Design of Standard VoIP Spam Report Format Supporting Various Spam Report Methods
|
|
- Giles Kelly
- 8 years ago
- Views:
Transcription
1 보안공학연구논문지 (Journal of Security Engineering), 제 10권 제 1호 2013년 2월 Design of Standard VoIP Spam Report Format Supporting Various Spam Report Methods Ji-Yeon Kim 1), Hyung-Jong Kim 2) Abstract VoIP (Voice over Internet Protocol) services can be abused by spammers who send out commercial messages in bulk due to their cost saving effects. However, an effort to prevent spam has hardly been made in implementing VoIP system, so that a spam reporting system that collects various types of VoIP spam and makes use of them to impose legal sanctions or to improve spam filtering techniques has not yet been developed. In this paper, we propose a VoIP spam reporting system by extending an existing spam reporting system of mobile phones. We design a message format for reporting VoIP spam by analyzing CDR (Call Detailed Records) that can be obtained from VoIP devices, and propose various paths which connect VoIP phones to spam reporting servers. In addition, we design the system modules and elicit their functional requirements of hardware and software. Keywords : VoIP (Voice over Internet Protocol), SPIT (SPam over Internet Telephony), Spam reporting system 1. Introduction Spam refers to unsolicited commercial messages, and is sent to many random recipients one-sidedly [1][2]. spam is a representative of spam with no charge for use, and call spam and SMS spam through mobile phones have also increased with the widespread use of mobile phones. Recently, as the number of VoIP users increases due to cost savings, VoIP spam is also being appeared. As far as spam and mobile phone spam are concerned, there are many countermeasures such as not only various spam filtering techniques but also an ex post facto measure such as a spam reporting system. A spam reporting system makes users to send spam contents containing information about spammers to spam reporting servers with a simple operation. In addition, it can be used to impose legal sanctions or to update spam database. However, no spam reporting system has been operated for VoIP, because hardly any spam filtering techniques has been applied to VoIP system yet. In this paper, we propose a spam reporting system for VoIP spam, including a reporting message Received(January 09, 2013), Review request(january 10, 2013), Review Result(1st: January 28, 2013, 2nd: February 07, 2013) Accepted(February 28, 2013) , Department of Information Security, Seoul Women s University, Korea jykim07@swu.ac.kr 2 (Corresponding author) , Department of Information Security, Seoul Women s University, Korea hkim@swu.ac.kr * This work was supported by a special research grant from Seoul Women s University (2012). 1
2 Design of Standard VoIP Spam Report Format Supporting Various Spam Report Methods format, reporting paths, and a method for constructing the system. We design the system by extending a spam reporting system of mobile phones operated by Korea Internet Security Agency (KISA). In regard to the KISA s system, there is only a reporting path using MO (Mobile Originated) service due to limitations of mobile phones, such as an expensive usage charges for internet access through 2G or 3G network. In comparison, reporting charges for VoIP spam can be free or small costs, because VoIP uses wired or wireless internet network, such as Wi-Fi (Wireless Fidelity), WiBro (Wireless Brodband Internet), and HSPA (High Speed Packet Access). In addition, various TCP/IP-based applications can be installed on VoIP phones, so that we can make reporting messages in different ways. For these reasons, we suggest various reporting methods using not only MO service but also Web service, SMTP (Simple Mail Transfer Protocol) service and an application specialized spam reporting system. The remainder of this paper is organized as follows. In section 2, we describes various types of VoIP spam and the existing spam reporting system, and CDR that can be obtained in IP-PBX (Private Branch exchange) to suggest a message format. In section 3 and 4, we design the message format and propose various reporting paths. In section 5, we suggest main modules of the system and elicit their functional requirements. Finally, the conclusions and future work are presented in section Background In VoIP, there are many types of spam such as call spam, SMS spam, callback URL spam, IM spam, and presence spam. From the users viewpoint, those can be classified into two types of spam, voice spam and text spam. Call spam belongs to the voice spam and the text spam comprises the others. In this work, we define a message format that can distinguish the two types of spam. In addition, we refer to the existing reporting system of mobile phones operated by KISA, which uses five indices for reporting spam such as connected number, calling number, receiving time, contents, and a call type [3]. To develop the additional indices for VoIP spam, we look at CDR information that can be collected from IP-PBX [4]. Table 1 shows the information classified into three parts, call, caller, and callee. [Table 1] CDR information of IP-PBX Classification Call Caller Callee Call Detailed Records sequence number, call connected time, duration, internal fail code, call initiation time, release time, call type origination IP address, original calling number, calling number, calling user group, calling tenant group, outgoing route, outgoing route name dialed number, called user group, called tenant group, incoming route name, incoming route 2
3 보안공학연구논문지 (Journal of Security Engineering), 제 10권 제 1호 2013년 2월 3. Design of a message format of VoIP spam reporting system All the indices required to report mobile phone spam can also be made use of for VoIP spam. In order to develop the additional indices, we need to look at the column of caller in Table 1 to get information about spam caller. Origination IP address is an IP address of a calling party s phone which is used for call signaling. Original calling number refers to a calling line, and it defers from a calling number that can be changed by callers. Calling number is the same as the existing index for mobile phone spam. However, the other three indices cannot provide information about the end user, because those are information associated with IP-PBX, multi-tenant, and outgoing trunk, respectively. Thus, we have defined the format by developing two additional indices, origination IP address and original calling number, as shown in Table 2. [Table 2] A message format of VoIP spam reporting system Index Origination IP address Original calling number Calling number Connected number Receiving time Call type Contents Descriptions IP address used for call signaling Calling number used for call signaling Calling number shown on display of callee Dialed number received VoIP spam The time at which the spam arrived at the phone The title of event reported spam Voice spam : Voice Text spam : SMS, IM, CBURLSMS, Presence Spam messages arrived at the phone In case that original calling number is forged, we can find the place of dispatch by tracing origination IP address. However, in order to trace the address, some premises are required as below. Premise 1. VoIP phones should be able to analyze SIP messages. Premise 2. Both caller and callee should be VoIP user. Premise 3. Origination IP address should not be modified and spoofed by service providers or attackers. Premise 4. VoIP phones should use public IP address. Since origination IP address is included in a SIP message sent to a VoIP phone, the phones should be able to analyze the SIP message to extract the address. If one of the caller and callee does not use VoIP, a SIP message is translated in trunk gateway of mobile phone providers, so that a SIP message cannot be sent to 3
4 Design of Standard VoIP Spam Report Format Supporting Various Spam Report Methods VoIP phones. In addition, even though we succeed in tracing the address, the address should be correct and should not use private IP address to identify a spammer. 4. Development of reporting paths of VoIP spam reporting system As far as the KISA s system is concerned, it sends reporting messages in the form of SMS by using MO service. In comparison, reporting messages of VoIP can be sent in various ways by using TCP/IP application layer protocols or an application specialized spam reporting system. In this paper, we propose three additional reporting paths such as using HTTP protocol, SMTP protocol, and the specialized application, as shown in Fig. 1. [Fig. 1] Three reporting paths of VoIP spam reporting system As regards using HTTP, a reporting message is sent through port 80 or some other designated ports, using a web browser embedded in the VoIP phone [5]. The phone communicates with the web server by using HTTP methods such as GET and POST. Fig. 2 shows an example reporting message using POST method, which includes indices for reporting the spam in each filed. In the case of using SMTP, a reporting message is sent to the mail server through port 25. Although the mail server is overloaded or disrupted due to a large amount of services, it can provide the reliability for the message by periodically re-transmitting. Lastly, in the case of using the specialized application, it sends a reporting message through a designated port, and does not need to have the message header. In order to use the application, the spam collection center and VoIP phone manufacturers need to discuss the message format and the path in advance. 4
5 보안공학연구논문지 (Journal of Security Engineering), 제 10권 제 1호 2013년 2월 POST /path/script.cgi HTTP/1.1 HOST: SPAMSERVER.KISA.OR.KR From: User-Agent: SPAMTool/1.0 Content-Type: application/x-www-form-urlencoded Content-Length: 158 origin_ip= &origin_num= &call_num= &con_num= &recv_time=12%3a30%2030%2djun%2d2010&call_type=sms%2dtest&content=callwhene veryouwant [Fig. 2] An example reporting message sent using POST method 5. Design of VoIP Spam Reporting System Modules In this section, we propose a method for constructing the spam reporting system by defining system modules and their required functions. The system consists of three types of modules, VoIP phones, spam reporting servers, and an integrated spam processing system. The client side is composed of VoIP phones that can report spam. The server side is composed of an integrated spam processing system and three spam reporting servers, web server, server, and MO server. Table 3 presents requirements of hardware and software for implementation of the modules. [Table 3] Functional requirements of main system modules Module Component Requirements VoIP phones must be able to run TCP/IP-based application and H/W send messages via SMS and MMS. VoIP phone Reporting software for SMS and MMS S/W Web browser for reporting spam MO server system H/W Web server system Spam reporting server server system Web page for reporting spam S/W Processing software of server Hardware for sending reported messages to spam database H/W Integrated spam processing system Software of the specialized spam reporting server S/W Management software for data sequencing 5
6 Design of Standard VoIP Spam Report Format Supporting Various Spam Report Methods In case that a VoIP phone does not have a display, the user can report spam by pressing the designated keypad button agreed by the reporting paths. Spam reporting servers receive reporting messages from VoIP phones and send all the messages to an integrated spam processing system that integrates the messages and extracts spam data, and then stores the data into database. In order to store the data in chronological order, the processing system should be able to add time field to data, and software to retrieve and manage the data should be provided to an administrator. Fig. 3 shows the process of the integrated spam processing system. [Fig. 3] Data sequencing process of Integrated spam processing system module 6. Conclusion We have proposed a spam reporting system that collects VoIP spam from the users and can be used to impose legal sanctions or to improve spam filtering techniques. In order to develop the system we have designed a message format to report spam by extending the existing reporting indices of mobile phone spam. We have developed two additional indices such as origination IP address and original calling number by looking at IP-PBX. Since original calling number can be forged in the internet, we have suggested four premises required for use of origination IP address as the reporting index. In addition, we have developed additional reporting paths such as using HTTP, SMTP, and specialized application, because the reporting messages can be sent to spam reporting servers using TCP/IP application layer protocols in contrast to the spam reporting system of mobile phones has only a path using MO service. For implementation of the system, we have designed main system modules, VoIP phones, spam reporting servers, and an integrated spam processing system. In addition, we have elicited their requirements of hardware and 6
7 보안공학연구논문지 (Journal of Security Engineering), 제 10권 제 1호 2013년 2월 software. This work can be made use by organizations or companies who want to collect and manage VoIP spam. As future work, we will develop additional reporting indices, and security techniques and policies to provide the reliability to the system should be developed. References [1] P.M. Figliola, Spam: An Overview of Issues Concerning Commercial Electronic Mail, CRS Report for Congress, The library congress (2008). [2] M. Hurley, VoIP vulnerabilities, CCIP Information note, Centre for Critical Infrastructure Protection (2007), Issue 06. [3] February 15 (2013). [4] Tenor Carrier MultiPath Switch, Quintum Tenor CMS CDR, product guide, Quintum Technologies (2005). [5] R. Fielding et el., Hypertext Transfer Protocol HTTP/1.1, RFC 2616, The Internet Engineering Task Force (1999). [6] February 15 (2013). [7] T. S. Guzella and W. M. Caminhas, A review of machine learning approaches to Spam filtering, Expert Systems with Applications (2009), Vol. 35, Issue 7, pp [8] G. Schryen, The impact that placing addresses on the Internet has on the receipt of spam: An empirical analysis, Computers and Security (2007), Vol. 26, Issue 5, pp
8 Design of Standard VoIP Spam Report Format Supporting Various Spam Report Methods Authors Ji-Yeon Kim She received her B.S. degree in information security engineering from Seoul Women s University in She is currently a doctoral student in Computer Engineering at Seoul Women s University. Research interests: VoIP Security, Cloud Computing Security, Information Security and Modeling and Simulation. Hyung-Jong Kim He has been a faculty member of Seoul Women s University since Mar He worked as a principal researcher of Korea Information Security Agency (KISA) from 2001 to He received his information engineering B.S. (1996) degree in Sungkyunkwan university, Korea. Also, he received his M.S. (1998) and Ph. D. (2001) degree in electrical computer engineering department of Sungkyunkwan university. He worked in the CyLab Korea at CMU (Carnegie Mellon University) as avisiting scholar from 2004 to Research interests: VoIP Security, Information Security and Simulation modeling methodology. 8
A Phased Framework for Countering VoIP SPAM
International Journal of Advanced Science and Technology 21 A Phased Framework for Countering VoIP SPAM Jongil Jeong 1, Taijin Lee 1, Seokung Yoon 1, Hyuncheol Jeong 1, Yoojae Won 1, Myuhngjoo Kim 2 1
More informationAn outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
More informationInternet Telephony Terminology
Internet Telephony Terminology Understanding the business phone system world can be a daunting task to a lay person who just wants a system that serves his or her business needs. The purpose of this paper
More informationPrevention of Spam over IP Telephony (SPIT)
General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem
More informationVoice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Vijay Radhakrishnan & Ranjith Mukundan Wipro Technologies, Bangalore, India Email:{radhakrishnan.vijay,
More informationMobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)
More informationMethods for Lawful Interception in IP Telephony Networks Based on H.323
Methods for Lawful Interception in IP Telephony Networks Based on H.323 Andro Milanović, Siniša Srbljić, Ivo Ražnjević*, Darryl Sladden*, Ivan Matošević, and Daniel Skrobo School of Electrical Engineering
More informationSPAM over Internet Telephony (SPIT) und Abwehrmöglichkeiten
Zukunft der Netze, 20.03.2009 SPAM over Internet Telephony (SPIT) und Abwehrmöglichkeiten Dirk Hoffstadt (Uni Duisburg-Essen) Christoph Sorge (NEC) Yacine Rebahi (Fraunhofer FOKUS) Outline Introduction
More informationWhite Paper Integration of TTY Calls into a Call Center Using the Placeholder Call Technique Updated: February 2007
Overview of Call Centers White Paper Integration of TTY Calls into a Call Center Using the Placeholder Call Technique Updated: February 2007 All organizations have a phone system, but a call center has
More informationInternet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)
Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate
More informationA Study on Countering VoIP Spam using RBL
2011 2nd International Conference on Networking and Information Technology IPCSIT vol.17 (2011) (2011) IACSIT Press, Singapore A Study on Countering VoIP Spam using RBL Seokung Yoon, Haeryoung Park, Myoung
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationApplication Note - Using Tenor behind a Firewall/NAT
Application Note - Using Tenor behind a Firewall/NAT Introduction This document has been created to assist Quintum Technology customers who wish to install equipment behind a firewall and NAT (Network
More informationConfiguring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment
Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment Application Notes Rev 1.0 P/N 550-06690 Last Updated: October 26, 2015 Revision History Revision Date Revised
More informationZyXEL IP PBX Support Note. ZyXEL IP PBX (X2002) VoIP. Support Notes
ZyXEL IP PBX (X2002) VoIP Support Notes Version 1.00 October 2008 1 Contents Overview ZyXEL IP PBX Support Note 1. How to manage and maintain your IPPBX?...3 1.1 Firmware Upgrade..3 1.2 Backing up your
More informationIntegration of GSM Module with PC Mother Board (GSM Trunking) WHITE/Technical PAPER. Author: Srinivasa Rao Bommana (srinivasrao.bommana@wipro.
(GSM Trunking) WHITE/Technical PAPER Author: Srinivasa Rao Bommana (srinivasrao.bommana@wipro.com) Table of Contents 1. ABSTRACT... 3 2. INTRODUCTION... 3 3. PROPOSED SYSTEM... 4 4. SOLUTION DESCRIPTION...
More informationContents. Specialty Answering Service. All rights reserved.
Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from
More informationCreating your own service profile for SJphone
SJ Labs, Inc. 2005 All rights reserved SJphone is a registered trademark. No part of this document may be copied, altered, or transferred to, any other media without written, explicit consent from SJ Labs
More information10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
More informationEZLoop IP-PBX Enterprise SIP Server
EZLoop IP-PBX Enterprise SIP Server Copyright 2007 Teletronics International, Inc. 2 Choke Cherry Road, Rockville, MD 20850 sales@teletronics.com www.teletronics.com CH1. Overview...4 1.1 Specifications...4
More informationEnabling Users for Lync services
Enabling Users for Lync services 1) Login to collaborate.widevoice Server as admin user 2) Open Lync Server control Panel as Run As Administrator 3) Click on Users option and click Enable Users option
More informationHow To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib
NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application
More informationA Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
More informationSIM Configuration Guide. February 2015 Version 1 Document Reference: 8127
SIM Configuration Guide February 2015 Version 1 Document Reference: 8127 Contents 1 SIM APN Settings... 3 2 SIM MMS Settings... 3 3 SIM Email Settings... 4 4 SIM SMS Settings... 5 5 SIM SMS Charging...
More informationOffice Link System for FOMA Internal Line Connections
Enterprise-oriented Internal Line Service FOMA Internal Line Service Internal Line Optional Functions Office Link System for FOMA Internal Line Connections Although we have previously offered OFFICEED,
More informationWebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com
WebRTC: Why and How? FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This docume nt is copyright of FRAFOS GmbH. Duplication or propagation or e xtracts
More informationETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
More informationDetecting Spam in VoIP Networks. Ram Dantu Prakash Kolan
Detecting Spam in VoIP Networks Ram Dantu Prakash Kolan More Multimedia Features Cost Why use VOIP? support for video-conferencing and video-phones Easier integration of voice with applications and databases
More informationMicrosoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE
Microsoft Office Communications Server 2007 & Coyote Point Equalizer DEPLOYMENT GUIDE Table of Contents Unified Communications Application Delivery...2 General Requirements...6 Equalizer Configuration...7
More informationIntroduction to Computer Security Benoit Donnet Academic Year 2015-2016
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 1 Agenda Networking Chapter 1: Firewalls Chapter 2: Proxy Chapter 3: Intrusion Detection System Chapter 4: Network Attacks Chapter
More informationRelease the full potential of your Cisco Call Manager with Ingate Systems
Release the full potential of your Cisco Call Manager with Ingate Systems -Save cost with flexible connection to Service Providers. -Save mobile costs, give VoIP mobility to your workforce. -Setup an effective
More informationBEng (Hons) Telecommunications. Examinations for 2011 2012 / Semester 1
BEng (Hons) Telecommunications Cohort: BTEL/10A/FT Examinations for 2011 2012 / Semester 1 MODULE: IP Telephony MODULE CODE: TELC3107 Duration: 2 Hours Reading time: 15 Minutes Instructions to Candidates:
More informationSetting Up Message Notifications in Cisco Unity 8.x
CHAPTER 23 Setting Up Message Notifications in Cisco Unity 8.x See the following sections in this chapter: Overview of Message Notifications in Cisco Unity 8.x, page 23-1 Setting Up Text Message Notifications
More informationLink Gate SIP. (Firmware version 1.20)
Link Gate SIP (Firmware version 1.20) User guide v1.0 1 Content 2 1. Technical parameters - Dimensions 133 x 233 x 60 mm - Weight 850 g - Operating position various - Operating condition temperature: +5
More informationICE 008 IP PBX. 1. Product Information. 1.1. New Mini PBX. 1.2. Features 1.2.1. System Features
1. Product Information 1.1. New Mini PBX ICE 008 IP PBX ICE008 is new generation office communication equipment that delivers traditional PBX (private branch exchange) functions and more with advanced
More informationTelephone Charging System
Telephone Charging System Helsinki University of Technology Yao Yanjun Petteri Tulikoura Agenda Introduction Traditional telephone charging system Outdated Charging Charging Nowadays Future scenarios for
More informationFRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com
WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts
More informationDigium Switchvox AA65 PBX Configuration
Digium Switchvox SIP Trunking using Optimum Business SIP Trunk Adaptor and the Digium Switchvox AA65 IP-PBX v23695 Goal The purpose of this configuration guide is to describe the steps needed to configure
More informationVoIP / SIP Planning and Disclosure
VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings
More informationPreparatory Meeting for Phase 2 of Philippine National ENUM Trial
Preparatory Meeting for Phase 2 of Philippine National Trial IP Telephony Group Advanced Science and Technology Institute Department of Science and Technology December 12, 2005 NCC-CICT Dialing Scheme
More informationMETHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT
Review of the Air Force Academy No 1 (31) 2016 METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Paul MOZA, Marian ALEXANDRU Transilvania University, Brașov, Romania DOI: 10.19062/1842-9238.2016.14.1.16
More informationNAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
More informationIntegrating notification services in computer network and mobile telephony
Integrating notification services in computer network and mobile telephony Vittorio Ghini Dipartimento di Scienze dell Informazione Università di Bologna Via Mura A. Zamboni 7 40134 Bologna, Italy Phone.
More informationFeature and Technical
BlackBerry Mobile Voice System for SIP Gateways and the Avaya Aura Session Manager Version: 5.3 Feature and Technical Overview Published: 2013-06-19 SWD-20130619135120555 Contents 1 Overview...4 2 Features...5
More informationAny to Any Connectivity Transparent Deployment Site Survivability
Any to Any Connectivity Transparent Deployment Site Survivability The Performance You Want. The Installation Simplicity You Expect. Quintumʼs innovative solutions are The Perfect Fit for Enterprise& Service
More informationOFFICEED Service System
Service System Internal Solution Internal Line Service Corporate Service Service System The service provides flat-rate voice calls between FOMA s, and between FOMA s and s under user s. New equipment has
More informationPrevention of Anomalous SIP Messages
International Journal of Future Computer and Communication, Vol., No., October 03 Prevention of Anomalous SIP Messages Ming-Yang Su and Chung-Chun Chen Abstract Voice over internet protocol (VoIP) communication
More informationNATIONAL SECURITY AGENCY Ft. George G. Meade, MD
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco
More informationUniversal Unified Communications Integration
Universal Unified Communications Integration Managing the convergence of unified communications to IP and into the cloud The Computer & Instrumentation Chapter of the IEEE New Jersey Coast Section October
More informationof the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier
VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture
More informationIntroduction to VoIP Technology
Lesson 1 Abstract Introduction to VoIP Technology 2012. 01. 06. This first lesson of contains the basic knowledge about the terms and processes concerning the Voice over IP technology. The main goal of
More informationConfiguration Notes 290
Configuring Mediatrix 41xx FXS Gateway with the Asterisk IP PBX System June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 About Mediatrix 41xx Series FXS Gateways...
More informationVirtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
More informationCommunications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
More informationChapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University
Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push
More informationDevice SIP Trunking Administrator Manual
Table of Contents Device SIP Trunking Administrator Manual Version 20090401 Table of Contents... 1 Your SIP Trunking Service... 2 Terminology and Definitions... 2 PBX, IP-PBX or Key System... 2 Multi-port
More informationConfiguration of Applied VoIP Sip Trunks with the Toshiba CIX40, 100, 200 and 670
Configuration of Applied VoIP Sip Trunks with the Toshiba CIX40, 100, 200 and 670 Businesses Save Money with Toshiba s New SIP Trunking Feature Unlike gateway based solutions, Toshiba s MIPU/ GIPU8 card
More informationFonality. Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide
Fonality Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide Fonality Table of Contents 1. Overview 2. SIP Trunk Adaptor Set-up Instructions 3.
More informationSIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationInteractive Voice Response System by Using Asterisk
Interactive Voice Response System by Using Asterisk Ankita Bhondge, Aditi Bhatkar, Sapna Fender, Sonali Thakre, Megha Goel Student, Dept. of C.S.E., SRMCEW, RTM University, Nagpur, India. Professor, Dept.
More informationSpam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange
More informationspiderstar VoIP Interface Version 4.0 User manual
spiderstar VoIP Interface Version 4.0 User manual 2009 Vanillatech GmbH Contents 1 Introduction...3 2 Setup...4 2.1 on an existing VMWare Server or -Player...4 2.2 on an existing Linux server...4 3 Features...5
More informationCategory: ClearTrunk Hosted PBX Features
Category: ClearTrunk Hosted PBX s Group: Auto Attendants Customer Portal Top Level Auto Attendant (Always On) Multiple Top Level Auto Attendants (Always on) Top Level Auto Attendant (Time Based) Sub-Level
More informationHow to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
More informationA host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
More informationarchitecture: what the pieces are and how they fit together names and addresses: what's your name and number?
Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
More informationVirtual Call Center. Dragan Savić, Sara Stančin, Grega Jakus, Sašo Tomažič University of Ljubljana, Faculty of Electrical Engineering
Virtual Call Center Dragan Savić, Sara Stančin, Grega Jakus, Sašo Tomažič University of Ljubljana, Faculty of Electrical Engineering Abstract - A call center is a centralized workspace, primarily intended
More informationFrequently Asked Questions about Integrated Access
Frequently Asked Questions about Integrated Access Phone Service How are local, long distance, and international calls defined? Local access transport areas (LATAs) are geographical boundaries set by the
More informationApplication Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security
Patton Electronics Co. www.patton.com 7622 Rickenbacker Drive, Gaithersburg, MD 20879, USA tel: +1 301-975-10001000 fax: +1 301-869-9293 Application Note Patton SmartNode in combination with a CheckPoint
More informationUsing MIS 3e Chapter 6A Appendix
Study Questions Using MIS 3e Chapter 6A Appendix How the Internet Works David Kroenke Q1: How does email travel? Q2: What is a communications protocol? Q3: What are the functions of the five TCP/IP-OSI
More informationApplication Notes Rev. 1.0 Last Updated: February 3, 2015
SBC 1000/2000 Series Configuration Guide with Cisco Unified Call Manager v8.6 for Level 3 Voice Complete SM Deployments Application Notes Rev. 1.0 Last Updated: February 3, 2015 Contents 1 Document Overview...
More informationIngate Firewall/SIParator SIP Security for the Enterprise
Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...
More informationFirewall-Friendly VoIP Secure Gateway and VoIP Security Issues
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice
More informationVoIP Conformance Labs
VoIP acceptance, VoIP connectivity, VoIP conformance, VoIP Approval, SIP acceptance, SIP connectivity, SIP conformance, SIP Approval, IMS acceptance, IMS connectivity, IMS conformance, IMS Approval, VoIP
More informationUpdated Since : 2007-02-09
Microsoft Exchange Server 2007 Unified Messaging PBX Configuration Note: Avaya S8300 with AudioCodes Mediant 2000 using T1 CAS (In-band DTMF Tones) By : AudioCodes Updated Since : 2007-02-09 READ THIS
More informationVulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea
More informationBuilding the Lync Security Eco System in the Cloud Fact Sheet.
Building the Lync Security Eco System in the Cloud Fact Sheet. [Type text] The need to secure all entries to the fastest growing Unified Communication application (UC) and allow for complete inter-operability
More informationOfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
More informationVirtual FAX Function in Vigor IPPBX 2820 Series
Virtual FAX Function in VigorIPPBX 2820 Series In response to environmental policy of paperless in office, DrayTek introduces a new function of Virtual FAX in VigorIPPBX 2820 series. The built in Virtual
More informationFunctional Specifications Document
Functional Specifications Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:19-10-2007
More informationmobile unified communications client and docking station
FREQUENTLY ASKED QUESTIONS mobile unified communications client and docking station What are the target customer characteristics of a Mobile UC subscriber? + Verizon Wireless as mobile carrier. Mobile
More informationVOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More informationNetwork Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
More informationVoIP telephony over internet
VoIP telephony over internet Yatindra Nath Singh, Professor, Electrical Engineering Department, Indian Institute of Technology Kanpur, Uttar Pradesh India. http://home.iitk.ac.in/~ynsingh MOOC on M4D (c)
More informationProxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
More informationChapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
More informationWith 360 Cloud VoIP, your company will benefit from more advanced features:
Voice over IP (VoIP) has emerged as the new leader in cost-effective standards based communications. 360 Cloud VoIP enables customers have the benefits of an Enterprise PBX for a fraction of the cost of
More informationcom.sat IP Basic ISDN
com.sat IP Basic ISDN com.sat Multichannel Gateway 1 2009 com.sat GmbH Kommunikationssysteme Schwetzinger Str. 19 D-68519 Viernheim www.comsat.de Tel: +49-(0)6204-7050-0 1. General Overview IP BASIC ISDN:
More informationStep into the next level of office communication
Step into the next level of office communication Agenda ConVox Hosted IP-PBX Hosted IP-PBX v/s PBX comparison Setup comparison Comprehensive Features Admin Features Screen shot Summary of benefit comparison
More information[Asterisk IP Telephony Solutions]
2016 [Asterisk IP Telephony Solutions] Azim U. Hoque President University IT Forum Bangladesh 1/30/2016 Workshop on Asterisk IP Telephony Solutions Over the existing Wi-Fi, LAN/MAN/WAN/ EPN/VPN, 3G and
More informationApplication Notes Rev. 1.0 Last Updated: January 9, 2015
SBC 1000/2000 Series Configuration Guide with Cisco Unified Call Manager v9.1 for Level 3 Voice Complete SM SIP Trunk Deployments Application Notes Rev. 1.0 Last Updated: January 9, 2015 Contents 1 Document
More informationSIP Trunking using the EdgeMarc Network Services Gateway and the Mitel 3300 ICP IP-PBX
June 26th, 2014 SIP Trunking using the EdgeMarc Network Services Gateway and the Mitel 3300 ICP IP-PBX Page 1 of 30 Table of Contents 1 Overview... 3 2 Prerequisites... 3 3 Network Topology... 4 4 Description
More informationCisco Emergency Responder 9.0
Data Sheet Cisco Emergency Responder 9.0 Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, enabling easy collaboration every time from
More informationSession Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
More informationSecuring SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
More informationInternet Telephony PBX System. IPX-300 Series. Quick Installation Guide
Internet Telephony PBX System IPX-300 Series Quick Installation Guide Overview PLANET IPX-300/IPX-300W IP PBX telephony systems ( IP PBX in the following term) are designed and optimized for the small
More information3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW SIP is an application layer protocol that is used for establishing, modifying and terminating multimedia sessions in an Internet Protocol (IP) network. SIP
More informationCore Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
More informationIP- PBX. Functionality Options
IP- PBX Functionality Options With the powerful features integrated in the AtomOS system from AtomAmpd, installing & configuring a cost- effective and extensible VoIP solution is easily possible. 4/26/10
More information