A Solution to WLAN Authentication and Association DoS Attacks
|
|
|
- Bryan McKenzie
- 10 years ago
- Views:
Transcription
1 A Solution to WLAN Authentication and Association DoS Attacks Chibiao Liu, and James Yu, Member, IEEE Abstract--The growing popularity of the based Wireless LAN (WLAN) also increases its risk of security attacks. The new WLAN security standard, i, addresses most issues on user authentication and data encryption; however, it does not protect WLANs against Denial of Service (DoS) attacks. This paper presents a solution to detect and resolve authentication request flooding (AuthRF) and association request flooding (AssRF). We developed an experimental framework to demonstrate and quantify AuthRF and AssRF attacks against TCP and wireless Voice over IP (WVoIP) communications. Our study shows that such attacks can be easily launched, and cause service disruption. We then implement a solution based on traffic pattern analysis and filtering to resolve and prevent AuthRF and AssRF attacks. This solution is validated by empirical data. Index Terms: i, w, DoS, VoIP. I. INTRODUCTION Since the standardization of in 1999, the WLAN becomes more and more popular and is widely deployed at home, Small Office/Home Office (SOHO), enterprise networks and hot spots due to its flexibility, ease of installation and configuration, high performance, relatively low cost and potential applications of WLAN VoIP. The popularity of WLANs encounters a continual increase in security attacks against WLANs, and the 2005 survey from Computer Security Institute (CSI) and Federal Bureau of Investigation (FBI) shows that WLAN abuses (i.e., security attacks) is the only "growing" threat of computer crimes [1]. We classify WLAN security attacks into two categories: crypto attacks and DoS attacks. Crypto attacks include unauthorized access, man-in-the-middle, masquerading, eavesdropping, replay, tampering and session hijack. In general, security solutions of VPN and i [2, 3] provide an effective mechanism to address crypto attacks. Unfortunately, these solutions do not protect WLANs against DoS attacks. Chibiao Liu, PhD student, School of Computer Science, Telecommunications, and Information Systems, DePaul University, Chicago, IL USA ( [email protected]). James Yu, Assistant professor, School of Computer Science, Telecommunications, and Information Systems, DePaul University, Chicago, IL USA (corresponding author, phone: , [email protected]). Major DoS attacks on WLANs include authentication request flooding (AuthRF), association request flooding (AssRF), deauthentication flooding and disassociation flooding [4, 5]. These DoS attacks cause the WLAN or some of its wireless nodes out of services. As DoS attacks against WLANs become more and more common, we see increased interests and publications on the issues and solutions of such DoS attacks [6-13]. Those publications raise the awareness of DoS attacks and provide wireless users and network managers with helpful practices to protect their WLANs. However, there are no studies to address solutions to resolve AuthRF and AssRF DoS attacks. In addition, there are no experimental studies of the effects of these DoS attacks on data integrity, network performance and user experience of time sensitive applications. Meanwhile, to prevent DoS attacks on WLANs, w task group is working to protect management frames and action frames [14]. The mechanisms or protocols to protect management and action frames are very similar to the protection of data frame using the keys derived for TKIP or CCMP. However, there are some limitations in the draft version of w. First, all management frames sent or received by a station before keys are derived are unprotected. Secondly, w does not mention how to protect authentication request frame and association request frame, and it does not address how to prevent AuthRF and AssRF DoS attacks either. The purpose of this paper is to provide comprehensive studies of AuthRF and AssRF DoS attacks against WLANs and their potential solutions, along with an experimental framework to study and quantify the effect of DoS attacks. The remaining sections of this paper are organized as follows. The second section presents the experimental design to study AuthRF and AssRF DoS attacks over WLANs. Demonstrations and detail analyses of AuthRF and AssRF DoS attacks on WLANs are presented in Section 3. Solutions to resolve AuthRF and AssRF DoS attacks are discussed in Section 4. Conclusions are provided at the end of this paper. II. EXPERIMENTAL DESIGN OF WVOIP An experimental environment is illustrated in Fig. 1, where Cisco Catalyst 2950 Ethernet switch (SW-1) is used to connect workstations, the Remote Authentication Dial In User
2 Service (RADIUS) server, Session Initiation Protocol (SIP) server and the wireless access point (Linksys WAP- 54G). Workstations (SIP-1, SIP-2, SIP-3 and SIP-4) are running Windows XP SP2 with installation of Xlite SIP v2 VoIP phone [15] which supports G.711 voice codec with a data rate of 64 kbps. For the tested soft VoIP phone, the sampling rate is set at 20 ms for each Real-Time Transport Protocol (RTP) packet. In our experiments, the RTP payload size is 160 bytes. Adding the RTP header size of 12 bytes, the UDP header size of 8 bytes, the IP header size of 20 bytes, and the layer-2 frame header of 14 bytes, then the total size for each voice frame is 214 bytes. The captured layer-2 throughput is kbps (85.6 2) for both ways. Meanwhile, the TCP (Transmission Control Protocol) traffic generator of wsttcp [16], and the traffic analyzer of Ethereal is installed on workstations of SIP-1, SIP-2, SIP-3 and SIP-4. The traffic generator and analyzer are used to measure TCP performances over WLANs. In this paper, we study the effects of DoS attacks of AuthRF and AssRF. These DoS attacks are directly related with the processing mechanisms of the management frames. They have nothing to do with the bandwidth requirements and the choice of vocoder. We assume that our studies using G. 711 are applicable to other vocoders such as G. 729A and G as well. In our experiment, we observe DoS attacks. For authentication request and association request flooding DoS attacks, the average speed is 250 frames per second. The physical bandwidth requirement for these DoS attacks is below 0.11 Mbps, which is only 1.0% of the available physical bandwidth from b. The sniffer is a Window XP machine installed with the sniffing software of LinkFerret [17], which runs on the Agere Orinoco b PCI (Peripheral Component Interconnect) adapter. This sniffer is used to capture frames transferred over the wireless medium. The captured frames include 802.1X authentication frames, management frames, control frames and data frames. The traffic analyzer of Ethereal is installed on workstations of SIP-1 to SIP-4. Ethereal is used to measure VoIP call performances over wired and wireless networks. In our experiments, Ethereal is used to analyze RTP traffic and report the throughput, the packet loss, and jitters. We calculate the delay based on the timestamp of the captured packets of Internet Control Message Protocol (ICMP) echo request and ICMP echo replay. Voice quality is measured by packet loss, delay and jitter, and these measurements are translated into Mean Opinion Score (MOS) (Table 1) based on Eq. (1) and Eq. (2) [18]. MOS provides a numerical assessment of VoIP quality, and MOS ranking and user satisfactions in Table 1 are from the published data [19, 22]. that the security schemes such as Wired Equivalent Privacy (WEP), Temporal Key Integrity Protocol (TKIP) and R= 94.2-Id Ie (1) Advanced Encryption Standard (AES) cannot prevent any of MOS= *R + 7*10-6 * R (R-60)*(100-R) (2) these DoS attacks, and there is no need to report each one of them under different DoS attacks. To prevent crypto attacks, Table 1: MOS ranking and the user satisfaction. we choose the strongest security approach of i-AES to protect the tested WLAN in our experiment. MOS ranking User Satisfaction 4.3 to 5 Very Satisfied 4.0 to 4.3 Satisfied 3.6 to 4.0 Some Users Dissatisfied 3.1 to 3.6 Many Users Dissatisfied 2.6 to 3.1 Nearly All Users Dissatisfied Below 2.6 Not recommended Fig. 1: Test Design for WVoIP Studies. SIP-1 and SIP-2 are equipped with Linksys b/g wireless adapters which support 802.1X user authentication, data encryption and integrity with TKIP and AES. SIP-1 and SIP-2 represent the wireless VoIP phones. SIP-3 and SIP-4 represent the wired VoIP phones. The RADIUS server for 802.1X user authentication is a Linux based freeradius server (version 1.02), which is running on Red Hat 9.0 (Linux kernel of ). SIP server of Asterisk is running on Fedora Core 2 with Linux kernel of The DoS attacking tool of void11 [12] is installed on a Red Hat (kernel ) Linux machine (Hacker), which is used to launch layer-2 flooding In Eq (1), Id is related to one-way delay and Ie is related to packet loss. And both of them are also related to the type of vocoder. For a typical WVoIP call from SIP-1 to SIP-4 (Fig. 1), the calculated MOS is 4.40, which is close to the reported value of 4.5 [19]. Based on the MOS ranking and the user satisfaction (Table 1), WVoIP call quality under the controlled test environment is very satisfied. III. DOS ATTACKS ON WLAN COMMUNICATION The convergence of voice and data networks has becoming one of the most popular technologies in the telecommunication industry. There is a growing demand and deployment of VoIP in the enterprise environment and as a standard service by major carriers. Attracted by the advantages of both WLANs and VoIP, WVoIP was proposed and implemented over WLANs [20]. We also see a trend and growing demand of dual-mode mobile devices with WVoIP and 3G capabilities. Meanwhile, the security threat becomes
3 an important issue for the success of VoIP. VoIP is a real-time service and very susceptible to DoS attacks that affect audio transmission. AuthRF and AssRF DoS attacks can be easily than 500 ms. Meanwhile, the average throughput is kbps, which is calculated from the packet loss and the normal throughput of kbps. launched and could cause serious problems [12]. These attacks post a high risk for an enterprise to deploy VoIP Table 2: Voice characteristics vs. AuthRF. successfully. DoS against VoIP can take various forms, but it generally prevents users from effectively using the VoIP service. In this section, we study and quantify the effects of DoS attacks against WVoIP and regular TCP data communications. Parameter Throughput (kbps) Packet loss (%) Delay (ms) Jitter (ms) No AuthRF Under AuthRF > MOS A. AuthRF and AssRF DoS attacks on WVoIP AP authentication buffers are used to hold information during the authentication process. When the buffer is full, the AP would not be able to accept new call requests. A hacker could continuously flood the AP with authentication requests, making the AP incapable of accepting new WVoIP calls or serving those active WVoIP calls. We conducted experiments to demonstrate the AuthRF DoS attack on WVoIP. In Fig. 1, SIP-1 and SIP-4 have an active WVoIP call. After the hacker starts flooding authentication requests to the AP at the time of the 45 th second (Fig. 1), the WVoIP call stops (no traffic) immediately. The DoS attack stops at the time of the 55 th second, and it takes about 20 seconds to resume normal voice communications. The reason for taking so long to resume voice communication is that the AP itself is attacked and overflowed, and it needs a long time to return back to normal operations. For the AssRF DoS attack, a hacker could continuously flood the AP with association request frames to make the AP deny new WVoIP calls and stop serving active WVoIP calls. We conducted experiments to demonstrate the AssRF DoS attack on WVoIP. Effects of AssRF on WVoIP are similar to those of AuthRF. B. AuthRF and AssRF on TCP communication We conducted experiments to demonstrate AuthRF and AssRF DoS attacks on TCP data communication. In Fig. 1, SIP-1 and SIP-3 start a TCP session. After that, the hacker starts flooding authentication or association requests to the AP. During this DoS attack, the SIP-1/SIP-3 TCP session throughput drops immediately (Fig. 3). Effects of AuthRF on TCP data communication are similar to those of AssRF. Fig. 2: WVoIP throughput under AuthRF. Fig. 2 shows that there is still one way voice traffic captured at SIP-1 during the DoS attack. This is because AuthRF targets the AP, and SIP-1 still keeps sending voice data to the AP. However, the AP has no resource to receive and process the voice traffic from SIP-1. The sharp peak in Fig. 2 is due to the quick sending of the buffered data at the AP. Meanwhile, no new WVoIP calls can be accepted under the AuthRF attack. Table 2 gives the voice characteristics before and during the AuthRF DoS attack. During the attacking period, the voice packet loss rate is 35.0%. The average jitter is ms. The MOS is 1.58, and this voice quality is unacceptable (Table 1). Under the AuthRF attack, there is no ICMP echo reply received for the outgoing ICMP echo request. We assume that the one way delay is bigger Fig. 3: TCP throughput under AssRF attack. C. AuthRF and AssRF attacking mechanisms When the legitimate AP receives the authentication request with a faked source MAC address, it reserves buffers for the authentication request and sends out an authentication response to the faked wireless client. Since the faked wireless client does not exist, the AP cannot receive the ACK (ACKnowledgement) for the transmitted authentication response frame. The AP keeps sending out several authentication response messages. For AuthRF, the victim AP always keeps reserving buffers and/or sending multiple response messages for each received authentication request. To process these authentication requests consumes a great deal of the AP s resources. As a result, the AP has little
4 resource to serve those already associated wireless clients Although MAC address filtering is not an effective (WVoIP phones), and these wireless clients may either suffer approach for access control, its combination with other poor voice communications or lose the communication authentication methods could be used to effectively prevent completely. AuthRF and AssRF DoS attacks. For AuthRF and AssRF, When the AP receives an association request with a faked hackers floods the AP with thousands authentication request source MAC address, it checks its buffer and finds that the and/or association request frames with different faked source faked wireless client does not exist in its authenticated state addresses. The AP is forced to allocate resources and process table. It then sends out the deauthentication frame to the faked these faked authentication/association request frames. Thus, it wireless client. Since there is no layer-2 ACK from the faked consumes significant resources to process faked requests and wireless client, it keeps sending out several deauthentication cannot serve the legally associated wireless clients. MAC frames. For AssRF DoS attacks, the victim AP always keeps address filtering can help the AP drop faked requests and save checking buffers and sending multiple response messages for wireless resources to serve legitimate wireless users. To each received association request. It has no time or resources effectively prevent AuthRF and AssRF DoS attacks, MAC to serve those already associated wireless clients. This forces address filtering should be used as early as possible. the associated wireless clients to slow down or even stop their One advantage of MAC address filtering is its simplicity data communications. and effectiveness. The disadvantage is its poor scalability. It To prevent AuthRF and AssRF DoS attacks, the AP needs can be used for SOHO environment. However, it is difficult to to have the capability to distinguish valid requests and use MAC address filtering to protect an enterprise hacking requests. Unfortunately, the current (or environment with many wireless clients. This is because users i) standard does not support authentication of such of an enterprise wireless network are dynamic and often requests. moving from one access point to another. It is impractical and difficult to add every MAC address to every AP in an enterprise environment. IV. SOLUTIONS TO AUTHRF AND ASSRF Currently, there are no published solutions to prevent DoS attacks of AuthRF and AssRF. In this paper, we demonstrate solutions to resolve AuthRF and AssRF DoS attacks through modification of source codes of a Linux based HostAP [21]. In this section, we discuss two approaches to resolve AuthRF and AssRF DoS attacks. One method is MAC address filtering, and the other method is traffic pattern filtering. A. MAC addressing filtering(maf) Originally, MAC address filtering is an approach to control access to the wireless network based on the ap_control table such as Table 3. When MAC access filtering is enabled, the AP compares the source MAC address of the received authentication request frame with those in the ap_control table. If the received MAC address matches one of those in the ap_control table, it will further process the received authentication request or grant access to the wireless station. Otherwise, it will drop the received authentication request. However, MAC address filtering is not an effective way for access control because a hacker can easily sniff and fake MAC addresses of legitimate wireless users. Therefore, i-PSK (Pre-shared key) or i-802.1X/RADIUS is recommended for user authentication and access control. MAC address filtering alone is rarely used for access control to wireless network. Table 3: Example of the ap_control table. Name Content MAC policy allow MAC entries 3 MAC list 00:13:10:37:48:3d 00:50:8b:d0:ef:34 00:50:8b:d0:ee:b5 B. Traffic pattern filtering (TPF) Traffic pattern filtering is another method to prevent AuthRF and AssRF DoS attacks. In this paper, traffic pattern filtering means that the AP will stop processing authentication and or association request frames if it receives more than a certain number of frames per second. Under normal wireless environment, the wireless traffic is small and sporadic. And it is normal for one access point to receive and process around five frames per second. Under AuthRF and AssRF DoS attacks, the wireless traffic would follow a different pattern. For each faked authentication request frame, the hacker sends it five times, and the AP responds with ACK frames. Furthermore, the AP might receive and process up to hundreds authentication or association request frames per second. To prevent AuthRF DoS attack, we implement traffic pattern filtering rule after the AP retrieving the header information from the received authentication requests. In this phase, we not only have enough information from the sender to implement traffic pattern filtering, but also avoid wasting AP resources to process faked authentication request frames. On the other hand, for the AssRF DoS attack, we implement traffic pattern filtering after checking the authentication state of the sender of the received association request frame. If the sender is already authenticated, the association request will be further processed. Otherwise, the traffic pattern of association request frames will be checked, and filtering rule will be applied. For both AuthRF and AssRF DoS attacks, we have similar filtering rules. If the number of authentication or association request frames received per second is greater than 5, the received frames will be dropped; otherwise, they will be processed.
5 C. Validation of MAF and TPF solutions Table4: Voice characteristics vs. modifications. Parameter BMN- BM- AMN- AM- We implemented the solutions of MAC address filtering AssRF AssRF AssRF AssRF and traffic pattern filtering, and our experiments show that Throughput (kbps) they both can prevent AuthRF and AssRF DoS attacks Packet loss (%) effectively and efficiently. In this paper, we report the results Delay (ms) 0.68 > Jitter (ms) of traffic pattern filtering to prevent AssRF DoS attack. MOS For the WVoIP call using a Linux-based AP, the AssRF BMN-AssRF: Before modification without AssRF DoS attack could cause a high packet loss or call BM-AssRF: Before modification under AssRF disconnection (Fig. 4 and Table 4). Under the attack, MOS AMN-AssRF: After modification without AssRF becomes 2.20, which is unacceptable for all WVoIP users. AM-AssRF: After modification under AssRF Then, we modify the Linux based AP to use traffic pattern filtering to process the received association requests. After implementing traffic pattern filtering in the AP, when restarting the AssRF DoS attack, it has no effect on the tested WVoIP call quality (Fig. 5). Meanwhile, experiments show that TPF can also effectively prevent AuthRF DoS attacks on the TCP data communication. Without TPF, the TCP throughput decreases by more than 99% under the AuthRF attack (Fig. 3). With TPF implementation on the AP, the effects of AuthRF on TCP performance reduce significantly (Fig. 6), where the TCP throughput decreases by 5% only. Meanwhile, effects of MAF solutions are similar to that of TPF. Without implementation of MAF, under the AuthRF attack, the TCP throughput decreases more than 99%. After implementing MAF, the effects of AuthRF on TCP performance reduce dramatically, and the TCP throughput decreases by 5% only. Fig. 4: WVoIP throughput under BM-AssRF. Meanwhile, Table 4 shows that there is no voice data loss under the AssRF DoS attack. The jitter is small and similar to that without being attacked. Meanwhile, after modification, the calculated MOS for WVoIP calls is 4.40, and it does not change under the AssRF DoS attack. Thus, modification of association request processing mechanisms is successful, which prevents the AssRF DoS attack and guarantees a high WVoIP call quality. Fig. 6 TCP performances under AuthRF-TPF. Above studies show that MAF and TPF solutions are effective and efficient to improve WVoIP and TCP performance under DoS attacks. Fig. 5: WVoIP throughput under AM-AssRF. V. CONCLUSIONS In this paper, we analyze two DoS attacks against WLANs. We demonstrate AuthRF and AssRF DoS attacks on applications of regular TCP sessions and time sensitive WVoIP UDP traffic. It shows that these DoS attacks can cause serious problems for wireless communications. We also present a detailed study of the attacking mechanisms of AuthRF and AssRF DoS attacks. One major contribution of this paper is the implementation of a solution based on traffic pattern filtering to resolve AuthRF and AssRF DoS attacks against WLANs. Our solution is theoretically sound and costeffective with no performance degradation to TCP or UDP traffic. Another contribution of this study is an empirical
6 framework to emulate AuthRF and AssRF DoS attacks and and Networking Conference, Las Vegas, NV, 2004, pp. analyze performance impacts under different attacking scenarios. MAC address filtering is not scalable, and difficult to use against AuthRF and AssRF attacks on enterprise WLANs. Traffic pattern filtering can resolve vigorous DoS attacks; however, it cannot eliminate slow flooding rate DoS attacks. In the future, we will further study AuthRF and AssRF DoS attacks using the queuing network model, which will assist us to develop more effective and efficient solutions. Queuing network models have been used to study wireless data communication. In our future research, we will characterize the data processing functionalities of an AP with a queuing network model. The queues under study will be AP Receiver (APR), ACK (ACK), AP Processor (APP), and AP Sender (APS). The APR queue mainly receives and stores data. The ACK queue performs MAC layer acknowledgements to received wireless frames. Meanwhile, the APP queue mainly provides computation resource to process received data and prepare response messages. Finally, the APS queue takes care of the transmission and retransmission of response messages. Using a queuing network model, we would study properties of normal WLANs and the WLANs under DoS attacks. The queuing network model will help find the problem causes of AuthRF and AssRF. Based on analyses of the queuing models, we will develop better solutions to resolve AuthRF and AssRF DoS attacks. REFERENCES [1] L. A. Gordon, M. P. Loeb, W. Lucyshyn, R. Richardson, CSI/FBI computer crime and security survey, /FBI2005.pdf. [2] C. Liu, J. T. Yu, Protecting Enterprise Wireless LANs Using an Integrated Security Approach of VPN over i, 3rd International Conference on Cyber Information Technology and System Applications (CITSA), Orlando Florida, pp , [3] i, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, July, [4] C. Liu, J. T. Yu, "Review and Analysis of Wireless LAN Security Attacks and Solutions," Journal of International Engineering Consortium, vol. 59, [5] C. Liu, J. T. Yu, "An Analysis of DoS Attacks on Wireless LAN," IASTED International Conferences on Wireless Networks and Emerging Technologies (WNET2006), Banff, Canada, [6] J. Bellardo, S. Savage, Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions, Proceedings of the USENIX Security Symposium, 2003, pp [7] P. Ding, J. Holliday, A. Celik, Improving the Security of Wireless LANs by Managing 802.1X Disassociat ion, Proceedings of the IEEE Consumer Communications [8] S. Grech, J. Nikkanen, A Security Analysis of Wi-Fi Protected Access, The 9th Nordic Workshop on Secure IT-systems, Helsinki University of Technology, Finland, November [9] W. Ge, S. Sampalli, A Novel Scheme For Prevention of Management Frame Attacks on Wireless LANs, March 29, [10] D. Chen, J. Deng, P. K. Varshney, Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming, ACM MobiCom '03, Poster, San Diego, CA, USA, September 14-19, [11] V. Gupta, S. Krishnamurthy, M. Faloutsos, Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks, Proceedings of 2002 MILCOM Conference, vol. 2, 2002, pp [12] A. A. Vladimirov, K. V. Gavrilenko, A. A. Mikhailovsky, Wi-Foo: The Secrets of Wireless Hacking, Pearson/Addison Wesley, June 2004, pp [13] A. Mishra, W. A. Arbaugh, An Initial Security Analysis of the 802.1X Standard, University of Maryland, CS-TR- 4328, UMIACS-TR , Feb., [14] J. Walker, Status of Project IEEE Task Group w, Protected Management Frames, /11/Reports/tgw_update.htm, [15] CounterPath Solutions, [16] Wsttcp, Benchmarking tool measures TCP and UDP performance, bin/info?5896. [17] Tuca Software, LinkFerret Wireless Packet Sniffer, [18] W. Jiang, H. Schulzrinne, Comparisons of FEC and Codec Robustness on VoIP Quality and Bandwidth Efficiency, IEEE International Conference on Networks (ICN), Atlanta, Georgia, August 2002, pp [19] W. Jiang, H. Schulzrinne, Comparison and Optimization of Packet Loss Repair Methods on VoIP Perceived Quality under Bursty Loss, NOSSDAV 02, Miami Beach, Florida, USA, May, 2002, pp [20] M. Zibull, A. Riedel, D. Hogrefe, Voice over wireless LAN: a fine-scalable channel-adaptive speech coding scheme, WMASH 05, Cologne, Germany, Sept., 2005, pp [21] S. Shin, A. G. Forte, A. S. Rawat, H. Schulzrinne, Reducing MAC layer handoff latency in IEEE wireless LANs, MobiWac'04, October 1, 2004, Philadelphia, Pennsylvania, USA, pp [22] A.P. Markopoulou, F.A. Tobagi, M.J. Karam, Assessment of VoIP quality over Internet backbones, INFOCOM 2002, Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, 2002, vol. 1, pp
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform Peter Dulany, Chang Soo Kim, and James T. Yu [email protected], [email protected], [email protected] School of Computer Science,
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
Implementation of Video Voice over IP in Local Area Network Campus Environment
Implementation of Video Voice over IP in Local Area Network Campus Environment Mohd Nazri Ismail Abstract--In this research, we propose an architectural solution to integrate the video voice over IP (V2oIP)
Introduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone
The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 343 Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone Mohd Ismail Department
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Link Layer and Network Layer Security for Wireless Networks
White Paper Link Layer and Network Layer Security for Wireless Networks Abstract Wireless networking presents a significant security challenge. There is an ongoing debate about where to address this challenge:
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Scanning Delays in 802.11 Networks
Scanning Delays in 802.11 Networks David Murray Murdoch University [email protected] Michael Dixon Murdoch University [email protected] Terry Koziniec Murdoch University [email protected]
Gauging VoIP call quality from 802.11 WLAN resource usage
Gauging VoIP call quality from 82.11 WLAN resource usage Miroslaw Narbutt and Mark Davis Communications Network Research Institute School of Electronic and Communications Engineering Dublin Institute of
VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
NXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note 802.11w Management Frame Protection Copyright 2015 ZyXEL Communications Corporation 802.11w Management Frame Protection Introduction IEEE 802.11w
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg [email protected] Avaya Labs Research Basking Ridge, NJ USA Martin Kappes [email protected] Avaya Labs Research
TDM services over IP networks
Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Call Admission Control and Traffic Engineering of VoIP
Call Admission Control and Traffic Engineering of VoIP James Yu and Imad Al-Ajarmeh [email protected] [email protected] DePaul University Chicago, Illinois, USA ABSTRACT. This paper presents an extension
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 8. Wireless Networks Maria Eugenia Berezin, Franck Rousseau, Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
An Experimental Study on Wireless Security Protocols over Mobile IP Networks
An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: [email protected] Jorinjit S. Gill Department of Electrical and
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK
DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK ABSTRACT Dr. Sanjeev Dhull Associate Professor, RPIIT Karnal, Dept of Computer Science The DoS attack is the most
How To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks Vikram Gupta +, Srikanth Krishnamurthy, and Michalis Faloutsos Abstract Department of Computer Science and Engineering, UC Riverside,
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS
AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS Kati Wilson, Texas A&M University Kati is a student in the Electronics Engineering
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
Wireless Security with Cyberoam
White paper Cyberoam UTM Wireless Security with Cyberoam Robust, Fault-tolerant security is a must for companies sporting wireless networks. Cyberoam UTM strengthens the existing Wireless Security Architecture
Reducing MAC Layer Handoff Latency in IEEE 802.11 Wireless LANs
Reducing MAC Layer Handoff Latency in IEEE 80211 Wireless LANs Sangho Shin Andrea G Forte Columbia University {ss2020,andreaf}@cscolumbiaedu Anshuman Singh Rawat New York University asr245@nyuedu Henning
Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP
Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
The Analysis and Simulation of VoIP
ENSC 427 Communication Networks Spring 2013 Final Project The Analysis and Simulation of VoIP http://www.sfu.ca/~cjw11/427project.html Group #3 Demet Dilekci [email protected] Conrad Wang [email protected] Jiang
Wireless Security: Secure and Public Networks Kory Kirk
Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
How To Secure A Wireless Network With A Wireless Device (Mb8000)
MB8000 Network Security and Access Control Overview MB8000 employs almost all of the current popular WLAN security mechanisms. These include wireless-user isolation, closed system (by turning off SSID
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
VoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. [email protected] [email protected]. Phone: +1 213 341 1431
VoIP QoS Version 1.0 September 4, 2006 AdvancedVoIP.com [email protected] [email protected] Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved. No part of this
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
WIRELESS BANDWIDTH MANAGEMENT AUTHENTICATION IMPROVING QUALITY OF SERVICE
WIRELESS BANDWIDTH MANAGEMENT AUTHENTICATION IMPROVING QUALITY OF SERVICE Amanda PEART & Alice GOOD ABSTRACT: With the popularity of distributed applications such as BitTorrent and Peer 2 Peer (P2P) networks,
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
A New Approach to Developing High-Availability Server
A New Approach to Developing High-Availability Server James T. Yu, Ph.D. School of Computer Science, Telecommunications, and Information Systems DePaul University [email protected] ABSTRACT This paper
ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:
DSL Access Guide DSL Access Routers ZyXEL is a leading manufacturer and supplier of DSL and Voice over IP routers. ZyXEL offer a complete portfolio of routers suited for Telecoms providers, Internet Service
VoIP Security Threats and Vulnerabilities
Abstract VoIP Security Threats and Vulnerabilities S.M.A.Rizvi and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, UK e-mail: [email protected] This paper presents the
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Voice over IP (VoIP) for Telephony. Advantages of VoIP Migration for SMBs BLACK BOX. 724-746-5500 blackbox.com
Voice over IP (VoIP) for Telephony Advantages of VoIP Migration for SMBs BLACK BOX Hybrid PBX VoIP Gateways SIP Phones Headsets 724-746-5500 blackbox.com Table of Contents Introduction...3 About Voice
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
VoIP from A to Z. NAEO 2009 Conference Cancun, Mexico
VoIP from A to Z NAEO 2009 Conference Cancun, Mexico VoIP glossary What is VoIP? Bandwidth Signaling Codecs Quality of Service (QoS) What is VoIP? Voice over Internet Protocol (VoIP) is the method of transmitting
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless
Can I add a VoIP call?
Can I add a VoIP call? Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: [email protected] Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: [email protected] Abstract In this paper, we study the
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
Marratech Technology Whitepaper
Marratech Technology Whitepaper Marratech s technology builds on many years of focused R&D and key reference deployments. It has evolved into a market leading platform for Real Time Collaboration (RTC)
PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE 802.11 WIRELESS LANS
V OICE OVER WIRELESS LOCAL AREA N ETWORK PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE 82.11 WIRELESS LANS HONGQIANG ZHAI, JIANFENG WANG, AND YUGUANG FANG, UNIVERSITY OF FLORIDA The
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
Analysis of Basic Quality of Service Mechanism for Voice over IP In Hamdard University Network Campus
Analysis of Basic Quality of Service Mechanism for Voice over IP In Hamdard University Network Campus Shahbaz Akhatar Siddiqui Student MS (Telecom) Hamdard University Karachi Junior Lecturer in National
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Comparison of ICM with TPF-LEP to Prevent MAC Spoof DoS Attack in Wireless Local Area Infrastructure Network
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4162-4170, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: December 28, 2013 Accepted: January
WLAN Information Security Best Practice Document
WLAN Information Security Best Practice Document Produced by FUNET led working group on wireless systems and mobility (MobileFunet) (WLAN security) Author: Wenche Backman Contributors: Ville Mattila/CSC
MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 11, No 4 Sofia 2011 MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks N.
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS
NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS Andrei Sukhov 1), Prasad Calyam 2), Warren Daly 3), Alexander Iliin 4) 1) Laboratory of Network Technologies, Samara Academy of Transport
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)
FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi
Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008
Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008 John Bartlett NetForecast, Inc. [email protected] www.netforecast.com VoIP Deployment Realities VoIP is not just another application
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
VOIP Security Essentials. Jeff Waldron
VOIP Security Essentials Jeff Waldron Traditional PSTN PSTN (Public Switched Telephone Network) has been maintained as a closed network, where access is limited to carriers and service providers. Entry
Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows
Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows C. Mahlo, C. Hoene, A. Rostami, A. Wolisz Technical University of Berlin, TKN, Sekr. FT 5-2 Einsteinufer 25, 10587 Berlin, Germany. Emails:
Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.
Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic
VOIP SECURITY ISSUES AND RECOMMENDATIONS
VOIP SECURITY ISSUES AND RECOMMENDATIONS Sathasivam Mathiyalakan MSIS Department, College of Management, University of Massachusetts Boston Phone: (617) 287 7881; Email: [email protected] ABSTRACT
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Performance Analysis of VoIP Codecs over BE WiMAX Network
Performance Analysis of VoIP Codecs over BE WiMAX Network Muhammad Imran Tariq, Muhammad Ajmal Azad, Razvan Beuran, Yoichi Shinoda Japan Advanced Institute of Science and Technology, Ishikawa, Japan National
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
Admission Control for VoIP Traffic in IEEE 802.11 Networks
Admission Control for VoIP Traffic in IEEE 802.11 Networks Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: [email protected] Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: [email protected]
