• 제목/요약/키워드: VoIP

Search Result 839, Processing Time 0.021 seconds

A Study of Eavesdropping and Attack about Smart Phone VoIP Services (Smart Phone VoIP 서비스에 대한 공격과 도청 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Yang, Jong-Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1313-1319
    • /
    • 2011
  • VoIP service by taking advantage of the current PSTN network and internet over the existing telephone network at an affordable price allows you to make voice calls to the service is being expanded. However, the security of public must be maintained for security vulnerabilities in Smart Phone VoIP case problems arise, and is likely to be attacked by hackers. In this paper, the Internet, using wired and Smart Phone VoIP services may occur during analysis of the type of incident and vulnerability analysis, the eavesdropping should conduct an attack. Smart Phone VoIP with institutional administration to analyze the vulnerability OmniPeek, AirPcap the equipment is installed in a lab environment to conduct eavesdropping attack. Packet according to the analysis and eavesdropping attacks, IP confirmed that the incident as an attack by the eavesdropping as to become the test proves. In this paper, as well as Smart Phone VoIP users, the current administration and the introduction of Smart Phone service and VoIP service as a basis for enhanced security will be provided.

Study of the Simulation of VoIP Traffic Generation with Considering Self-Similiarity (자기유사성을 고려한 VoIP 트래픽 생성 시뮬레이션 방법 의 연구)

  • 김윤배;이계신;김재범
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.25-29
    • /
    • 2004
  • VoIP는 인터넷 프로토콜(IP)를 이용하여 음성을 데이터 packet처럼 전송하는 것을 의미한다. 최근 VoIP 기술의 도입으로 기존 망 성능 관리에 대한 관심이 높아지고 있다. 보다 원활한 기술 구현을 위해서는 VoIP 트래픽에 대한 체계적인 분석과 위험성 검증을 할 수 있는 도구가 필요하다. 또한 기존의 트래픽 시뮬레이션 기법에서 실제 망에서의 자기유사성을 적용한 사례가 적다는 것 또한 본 연구가 행하여진 동기이다. 본 연구에서는 자기유사성을 반영하여 소량의 샘플을 갖고 전체 VoIP 망 트래픽을 생성할 수 있는 방법론을 개발하고자 시도하였다.

  • PDF

A Study on Spam Protection Technolgy for Secure VoIP Service in Broadband convergence Network Environment (BcN 환경에서 안전한 VoIP 서비스를 위한 스팸대응 기술 연구)

  • Sung, Kyung;Kim, Seok-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.670-676
    • /
    • 2008
  • There is a difficult plane letting a security threat to occur in Internet networks as VoIP service uses technology-based the Internet is inherent, and you protect without adjustment of the existing security solution or changes with real-time service characteristics. It is a voice to single networks The occurrence security threat that it is possible is inherent in IP networks that effort and cost to protect a data network only are complicated relatively as provide service integrated data. This paper about various response way fields to be able to prevent analysis regarding definition regarding VoIP spam and VoIP spam technology and VoIP spam.

Factor analysis of VoIP Security Checklists using AHP (AHP를 이용한 VoIP 정보보호 점검항목의 중요도 분석)

  • Yoon, Seokung;Park, Haeryong;Yoo, Hyeong Seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1115-1122
    • /
    • 2012
  • VoIP service is steadily growing due to the spread of smartphones, enhanced network, and various VoIP applications. But, VoIP has many security vulnerabilities because it is based on IP network. This paper analyzes the important weight of VoIP security checklists for incident prevention and response using AHP. The results of AHP analysis showed that network security, incident response, and access control were the most important in technical, administrative, physical standpoint. This study proposes factor analysis of VoIP security checklist at first time. By doing this, it will be used helpfully when VoIP service providers establish their own security policies and inspect their VoIP environment according to their security policies.

Design and Implementation of an Efficient Management Scheme for VoIP Terminals in SOHO Environments (SOHO 환경을 위한 효율적인 VoIP 단말 관리 기법 설계 및 구현)

  • Jin, Sang-Woo;Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.103-110
    • /
    • 2008
  • Internet telephone uses VoIP as its communication protocol, where it provides various additional services with inexpensive fare when the terminal is connected to the Internet. The existing auto provisioning systems that manage Internet telephone terminals are targeting large size VoIP service providers or enterprises, and has few consideration on the convenience of management for small size environments. The difficult installation and management procedures of the current auto provisioning systems prevents Internet telephone system from getting popular. Easy installation and management system is needed in order to spread out Internet telephone system. In this paper, we design and implement the auto provisioning system that provides easy installation and management services in small size environments such as SOHO environments.

Multiplexing VoIP Packets over Wireless Mesh Networks: A Survey

  • Abualhaj, Mosleh M.;Kolhar, Manjur;Qaddoum, Kefaya;Abu-Shareha, Ahmad Adel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3728-3752
    • /
    • 2016
  • Wireless mesh networks (WMNs) have been increasingly applied in private and public networks during the last decade. In a different context, voice over IP (VoIP) has emerged as a new technology for making voice calls around the world over IP networks and is replacing traditional telecommunication systems. The popularity of the two technologies motivated the deployment of VoIP over WMNs. However, VoIP over WMNs suffers from inefficient bandwidth utilization because of two reasons: i) attaching 40-byte RTP/UDP/IP header to a small VoIP payload (e.g., 10 bytes) and ii) 841 μs delay overhead of each packet in WMNs. Among several solutions, VoIP packet multiplexing is the most prominent one. This technique combines several VoIP packets in one header. In this study, we will survey all the VoIP multiplexing methods over WMNs. This study provides a clear understanding of the VoIP bandwidth utilization problem over WMNs, discusses the general approaches in which packet multiplexing methods could be performed, provides a detailed study of present multiplexing techniques, shows the aspects that hinder the VoIP multiplexing methods, discusses the factors affected by VoIP multiplexing schemes, shows the merits and demerits of different multiplexing approaches, provides guidelines for designing a new improved multiplexing technique, and provides directions for future research. This study contributes by providing guidance for designing a suitable and robust method to multiplex VoIP packets over WMNs.

Study on Fraud and SIM Box Fraud Detection Method in VoIP Networks (VoIP 네트워크 내의 Fraud와 SIM Box Fraud 검출 방법에 대한 연구)

  • Lee, Jung-won;Eom, Jong-hoon;Park, Ta-hum;Kim, Sung-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1994-2005
    • /
    • 2015
  • Voice over IP (VoIP) is a technology for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs in the form of IP packets over a packet-switched network which consist of several layers of computers. VoIP Service that used the various techniques has many advantages such as a voice Service, multimedia and additional service with cheap cost and so on. But the various frauds arises using VoIP because VoIP has the existing vulnerabilities at the Internet and based on complex technologies, which in turn, involve different components, protocols, and interfaces. According to research results, during in 2012, 46 % of fraud calls being made in VoIP. The revenue loss is considerable by fraud call. Among we will analyze for Toll Bypass Fraud by the SIM Box that occurs mainly on the international call, and propose the measures that can detect. Typically, proposed solutions to detect Toll Bypass fraud used DPI(Deep Packet Inspection) based on a variety of detection methods that using the Signature or statistical information, but Fraudster has used a number of countermeasures to avoid it as well. Particularly a Fraudster used countermeasure that encrypt VoIP Call Setup/Termination of SIP Signal or voice and both. This paper proposes the solution that is identifying equipment of Toll Bypass fraud using those countermeasures. Through feature of Voice traffic analysis, to detect involved equipment, and those behavior analysis to identifying SIM Box or Service Sever of VoIP Service Providers.

Technical Trend of Mobile VoIP (Mobile VoIP 기술 동향 및 분석)

  • Lee, Young-Pyo;Park, Jun-Su;Kim, Hee-Dong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.97-101
    • /
    • 2008
  • Voice over IP is a telephone service which sends and receives the voices through the Internet. Because the infrastructure of wireless and mobile communication networks such as 3G, Wi-Fi and WiMAX has expanded, the study about Mobile VoIP, which provides the voice service from wireless network, has been actively in progress. Since Rei 6 HSPA in 3GPP and Rev A lxEVDO in 3GPP2, VoIP through the data channel is more efficient than circuit switch. It is predicted that VoIP over 4G will be more effective and 4G mobile VoIP business will be vitalized in the future. In addition, there are businesses which offer VoWLAN by using software such as Skype and Fring. They provide services which cheapen the price of international calls and long distance calls. This paper will present the Korean and other countries' mobile VoIP trends, its classification along the network connection, the study on techniques, and conditions of mobile VoIP. It also will be described a view of terminal convergence and service convergence.

  • PDF

Analysis of key technologies related to VoIP security (VoIP 보안관련 주요기술에 대한 분석)

  • Rha, Sung-Hun;Shin, Hyun-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.385-390
    • /
    • 2010
  • VoIP Service is provided voice & image call using internetwork unlike traditional call. VoIP usage is becoming generalization & development. As a result, threats of security are steadily increasing. Regarding this situation, we will investigate the security problem of VoIP in various aspects. Also We will investigate main technology of security solution method for solve this problem.

Implementation of VoIP Module for Embedded System (임베디드 시스템을 위한 VoIP 모듈 구현)

  • Kim Jeong-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1679-1684
    • /
    • 2004
  • This paper designs and implements a VoIP module for embedded system. Many other VoIP modules for desktop environment has widely implemented but the one for embedded system is not prevalent yet. The implemented VoIP module uses the OpenH.323 and is operated on the WinCE PDA. We use the TCP-friendly adaptation for congestion control. The experiment results show smooth communication but a little noise. Future works include the minimization of noise.