• Title/Summary/Keyword: IP Analysis

Search Result 1,000, Processing Time 0.026 seconds

A Study of Wired and wireless VoIP vulnerability analysis and hacking attacks and security (유무선 VoIP 취약점 분석과 해킹공격 및 보안 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.737-744
    • /
    • 2012
  • Recently VoIP has provided voice(both wired and wireless from IP-based) as well as the transmission of multimedia information. VoIP used All-IP type, Gateway type, mVoIP etc. Wired and wireless VoIP has security vulnerabilities that VoIP call control signals, illegal eavesdropping, service misuse attacks, denial of service attack, as well as wireless vulnerabilities etc. from WiFi Zone. Therefore, the analysis of security vulnerabilities in wired and wireless VoIP and hacking incidents on security measures for research and study is needed. In this paper, VoIP (All-IP type, and for Gateway type) for system and network scanning, and, IP Phone to get the information and analysis of the vulnerability. All-IP type and Gateway type discovered about the vulnerability of VoIP hacking attacks (Denial of Service attacks, VoIP spam attacks) is carried out. And that is a real VoIP system installed and operated in the field of security measures through research and analysis is proposed.

Policy and Managerial Issues of Voice over Internet Protocol(VoIP) (인터넷전화의 정책 및 경영이슈측면에서의 이용자분석)

  • Kim, Ji-Hee;Sung, Yoon-Young;Kweon, O-Sang;Kim, Jin-Ki
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.4
    • /
    • pp.221-233
    • /
    • 2007
  • Which factors should influence consumer consideration to subscribe to Voice over Internet Protocol (VoIP)? Policy issues, managerial concerns, and demographic variables are possible factors. This paper discusses policy and managerial issues regarding VoIP adoption. A model that explains VoIP adoption is proposed and tested. This study analyzes a survey of 750 prospective VoIP users in Korea. The testing is accompanied by logistic regression and discriminant analysis. The results show that trust in VoIP, relative comparison of Quality to fixed service, numbering plan, satisfactions of call Quality and customer services on both fixed and mobile services have impacts on the adoption of VoIP. Implications for VoIP providers and policy makers are presented.

  • PDF

Hacking Attacks and Security Measures on All-IP Method and Gateway Method (All-IP방식과 Gateway방식에 대한 해킹공격과 보안대책)

  • Kwon, Se-Hwan;Park, Dea-Woo;Yoon, Kyung-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.265-268
    • /
    • 2011
  • Voice over Internet protocol(VoIP) is support a VoIP service as All-IP method and Gateway method etc. All-IP method to the unit in an Internet environment by applying both the IP service is an VoIP system. Gateway method, using a normal phone call in a way that the Internet is using VoIP. In this paper, scanning and analyze the vulnerability for VoIP systems and networks from All-IP method and the Gateway method In the test bed. All-IP method and Gateway method found in the VoIP vulnerabilities, hacking attack, a denial of service attacks and VoIP spam attacks are carried out. Through analysis of post-attack security measures is proposed.

  • PDF

A Study of Hacking Attack Analysis for IP-PBX (IP-PBX에 대한 해킹 공격 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Yoon, Kyung-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.273-276
    • /
    • 2011
  • Voice over Internet Protocol(VoIP) compared to the traditional PSTN communications costs and because of the ease of use has been widespread use of VoIP. Broadband Convergence Network (BCN) as part of building with private Internet service provider since 2010, all government agencies are turning to the telephone network and VoIP. In this paper, we used the Internet on your phone in the IETF SIP-based IP-PBX is a hacking attack analysis studies. VoIP systems are built the same way as a test bed for IP-PBX hacking attacks and vulnerabilities by analyzing the results yielded. Proposes measures to improve security vulnerabilities to secure VoIP.

  • PDF

mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone (스마트폰에서 mVoIP 취약성 분석 및 대응 방안)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.3
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP (mobile Voice over Internet Protocol) service is a technology to transmit voice data through an IP network using mobile device. mVoIP provides various supplementary services with low communication cost. It can maximize the availability and efficiency by using IP-based network resources. In addition, the users can use voice call service at any time and in any place, as long as they can access the Internet on mobile device easily. However, SIP on mobile device is exposed to IP-based attacks and threats. Observed cyber threats to SIP services include wiretapping, denial of service, and service misuse, VoIP spam which are also applicable to existing IP-based networks. These attacks are also applicable to SIP and continuously cause problems. In this study, we analysis the threat and vulnerability on mVoIP service and propose several possible attack scenarios on existing mobile VoIP devices. Based on a proposed analysis and vulnerability test mechanism, we can construct more enhanced SIP security mechanism and stable mobile VoIP service framework after eliminating its vulnerability on mobile telephony system.

A Study of Eavesdropping and Attack about Smart Phone VoIP Services (Smart Phone VoIP 서비스에 대한 공격과 도청 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Yang, Jong-Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1313-1319
    • /
    • 2011
  • VoIP service by taking advantage of the current PSTN network and internet over the existing telephone network at an affordable price allows you to make voice calls to the service is being expanded. However, the security of public must be maintained for security vulnerabilities in Smart Phone VoIP case problems arise, and is likely to be attacked by hackers. In this paper, the Internet, using wired and Smart Phone VoIP services may occur during analysis of the type of incident and vulnerability analysis, the eavesdropping should conduct an attack. Smart Phone VoIP with institutional administration to analyze the vulnerability OmniPeek, AirPcap the equipment is installed in a lab environment to conduct eavesdropping attack. Packet according to the analysis and eavesdropping attacks, IP confirmed that the incident as an attack by the eavesdropping as to become the test proves. In this paper, as well as Smart Phone VoIP users, the current administration and the introduction of Smart Phone service and VoIP service as a basis for enhanced security will be provided.

Factor analysis of VoIP Security Checklists using AHP (AHP를 이용한 VoIP 정보보호 점검항목의 중요도 분석)

  • Yoon, Seokung;Park, Haeryong;Yoo, Hyeong Seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1115-1122
    • /
    • 2012
  • VoIP service is steadily growing due to the spread of smartphones, enhanced network, and various VoIP applications. But, VoIP has many security vulnerabilities because it is based on IP network. This paper analyzes the important weight of VoIP security checklists for incident prevention and response using AHP. The results of AHP analysis showed that network security, incident response, and access control were the most important in technical, administrative, physical standpoint. This study proposes factor analysis of VoIP security checklist at first time. By doing this, it will be used helpfully when VoIP service providers establish their own security policies and inspect their VoIP environment according to their security policies.

A Study of Application Layer Traceback Through Intelligent SQL Query Analysis (지능형 SQL Query 분석을 통한 Application Layer 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.265-268
    • /
    • 2010
  • Current Traceback is difficult due to the development of bypass technique Proxy and IP-driven to trace the real IP Source IP is the IP traceback after the actual verification is difficult. In this paper, an intelligent about SQL Query field, column, table elements such as analysis of the value and the matching key values and Data used here to analyze source user hit point values for the user to trace the Application Layer IP for the analysis of forensic evidence guided by In this study, including forensic DB security will contribute to the development of electronic trading.

  • PDF

A Study on the Utilization of Intellectual Property Rights Convergence in Mobile Games through Market Analysis (시장분석을 통한 모바일게임 융복합 지식재산권 활용 연구)

  • Lee, Hyun-Ku;Kim, Tae-Gyu
    • Journal of Digital Convergence
    • /
    • v.18 no.1
    • /
    • pp.309-314
    • /
    • 2020
  • In this study, look into the future prospects of mobile games produced using IP, in the domestic market and to present more effective IP selection criteria when producing new mobile games using IP. To this end, classified IP-enabled mobile games and analyzed IPs used for IP-enabled mobile games by each type for games that are located in the top 200 in sales ranking of Google Play Store. According to the analysis, the mobile game using IP has shown significant performance in terms of sales performance, and the trend will continue in 2020. It was analyzed that 'Game' types of IP using games(based on domestic games) can achieve the highest sales results. Since the success of a game affects a variety of factors other than IP, further research is needed in more diverse ways on the impact of IP on the success.

A Nonlinear Regression Analysis Method for Frame Erasure Concealment in VoIP Networks (VoIP 망에서의 프레임손실은닉을 위한 비선형 회귀분석 기법)

  • Choi, Seung-Ho;Sung, Ho-Sang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.129-132
    • /
    • 2009
  • Frame erasure is one of the most difficult problems in voice over IP (VoIP) networks and is a major source of speech quality degradation. In this paper, a frame erasure concealment algorithm based on nonlinear regression analysis is presented to minimize speech quality deterioration in code-excited linear prediction (CELP) based coders. We applied the proposed scheme to the ITU-T G.729 standard and obtained improved perceptual evaluation of speech quality (PESQ) scores compared to the conventional methods.

  • PDF