• Title/Summary/Keyword: IP분석

Search Result 1,514, Processing Time 0.045 seconds

A Study of Eavesdropping and Attack about Smart Phone VoIP Services (Smart Phone VoIP 서비스에 대한 공격과 도청 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Yang, Jong-Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1313-1319
    • /
    • 2011
  • VoIP service by taking advantage of the current PSTN network and internet over the existing telephone network at an affordable price allows you to make voice calls to the service is being expanded. However, the security of public must be maintained for security vulnerabilities in Smart Phone VoIP case problems arise, and is likely to be attacked by hackers. In this paper, the Internet, using wired and Smart Phone VoIP services may occur during analysis of the type of incident and vulnerability analysis, the eavesdropping should conduct an attack. Smart Phone VoIP with institutional administration to analyze the vulnerability OmniPeek, AirPcap the equipment is installed in a lab environment to conduct eavesdropping attack. Packet according to the analysis and eavesdropping attacks, IP confirmed that the incident as an attack by the eavesdropping as to become the test proves. In this paper, as well as Smart Phone VoIP users, the current administration and the introduction of Smart Phone service and VoIP service as a basis for enhanced security will be provided.

Hacking Attacks and Security Measures on All-IP Method and Gateway Method (All-IP방식과 Gateway방식에 대한 해킹공격과 보안대책)

  • Kwon, Se-Hwan;Park, Dea-Woo;Yoon, Kyung-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.265-268
    • /
    • 2011
  • Voice over Internet protocol(VoIP) is support a VoIP service as All-IP method and Gateway method etc. All-IP method to the unit in an Internet environment by applying both the IP service is an VoIP system. Gateway method, using a normal phone call in a way that the Internet is using VoIP. In this paper, scanning and analyze the vulnerability for VoIP systems and networks from All-IP method and the Gateway method In the test bed. All-IP method and Gateway method found in the VoIP vulnerabilities, hacking attack, a denial of service attacks and VoIP spam attacks are carried out. Through analysis of post-attack security measures is proposed.

  • PDF

Using Characteristics and Adoption Determinants of Fixed VoIP in Korea (국내 유선 VoIP 이용특성과 수용 영향요인 분석)

  • Park, Jong-Hyeon;Park, Hui-Jin;Baek, Jong-Hyeon
    • Electronics and Telecommunications Trends
    • /
    • v.23 no.3
    • /
    • pp.163-174
    • /
    • 2008
  • 차세대 전화로 각광을 받고 있는 유선 VoIP는 국내에서 저렴한 요금과 다양한 부가서비스를 통하여 AII-IP 시대를 주도할 것으로 전망되고 있다. 특히 2008년도는 시내전화 번호이동성으로 인해 본 서비스가 크게 확산될 가능성이 높아졌다. 본 글에서는 조사자료를 바탕으로 국내 유선 VoIP 이용자, 잠재 이용자, 비지용자의 수용특성과 영향 요인을 분석하였다. 분석 결과, 세분된 고객군인 이용자, 잠재 이용자, 비이용자간의 인구통계나 기존 통신비 이용특성이 차별화 되었으며 주된 이용 이유는 역시 저렴한 요금수준으로 나타났고 품질과 부가서비스의 개선, 번호이동성으로 인한 식별번호의 해결이 서비스 촉진요인으로 드러났다. 특히 현 유선전화와 비교하여 20-30% 정도 저렴한 요금이 유선 VoIP의 WTP로 나타났다. 본 분석 결과를 바탕으로 국내 유선 VoIP 시장확산을 위한 전략적 시사점을 본 글에서 제시하였다.

Analysis of TCP/IP Protocol for Implementing a High-Performance Hybrid TCP/IP Offload Engine (고성능 Hybrid TCP/IP Offload Engine 구현을 위한 TCP/IP 프로토콜 분석)

  • Jang Hankook;Oh Soo-Cheol;Chung Sang-Hwa;Kim Dong Kyue
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.6
    • /
    • pp.296-305
    • /
    • 2005
  • TCP/IP, the most popular communication protocol, is processed on a host CPU in traditional computer systems and this imposes enormous loads on the host CPU. Recently TCP/IP Offload Engine (TOE) technology, which processes TCP/IP on a network adapter instead of the host CPU, becomes an important way to solve the problem. In this paper we analysed the structure of a TCP/IP protocol stack in the Linux operating system and important factors, which cause a lot of loads on the host CPU, by measuring the time spent on processing each function in the protocol stack. Based on these analyses, we propose a Hybrid TOE architecture, in which functions imposing much loads on the host CPU are implemented using hardware and other functions are implemented using software.

Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.113-120
    • /
    • 2022
  • In this paper, we analyze the feasibility of the IP spoofing attack exploiting null security algorithms in 5G networks based on 3GPP standard specifications. According to 3GPP standard specifications, the initial Registration Request message is not protected by encryption and integrity. The IP spoofing attack exploits the vulnerability that allows a malicious gNB (next generation Node B) to modify the contents of the initial Registration Request message of a victim UE (User Equipment) before forwarding it to AMF (Access and Mobility Management Function). If the attack succeeds, the victim UE is disconnected from the 5G network and a malicious UE gets Internet services, while the 5G operator will charge the victim UE. In this paper, we analyze the feasibility of the IP spoofing attack by analyzing whether each signaling message composing the attack conforms to the 3GPP Rel-17 standard specifications. As a result of the analysis, it is determined that the IP spoofing attack is not feasible in the 5G system implemented according to the 3GPP Rel-17 standard specifications.

A Study of Application Layer Traceback Through Intelligent SQL Query Analysis (지능형 SQL Query 분석을 통한 Application Layer 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.265-268
    • /
    • 2010
  • Current Traceback is difficult due to the development of bypass technique Proxy and IP-driven to trace the real IP Source IP is the IP traceback after the actual verification is difficult. In this paper, an intelligent about SQL Query field, column, table elements such as analysis of the value and the matching key values and Data used here to analyze source user hit point values for the user to trace the Application Layer IP for the analysis of forensic evidence guided by In this study, including forensic DB security will contribute to the development of electronic trading.

  • PDF

A Study of Hacking Attack Analysis for IP-PBX (IP-PBX에 대한 해킹 공격 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Yoon, Kyung-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.273-276
    • /
    • 2011
  • Voice over Internet Protocol(VoIP) compared to the traditional PSTN communications costs and because of the ease of use has been widespread use of VoIP. Broadband Convergence Network (BCN) as part of building with private Internet service provider since 2010, all government agencies are turning to the telephone network and VoIP. In this paper, we used the Internet on your phone in the IETF SIP-based IP-PBX is a hacking attack analysis studies. VoIP systems are built the same way as a test bed for IP-PBX hacking attacks and vulnerabilities by analyzing the results yielded. Proposes measures to improve security vulnerabilities to secure VoIP.

  • PDF

The development of a VoIP system with Mobile IP in all-IP networks (유무선통합 All-IP망에서 Mobile IP기반 VoIP시스템 개발)

  • 김경수;조계호;김원태;박용진
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.109-111
    • /
    • 2003
  • 본 논문은 최근 활성화되고 있는 VoIP 서비스 기술에 이동성을 보장하기 위해 Mobile IP기술을 접목시킨 시스템을 설계하고 개발한다. PDA와 같은 임베디드 시스템의 제한된 자원을 효율적으로 이용하기 위한 VoIP 서비스용 시스템에 필요한 요구사항과 문제점들을 분석하고 해결책을 제시한다. 또 이동환경에서의 VoIP 서비스를 제공하기 위해 Mobile IP 통신 모듈을 선계하고 구현한다. 유무선 통합 실험망을 이용하여, 개발된 Mobile IP 기반 VoIP시스템의 기능을 검증하고 향후 방안을 제시한다.

  • PDF

An implementation and security analysis on H.235 for VoIP security on embedded environments (임베디드 환경에서의 H.235 기반 VoIP 보안 단말 구현 및 안전성 분석에 관한 연구)

  • 김덕우;홍기훈;이상학;정수환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.1007-1014
    • /
    • 2004
  • In this paper, H.235 based security mechanism for H.323 multimedia applications was implemented in embedded environment. H.235 covers authentication using HMAC-SHAI -96, authenticated Diffie-Hellman key exchange, security capability exchange, session key management for voice encryption, and encryption functions such as DES, 3DES, RC2. H.235-based mechanisms were also analyzed in terms of its security and possible attacks.

mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone (스마트폰에서 mVoIP 취약성 분석 및 대응 방안)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.3
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP (mobile Voice over Internet Protocol) service is a technology to transmit voice data through an IP network using mobile device. mVoIP provides various supplementary services with low communication cost. It can maximize the availability and efficiency by using IP-based network resources. In addition, the users can use voice call service at any time and in any place, as long as they can access the Internet on mobile device easily. However, SIP on mobile device is exposed to IP-based attacks and threats. Observed cyber threats to SIP services include wiretapping, denial of service, and service misuse, VoIP spam which are also applicable to existing IP-based networks. These attacks are also applicable to SIP and continuously cause problems. In this study, we analysis the threat and vulnerability on mVoIP service and propose several possible attack scenarios on existing mobile VoIP devices. Based on a proposed analysis and vulnerability test mechanism, we can construct more enhanced SIP security mechanism and stable mobile VoIP service framework after eliminating its vulnerability on mobile telephony system.