Reviewing Speaker Recognition Influence in Strengthening VOIP Caller Authentication
|
|
|
- Sabrina McKenzie
- 10 years ago
- Views:
Transcription
1 International Arab Journal of e-technology, Vol. 1, No. 4, June Reviewing Speaker Recognition Influence in Strengthening VOIP Caller Authentication Qutaiba Ali, Nada Abdul Ghani Computer Engineering Department, University of Mosul, Iraq Abstract: This paper focuses on authentication issues and user ID detection depending on the voice signature of the incoming Voice over IP (VoIP) calls. Firstly, a complete speaker recognition system based on LPC feature extraction and decision based on Artificial Neural Network was described and built using MATLAB package. Then, MATLAB package was used to develop a simplified prototype version of the modified SIP protocol which is used to manage calls establishment among the network nodes. These codes were written for both SIP server and client nodes. The modified SIP protocol was implemented on an experimental network which is built to demonstrate the operation of the enhanced authentication procedure. Keywords: Voice over IP, Session Initiation Protocol, Speaker Recognition, Neural Network. Received August 30, 2009; Accepted February 17, Voice over IP (VoIP) Security Voice over IP, or Internet telephony is the idea is to use the Internet as a telephone network with some additional capabilities. Instead of communicating over a circuit-switched network, this application allows communication between two parties over the packetswitched Internet.. The VoIP data processing consists of the following four steps: signaling, encoding, transport, and gateway control [11, 12]. Signaling: The purpose of the signaling protocol is to create and manage connections or calls between endpoints.h.323 and the Session Initiation Protocol (SIP) are two widely used signaling standards for call setup and management. SIP has proven to be the most widely used signaling protocol, and hence it is considered here in this work [23, 24]. Encoding and Transport: Once a connection is setup, voice must be transmitted by converting the voice into digitized form, then segmenting the voice signal into a stream of packets. The first step in this process is converting analog voice signals to digital, using an analog-to-digital converter. Here a compression algorithm can be used to reduce the volume of data to be transmitted. Next, voice samples are inserted into data packets to be carried on the Internet using typically the Real-time Transport Protocol (RTP). RTP packets have header fields that hold data needed to correctly reassemble the packets into a voice signal on the other end. Lastly, the encapsulated voice packets are carried as payload by the user datagram protocol (UDP) for ordinary data transmission. At the other end, the process is reversed: the packets are disassembled and put into the proper order, and then the digitized voice is processed by a digital-to-analog converter to render it into analog signals for the called party s handset speaker. There are wide range of voice Codec (coder/decoder or compression/decompression) protocols available for VoIP phone implementation. The most common voice Codec includes G.711, G.723, G.726, G.728, and G.729, etc [11l 12]. Gateway Control: The IP network itself must then ensure that the real-time conversation is transported across the telephony system to be converted by a gateway to another format either for interoperation with a different IP-based multimedia scheme or because the call is being placed onto the PSTN [23, 24]. In fact, the Internet is the foundational service used by Voice over IP (VoIP), and the Internet itself can be considered a hostile environment from the security point of view. All Internet users must protect their transmissions from potential attackers, and VoIP users are no exception. This is true for both security of SIPenabled sessions and also for SIP signaling security [21]. Authentication is a security feature which ensures that access is given only to users who are permitted access. During a call involving SIP user-agent and server, an attacker could masquerade as a user, forging the real identity of the sender. Authentication provides a mechanism to verify that a request sender and/or receiver are legitimate. Each phone has an identity (Usually phone number) that is associated with the device. Having a device impersonate the identity of another can be used as an attack to either receive calls or place calls with the spoofed identity. An attacker wishing to impersonate someone would setup their VOIP phone device to use the identity of the victim s device. The attacker s device then registers with the phone system. Any calls intended for the victim s
2 148 International Arab Journal of e-technology, Vol. 1, No. 4, June 2010 phone number would then be directed to the attacker s phone. The attacker could then answer a call and impersonate the victim. The attacker also has the ability to use the spoofed device to place calls. The caller ID at the phone receiving the call would indicate that the victim is calling, not the attacker. This can also be used by the attacker to impersonate the victim [10]. Another attack is IP Spoofing, an attacker gains unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine by spoofing the IP address of that machine. This technique can be used to impersonate either a control node or an end node in the VOIP network [20]. Caller ID information has become relied upon for many purposes. Many banking applications now use caller ID to verify the identity of the customer. An attacker spoofing the ID of a victim s phone could use this to gain access to banking or credit card information [7]. The traditional phone system is minimally susceptible to this type of attack. The centralized configuration of phone lines in the switched telephone network prevents the spoofing of caller ID information for most lines. This general acceptance that the call ID can be trusted has led to the development of applications that rely on caller ID to establish the identity of the person. This same level of integrity needs to be maintained in the VOIP-based phone system to be accepted by the general public [20]. The comprehensive overview on VoIP security is the reference [7] addressing the operational and deployment aspects of VoIP security. The security mechanisms deployed in SIP are well described in [8] without covering the formal aspect of the security architecture. Many works have been dedicated to analysis and testing of VoIP protocols, but dealing either with the PSTN interconnection as in [17], or [18]. Most of the performed work has addressed the prevention of SPAM over Internet Telephony (SPIT) attacks [19] as well as mitigating denial of service ones (DOS) [22]. Several frameworks have been proposed to address specific aspects of VOIP security. The SIP Forum Test Framework [1] is a conformance test suite that allows SIP device vendors to test their devices for common protocol errors and thus improve inter-operability. The SNOCER project [2], [6] proposes a generic framework to protect SIP from malformed message attacks and describes a signature based detection mechanism for SIP message tampering. This paper will focus on authentication issues and user ID detection depending on the voice signature of the incoming call. We suggest the use of Speaker Recognition (SR) concepts to support user identification process. 2. Proposed Speaker Identification System Speaker recognition is a generic term used for two related problems: speaker identification and verification. In the identification task the goal is to recognize the unknown speaker from a set of N known speakers. In verification, an identity claim (e.g., a username) is given to the recognizer and the goal is to accept or reject the given identity claim. This paper concentrates on the identification task [3]. The input of a speaker identification system is a sampled speech data, and the output is the index of the identified speaker. There are three important components in a speaker recognition system: the feature extraction component, the speaker models and the matching algorithm. Feature extractor derives a set of speaker- specific vectors from the input signal. Speaker model is then generated from these vectors for each speaker. The matching procedure performs the comparison of the speaker models [25]. Speaker identification system can be either textdependent or text-independent. The current work makes use of the text-dependent speaker identification systems which requires that the speaker should utter the same phrases as that use in system training session. On the other hand, text-independent speaker identification systems identify the speaker regardless the text of his utterance. The text of speaker's voice could be either in fixed vocabulary or free both in training and testing sessions. In the case of text free, the system needs much more training and testing speech data than that in the case of text confined in fixed vocabulary [15]. Speaker identification system can conclusively be modeled as shown in Figure (1). Features are some quantities, which are extracted from preprocessed speech and can be used to represent the whole speech signal. Figure 1. Speaker recognition model. Two sets of features consisted of spectral and prosodic features are usually used. However, spectral based features such as Linear Prediction Coefficients (LPC), Cepstral coefficients, and their derivatives have
3 Reviewing Speaker Recognition Influence in Strengthening VOIP Caller Authentication 149 proven to be more efficient than prosodic-based features like fundamental frequency, formant frequency, and speech energy [3, 25, and 15]. There are many recognition system proposed for pattern matching (speaker recognition) stage such as a well known nonlinear time-aligned techniques called Dynamic Time warping (DTW), Vector Quantization (VQ), Artificial Neural Network (ANN), and statistical Hidden Markov Model (HMM) [14, 5]. In the current work, Backpropagation Artificial Neural Network (BANN) were used for pattern matching purposes. In our proposed system, digital speech signal is passed through a preprocessing procedure, which performs energy-based end point detection and time normalization. LPC features are then extracted from preprocessed speech and the input vectors have passed through the backpropagation learning algorithm with multilayered perceptron network for both training and evaluation processes [16]. Figure 2 shows overall model of the proposed system. Figure 2. Overall proposed speaker identification model The following sections summarize the design principles of the system [4-9] Preprocessing Stage The function of this stage is to prepare the voice samples to LPC extraction phase and has two actions: Pre-emphasis and Framing [4, 9]. including speaker recognition systems [13]. In our system, the input layer contains 14 th neuron which depends upon the coefficient of LPC, hidden layer depends upon the experimental work (40 neurons) and output layer contains four neurons depending upon number of the recognized speakers. Figure 3. Backpropagation neural networks. 3. Analysis of the Suggested VOIP Security Method Our approach suggests that any caller to a VoIP entity must proves his identity by giving an online spoken password to a VoIP security server before call establishment process could be completed. The VoIP security server consists of a speaker recognition engine and a database of spoken passwords to the legal system users. Any user wishes to subscribe to this VoIP system should give a password spoken by him which is then stored in the database mentioned earlier. In such a manner, any caller is authenticated by comparing his spoken password against the stored ones. This method enhances user ID verification by adding voice signature as a part of user identification procedure. As shown in igure 4, the traditional VoIP system could be enhanced by the addition of Speaker Recognition server coupled with SIP server of the system Feature Extraction Next, we describe the procedure for computing the feature vectors from a given speech signal s(n). The most commonly used features in speaker recognition systems are the features derived from the cepstrum [4], [9]. In our system, the number of LP coefficients (dimension of feature vectors) was selected as 14, which are the input to linear network Multilayer Neural Network In this paper, we chose to use backpropagation neural networks see figure 3 since it has been successfully applied to many pattern classification problems Figure 4. The Suggested VOIP System.
4 150 International Arab Journal of e-technology, Vol. 1, No. 4, June 2010 The operation of the traditional VOIP system should be modified according to the following procedure: Any user wishes to register to this VOIP system is asked by SIP server to provide a Spoken Password. The server must supply the client with a temporary key (using a certain key management and distribution protocol) to encrypt this spoken password to prevent eavesdropping during this phase. The user pronounce his password which is then encrypted in real time and passed to the Speaker Recognition server to store it in its database (actually, this is equivalent to the learning phase in Neural Network operation). According to a previous agreed criteria between them, client and server sides will extract a symmetric encryption key from this spoken password. We suggest the following simple procedure to achieve this task: Using an equivalent and synchronized Pseudorandom Number Generator program in both sides (with the same seed value), a certain number is generated. The length of this number is (3N of bits), where N represents the ciphering key length. Choosing three sections from the beginning, middle and end of the spoken password binary file, each has N bits length. X-OR operation is performed between the two patterns, then, N bits checksum is calculated for the result. The resultant N bits number is the required ciphering key. During call establishment procedure, SIP server will ask the caller to prove his identity by giving the same spoken password given earlier. The client pronounces his password which in then encrypted together with its hash function and sent to SIP server. On the reception of this combination, SIP server decrypt the incoming message and recomputed the hash function to insure its integrity, see Figure(5). The above procedure must be followed to eliminate the possibility of intrusions and attacks during this phase and to authenticate the incoming message. The given spoken password is forwarded by SIP server to the speaker recognition server to compare it against previously stored passwords. Speaker recognition server performs its checking function and returns the result to SIP server. Depending on this result, SIP server may (or may not) allows finishing call establishment procedure. This method would enhance user ID detection because it depends on the vocal properties of caller in addition to the password value. The integration between these parameters supports Authentication process and gives immunity against previously mentioned attacks. Figure 5. Message Authentication Procedure. 4. Experimental Setup of the Method In order to test the affectivity of the suggested method, an experimental network was built. In this experiment, the utterance is obtained from 4 local speakers (2 females and 2males). Each speaker was asked, in an office environment, to pronounce his/her password which is a combination of the digits from zero to nine in Arabic language. These phrases were used to train the neural network of the speaker recognition system. The average length of password sentence was 5 second. In this experiment, G.711 Codec was used in which voice samples are encoded at 64kbps without compression. Figure 6. The Experimental Testbed. The experimental network consists of the following, see Figure 6: Fast Ethernet LAN (100 Mbps data rate).
5 Reviewing Speaker Recognition Influence in Strengthening VOIP Caller Authentication 151 Four personal computers to represent the user agents of VOIP service (2GHZ Core2Due Processor, 1GByte RAM). For the sake of simplicity, speaker recognition server and SIP server were implemented on the same platform (2GHZ Core2Due Processor, 2GByte RAM). Also, this server was supplied with some Proxy Server features (i.e., managing network access rules), in which requests and responses from user agents initially are made through the Proxy server. MATLAB package was used to develop a simplified prototype version of the modified SIP protocol which is used to manage calls establishment among the network nodes. As shown in Figure (7), MATLAB codes written for SIP server consists of the main program used to implement SIP and Proxy server and two modules engaged with it : Speaker Recognition and TCP/UDP communication modules. On the other hand, client side consists also of three parts: main program, voice encoding/decoding module and TCP/UDP communication module. On the reception of this challenge (a number (4455) which represent a prior agreed command), MATLAB program in the caller side asked the user to pronounce his password via microphone device. The digitized voice samples is converted into a binary file and the Hash function of this file is computed (a Ready to use MATLAB code for SHA- 1 hash function was imported for this purpose). The spoken password file together with its hash function is encrypted using Data Encryption Standard (DES) (a Ready to use MATLAB code for DES method was imported for this purpose) and packetized (in one or more Ethernet packets) and sent to the server. The server decrypts and authenticates the received packets then checks the received spoken password with the speaker recognition module to determine the ID characteristics of the caller. Building on the caller ID investigation, the SIP- Proxy server decides whether to accept or deny the call request. If the result was negative (unauthorized caller), the server terminate the connection. Otherwise, the server passes the connection request to the called party and the caller issued to start his conversation using UDP protocol. (a)server Side. (b) Client Side. Figure 7. Structure of MATLAB Codes. The experiment flows were as follows, see Figure 8: In this experiment, IP addresses were used to act as phone numbers in an VOIP system. The caller must give the IP address of the called party in order to get connected with it. One of the nodes were supposed to be the Caller who is attempting to invite one of the Callees into a session. He begins by sending a request (initiating a TCP/IP session) to the SIP-Proxy server. The caller is asked to prove his identity by supplying the server with an online spoken password. Figure 8. Flows of the Experimental Network The former experiment repeated four times to cover the different possibilities as follows:
6 152 International Arab Journal of e-technology, Vol. 1, No. 4, June 2010 Legal registered user with (correctly spoken - true password), the result was Access Granted with 100% speaker identification rate. Legal registered user with (correctly spoken - false password), the result was Access Denied with 90% speaker identification rate. Illegal user with (incorrectly spoken- true password), the result was Access Denied with 0% speaker identification rate. Illegal user with (incorrectly spoken - false password), the result was Access Denied with 0% speaker identification rate. 5. Conclusions and Suggestion for Future Work This paper suggests the adoption of speaker recognition methods to enhance user ID detection of VOIP system. This method would enhance user ID detection because it depends on the vocal properties of caller in addition to the password value. The integration between these parameters supports authentication process and gives immunity against caller ID spoofing attacks. References [1] SIP Forum Test Framework (SFTF), [2] SNOCER: Low Cost Tools for Secure and Highly Available VoIP Communication Services, [3] Campbell J.P., Speaker Recognition: A tutorial, Proc. IEEE, Vol.85, pp , Sept [4] Chen Y., Cepstral Domain Talker Stress Compensation for Robust Speech Recognition, IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 36, no. 4, pp , Apr [5] Deller J., Proakis J.G., and Hansen J., Discrete-Time Processing of Speech Signals, Macmillian Publishing, [6] Geneiatakis D., Kambourakis D., SIP Message Tampering: THE SQL code INJECTION attack, in Proc of 13th Intl Conf on Software, Telecoms and Comp Networks IEEE, Split, Croatia, Sept, [7] Geneiatakis D., Dagiuklas T., Kambourakis G., Lambrinoudakis C., Gritzalis S., Ehlert K., and Sisalem D., Survey of security vulnerabilities in session initiation protocol. Communications Surveys & Tutorials, IEEE, 8(3):68 81, 3rd. Qtr [8] Johnston A.B. and Piscitello D. M., Understanding Voice over Ip Security (Artech House Telecommunications Library), Artech House, Inc., Norwood, MA, USA, [9] Lee C.H., On Robust Linear Prediction of Speech, IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 36, no. 5, pp , May [10] McGann S. and Sicker D., An analysis of security threats and tools in SIP-based VoIP systems, presented at the 2nd Annu. Workshop VoIP Secur.,. Washington, DC, Jun [11] Metha P. and Ubani S., Voice over IP, IEEE Potentials Magazine, Vol. 20, Oct [12] Mehta P. and Udani S., Overview of voice over IP, Dept. Computer. Inf. Sci., Univ. Pennsylvania, Philadelphia, PA, Rep. MS- CIS-01-31,Feb [13] Oglesby J. and Mason J.S., Optimization of neural models for speaker identification, in Proc. IEEE Int. Conf. Acoustics,Speech, Signal Processing (ICASSP 90), vol. 1, pp , Albuquerque, NM, USA, April [14] Picone J., Signal Modeling Techniques in Speech Recognition, Proceedings of the IEEE, vol. 81, no. 9, pp , Sept [15] Quatieri T.F., Discrete-time Speech Signal Processing Principles and Practice, Prentice-Hall, Inc., New Jersey, [16] Rabiner L. and Juang B.H., Fundamentals of Speech Recognition, Prentice-Hall, Englewood Cliffs, New Jersey, USA, [17] Sengar H., Dantu R., and Wijesekera D., Securing voip and PSTN from integrated signaling network vulnerabilities, 1st IEEE Workshop on, pages 1 7, 3 April [18] Sengar H., Dantu R., Wijesekera D. and JajodiaS., SS7 over IP: Signaling internetworking vulnerabilities, IEEE Network, Vol. 20, No. 6, pages 32 41, November, [19] Sisalem D., Kuthan J. and Ehlert S., Denial of service attacks targeting a sip voip infrastructure: attack scenarios and prevention mechanisms, IEEE Network, 20(5):26 31, Sept.-Oct [20] Sicker D. and Lookabaugh T., VoIP security: Not an afterthought, ACM Queue, vol. 2, no. 6, pp , Sep [21] Stallings W., Cryptography and Network Security, Upper Saddle River, NJ: Prentice- Hall, [22] Thermos P. and Takanen A., Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures, Addison-Wesley Professional, 2007.
7 Reviewing Speaker Recognition Influence in Strengthening VOIP Caller Authentication 153 [23] Varshney U., Voice over IP, Communications of the ACM, Vol.45, No. 1, Jan [24] Walsh T.J. and Kuhn D.R., Challenges in securing voice over IP, IEEE Security & Privacy Magazine, Vol. 3, Issue 3, May Zilca D., Text-Independent Speaker Verification Using Covariance Modeling, IEEE Signal Processing Letters Vol.8.No4, April Qutaiba Ali was born in Mosul, Iraq, on October,1974. He received the B.S. and M.S. degrees from the Department of Electrical Engineering, University of Mosul, Iraq, in 1996 and 1999, respectively. He received his Ph.D. degree (with honor) from the Computer Engineering Department, University of Mosul, Iraq, in Since 2000, he has been with the Department of Computer Engineering, Mosul University, Mosul, Iraq, where he is currently an assistance professor. His research interests include computer networks analysis and design, embedded network devices and network security. Dr. Ali instructed many topics (for Post and Undergraduate stage) in computer engineering field during the last ten years and has many publications in numerous journals and conferences. He acquires many awards (form National Instrument INC.) and appreciations form different parties for excellent teaching and extra scientific research efforts. Also, he was invited to join many respectable scientific organizations such as IEEE, IENG ASTF, WASET and many others. He was participate (as technical committee member) in thre e IEEE conferences in USA, Malaysia and Egypt and joined the editorial board of five scientific international journals. Nada Abdul Ghani was born in Mosul, Iraq, on She received the B.S. from the Department of Electrical Engineering, University of Mosul, Iraq, in She received her MS degree from the Computer Engineering Department, University of Mosul, Iraq, in Since 1977, he has been with the Department of Electrical Engineering, Mosul University. In 1999, she joined computer engineering department, Mosul University, where she is currently an assistance Lecturer. Her research interests include Voice & Speaker Recognition using artificial Intelligence techniques.
Establishing the Uniqueness of the Human Voice for Security Applications
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.
VoIP Security Threats and Vulnerabilities
Abstract VoIP Security Threats and Vulnerabilities S.M.A.Rizvi and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, UK e-mail: [email protected] This paper presents the
Managing Risks at Runtime in VoIP Networks and Services
Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
A Call Conference Room Interception Attack and its Detection
A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: [email protected]; Web: http://www.dlink-intl.
Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea
Simple Voice over IP (VoIP) Implementation
Simple Voice over IP (VoIP) Implementation ECE Department, University of Florida Abstract Voice over IP (VoIP) technology has many advantages over the traditional Public Switched Telephone Networks. In
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and
1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise
VoIP telephony over internet
VoIP telephony over internet Yatindra Nath Singh, Professor, Electrical Engineering Department, Indian Institute of Technology Kanpur, Uttar Pradesh India. http://home.iitk.ac.in/~ynsingh MOOC on M4D (c)
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Rudy Muslim 0057347 McMaster University Computing and Software Department Hamilton, Ontario Canada Introduction Voice over Internet Protocol
Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
Abusing SIP authentication
The Fourth International Conference on Information Assurance and Security Abusing SIP authentication Humberto Abdelnur Tigran Avanesov Michael Rusinowitch Radu State INRIA, Nancy - Grand Est Campus Scientifique
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
Simulation of SIP-Based VoIP for Mosul University Communication Network
Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication
A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise
A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise K.Subhash Bhagavan #1, Kirankumar.P #2, MVSS Nagendranath#3, #1 Student, Sasi Institute of Technology and Engineering,
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 211 proceedings Quick Detection of Stealthy SIP Flooding Attacks
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice
A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack
A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack Abhishek Kumar Department of Computer Science and Engineering-Information Security NITK Surathkal-575025, India Dr. P. Santhi
Course 4: IP Telephony and VoIP
Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
User authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology [email protected] Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
SIP Trunking and Voice over IP
SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Keywords: VoIP calls, packet extraction, packet analysis
Chapter 17 EXTRACTING EVIDENCE RELATED TO VoIP CALLS David Irwin and Jill Slay Abstract The Voice over Internet Protocol (VoIP) is designed for voice communications over IP networks. To use a VoIP service,
Performance of Various Codecs Related to Jitter Buffer Variation in VoIP Using SIP
Performance of Various Related to Jitter Buffer Variation in VoIP Using SIP Iwan Handoyo Putro Electrical Engineering Department, Faculty of Industrial Technology Petra Christian University Siwalankerto
Prevention of Spam over IP Telephony (SPIT)
General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem
Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP
Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
Prevention of Anomalous SIP Messages
International Journal of Future Computer and Communication, Vol., No., October 03 Prevention of Anomalous SIP Messages Ming-Yang Su and Chung-Chun Chen Abstract Voice over internet protocol (VoIP) communication
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
1152 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 37, NO. 6, NOVEMBER 2007
1152 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 37, NO. 6, NOVEMBER 2007 Security Challenge and Defense in VoIP Infrastructures David Butcher, Member, IEEE,
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES
UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES Dinil.D 1, Aravind.P.A 1, Thothadri Rajesh 1, Aravind.P 1, Anand.R 1, Jayaraj Poroor
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Introduction to VoIP Technology
Lesson 1 Abstract Introduction to VoIP Technology 2012. 01. 06. This first lesson of contains the basic knowledge about the terms and processes concerning the Voice over IP technology. The main goal of
A SIP Security Testing Framework
A SIP Security Testing Framework Hemanth Srinivasan and Kamil Sarac Department of Computer Science, University of Texas at Dallas 800 W Campbell Rd. Richardson, TX 75080, USA {hbs051000, ksarac}@utdallas.edu
A VoIP Traffic Monitoring System based on NetFlow v9
A VoIP Traffic Monitoring System based on NetFlow v9 Chang-Yong Lee *1, Hwan-Kuk Kim, Kyoung-Hee Ko, Jeong-Wook Kim, Hyun- Cheol Jeong Korea Information Security Agency, Seoul, Korea {chylee, rinyfeel,
School Class Monitoring System Based on Audio Signal Processing
C. R. Rashmi 1,,C.P.Shantala 2 andt.r.yashavanth 3 1 Department of CSE, PG Student, CIT, Gubbi, Tumkur, Karnataka, India. 2 Department of CSE, Vice Principal & HOD, CIT, Gubbi, Tumkur, Karnataka, India.
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
JOURNAL OF TELECOMMUNICATIONS, VOLUME 2, ISSUE 2, MAY 2010 126. Simulink based VoIP Analysis. Hardeep Singh Dalhio, Jasvir Singh, M.
126 Simulink based VoIP Analysis Hardeep Singh Dalhio, Jasvir Singh, M. Mian Abstract Voice communication over internet not be possible without a reliable data network, this was first available when distributed
IP Telephony Deployment Models
CHAPTER 2 Sections in this chapter address the following topics: Single Site, page 2-1 Multisite Implementation with Distributed Call Processing, page 2-3 Design Considerations for Section 508 Conformance,
159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)
Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Basic IP phone set up The SIP protocol Computer Networks - 1/2 Learning Objectives
Secure VoIP Transmission through VPN Utilization
Secure VoIP Transmission through VPN Utilization Prashant Khobragade Department of Computer Science & Engineering RGCER Nagpur, India [email protected] Disha Gupta Department of Computer Science
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Real-Time DMB Video Encryption in Recording on PMP
Real-Time DMB Video Encryption in Recording on PMP Seong-Yeon Lee and Jong-Nam Kim Dept. of Electronic Computer Telecommunication Engineering, PuKyong Nat'l Univ. [email protected], [email protected]
Voice Over IP and Firewalls
Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Use of Voice Over IP (VoIP) in enterprises is becoming more and more
SIP, Session Initiation Protocol used in VoIP
SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1
An Overview on Security Analysis of Session Initiation Protocol in VoIP network
An Overview on Security Analysis of Session Initiation Protocol in VoIP network Tarendra G. Rahangdale 1, Pritish A. Tijare 2, Swapnil N.Sawalkar 3 M.E (Pursuing) 1, Associate Professor 2, Assistant Professor
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Java Based VoIP Performance Monitoring Tool
, October 20-22, 2010, San Francisco, USA Java Based VoIP Performance Monitoring Tool Husna Zainol Abidin, Mohd Ameer Yuslan Razmi, Farah Yasmin Abdul Rahman, Ihsan Mohd Yassin Abstract This paper describes
Ericsson T18s Voice Dialing Simulator
Ericsson T18s Voice Dialing Simulator Mauricio Aracena Kovacevic, Anna Dehlbom, Jakob Ekeberg, Guillaume Gariazzo, Eric Lästh and Vanessa Troncoso Dept. of Signals Sensors and Systems Royal Institute of
Voice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
How to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
Indepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Cisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.
Optimizing Converged Cisco Networks (ONT) reserved. Lesson 2.4: Calculating Bandwidth Requirements for VoIP reserved. Objectives Describe factors influencing encapsulation overhead and bandwidth requirements
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Voice Over IP. Priscilla Oppenheimer www.priscilla.com
Voice Over IP Priscilla Oppenheimer www.priscilla.com Objectives A technical overview of the devices and protocols that enable Voice over IP (VoIP) Demo Packet8 and Skype Discuss network administrator
Connect your Control Desk to the SIP world
Connect your Control Desk to the SIP world Systems in
Enumerating and Breaking VoIP
Enumerating and Breaking VoIP Introduction Voice over Internet Protocol (VoIP) has seen rapid implementation over the past few years. Most of the organizations which have implemented VoIP are either unaware
Applications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
A Telephone Domain Name System (T-DNS) for Internet Telephony Service at All IP Network
A Telephone Domain Name System (T-DNS) for Telephony Service at All IP Network o Mi-Ryong Park, Chang-Min Park, and Jong-Hyup Lee Router Technology Department, Network Research Lab., ETRI 161 Kajong-Dong,
VOIP Security Essentials. Jeff Waldron
VOIP Security Essentials Jeff Waldron Traditional PSTN PSTN (Public Switched Telephone Network) has been maintained as a closed network, where access is limited to carriers and service providers. Entry
How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3
Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations
Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations C. Wright, L. Ballard, S. Coull, F. Monrose, G. Masson Talk held by Goran Doychev Selected Topics in Information Security and
