2000
  • In this paper, we develop protocol analyzer that can analyze and monitor LAN(Local Area Network)-based TCP/IP protocol using the OOP(object-oriented programming) in Windows98/NT environment. TCP/IP(Transmission Control Protocol/Internet Protocol) protocol analyzer is consist of interface hardware, protocol analysis software and GUI(Graphic User Interface). It is designed for the real-time analysis using the real-time object. In results of Performance test, TCP/IP Protocol analyzer is showed that it can analyze and monitor without frame error in LAN-based. Also, developed protocol analyser operates better than conventional protocol analyzer in performance. It can be used in maintenance fields of communication and network.

  • PDF

Internet Push Service Using Tunneling Technology (터널링기술을 이용한 인터넷 푸쉬 서비스)

  • Oh, Jong-Taek
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.4
    • /
    • pp.130-135
    • /
    • 2008
  • Broadcasting services using Internet and Internet protocol have been developed actively. In this paper, push service technologies based on tunneling protocol and for the case of base stations using private IP addresses are proposed. This could be very proper to the broadcasting services for location & traffic information and disaster relief.

  • PDF

Study on Design of Internet Phon(VoIP) using the VPN (VPN을 적용한 인터넷 전화 단말기의 설계에 관한 연구)

  • Yoo, Seung-Sun;Kim, Sam-Tek;Lee, Seung-Gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.2A
    • /
    • pp.12-19
    • /
    • 2005
  • The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eavesdrop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.

Policy and Managerial Issues of Voice over Internet Protocol(VoIP) (인터넷전화의 정책 및 경영이슈측면에서의 이용자분석)

  • Kim, Ji-Hee;Sung, Yoon-Young;Kweon, O-Sang;Kim, Jin-Ki
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.4
    • /
    • pp.221-233
    • /
    • 2007
  • Which factors should influence consumer consideration to subscribe to Voice over Internet Protocol (VoIP)? Policy issues, managerial concerns, and demographic variables are possible factors. This paper discusses policy and managerial issues regarding VoIP adoption. A model that explains VoIP adoption is proposed and tested. This study analyzes a survey of 750 prospective VoIP users in Korea. The testing is accompanied by logistic regression and discriminant analysis. The results show that trust in VoIP, relative comparison of Quality to fixed service, numbering plan, satisfactions of call Quality and customer services on both fixed and mobile services have impacts on the adoption of VoIP. Implications for VoIP providers and policy makers are presented.

  • PDF

Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism (SIP 프로토콜 상태정보 기반 공격 탐지 기능을 제공하는 가상 프록시 서버 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.37-48
    • /
    • 2008
  • VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.

  • PDF

A Study on Hacking Attack of Wire and Wireless Voice over Internet Protocol Terminals (유무선 인터넷전화 단말에 대한 해킹 공격 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.299-302
    • /
    • 2011
  • Recently, Voice over Internet protocol(VoIP) in IP-based wired and wireless voice, as well as by providing multimedia information transfer. Wired and wireless VoIP is easy on illegal eavesdropping of phone calls and VoIP call control signals on the network. In addition, service misuse attacks, denial of service attacks can be targeted as compared to traditional landline phones, there are several security vulnerabilities. In this paper, VoIP equipment in order to obtain information on the IP Phone is scanning. And check the password of IP Phone, and log in successful from the administrator's page. Then after reaching the page VoIP IP Phone Administrator Settings screen, phone number, port number, certification number, is changed. In addition, IP Phones that are registered in the administrator page of the call records check and personal information is the study of hacking.

  • PDF

Web-based Predictive Maintenance(PM) (웹 기반 예방 보전에 관한 연구)

  • Gi-Heung Choi
    • Journal of the Korean Society of Safety
    • /
    • v.16 no.4
    • /
    • pp.213-217
    • /
    • 2001
  • Requirements for Device Networks differ greatly from those of typical data networks. Specifically, any device network technology which employs a fieldbus protocol is different from IP network protocol TCP/IP. In general, one needs to integrate fieldbus protocol and TCP/IP to realize device network over IP network or internet. Interoperability between devices and equipments is essential to enhance the quality and the performance of predictive maintenance(PM). This paper suggests a basic framework for web-based predicted maintenance and a method to guarantee interoperability between devices and equipments.

  • PDF

LonWorks-based Distributed Monitoring and Control for Predictive Maintenance (PM)

  • Park, Gi-Heung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.150.3-150
    • /
    • 2001
  • Requirements for Distributed Monitoring and Control Networks (DMCN) differ greatly from those of typical data networks. Specifically, any DMCN technology which employs a fieldbus protocol is different from If network protocol TCP/IP. In general, one needs to integrate fieldbus protocol and TCP/IP to realize DMCN over IP network or internet Interoperability between devices and equipments is essential to enhance the quality and the performance of predictive maintenance (PM). This paper suggests a basic framework for LonWorks-based DMCN over IP network and a method to guarantee interoperability between devices and equipments.

  • PDF

Design of a Remote Distributed Embedded System Using Internet and CAN for multi-induction motor of Building and Industrial fields (산업용 유도전동기의 네트워크 운전을 위한 인터넷과 CAN을 이용한 원격분산 Embedded System 설계)

  • Hong, Won-Pyo;Kim, Jung-Gon
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2006.05a
    • /
    • pp.302-308
    • /
    • 2006
  • We introduce the concept of a remote distributed embedded system to integrated fieldbus based control systems in internet/Intranet. As a result fieldbus systems are opened up for remote monitoring, remote maintenance, and remote control applications using state of the art Web-technology. This paper addresses the design of a remote distributed embedded system using Internet and CAN for multi-Induction motor of Building and Industrial field. The fieldbus used the CAN based networked intelligent multi-motor control system using DSP2812 microprocessor. To build such a system, the TCP/IP-CAN Gateway which convert a CAN protocol to TCP/IP protocol and vice verse, was designed. A experimental simulation system consists of a TCP/IP-CAN Gateway in remote place and a command PC ti be connected ti Ethernet.

  • PDF