Prevention of Spam over IP Telephony (SPIT)
|
|
|
- Hugh Booker
- 10 years ago
- Views:
Transcription
1 General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem in the near future. It has the potential to become an even bigger problem than spam, because the callee will be disturbed by each received SPIT call. This paper describes a new SPIT prevention method that is effective and acceptable for the call participants because it does not affect the callee at all and limits the interaction with the caller to an acceptable minimum. As foundation for building general SPIT prevention systems with this and other innovative methods, this paper proposes a reference architecture for SPIT prevention systems. Keywords spam, VoIP, Internet telephony, SPIT 1. Introduction Spam is defined as the transmission of bulk unsolicited mails; it is considered to be one of the biggest problems the Internet has ever faced. With the increasing deployment of Internet telephony solutions, often referred to as Voice over IP (VoIP), it is commonly expected that a similar form of spam will affect also this area. This threat is known as SPIT (Spam over Internet Telephony) and it is defined as the transmission of unsolicited calls over Internet telephony. The potential of SPIT to reduce productivity is much higher than spam, because each SPIT call immediately disturbs the callee by the ringing phone. For ensuring the success of VoIP it will be crucial to provide effective prevention, particularly in public networks and at gateways between public and enterprise networks. The transmission of unsolicited calls already exists in the traditional Public Switched Telephone Network (PSTN), where such calls are mostly initiated by telemarketers. However, the high cost of PSTN calls compared to or VoIP communications limits the attractiveness of this form of advertisement for telemarketers. On the contrary, the costs a spammer would encounter using Internet telephony are substantially lower. A recent study 1) reported that SPIT is roughly three orders of magnitude cheaper to send than traditional PSTN telemarketer calls. Unfortunately, the nature of SPIT is too different from spam for using spam prevention methods effectively on SPIT. Particularly, the content of SPIT cannot be checked before the callee is disturbed by the ringing phone. This paper proposes a novel technique to identify SPIT calls based on typical voice communication patterns. However, as for spam, a single method will not be sufficient to prevent sufficiently from all SPIT attacks. Therefore, this paper proposes a generic SPIT prevention system architecture that allows to flexibly integrate different SPIT prevention methods in order to minimize the inconvenience caused to initiator and recipient of the voice call (referred to as caller and callee) by the SPIT prevention system, while maximizing its effectiveness in allowing only legitimate calls to reach the callee. 2. Comparison of Traditional Spam versus SPIT SPIT is a much bigger threat for users than spam since it will interrupt the users immediately. A SPIT call makes the phone ringing and disturbs the callee. spam can be queued in the program of the receiving user without disturbing the user until he looks at it; even when the mails are checked, the user can process a big number of them in a short amount of time identifying quickly the spam without the need of giving much attention to it. The disturbance in the case of SPIT calls is instead repeated multiple times. Sending SPIT is technically eased by the fact that Internet Telephony protocols and systems have poor identity management (the same technical problem that is present in the mail systems). An additional problem with SPIT is that most available tech-
2 nologies (coming from spam prevention) are not useful since: the time scale is much different (mails are non-real-time communications while Internet Telephony calls are real-time communications); one of the most effective methods (namely content filtering) is not really applicable since the call has to be answered before the content is delivered. Furthermore, automatic methods based on speech recognition are currently too complex and language dependent to be deployed for VoIP calls. In addition to these simple considerations that give us an overview of the potentiality of the SPIT threat, SPIT will mainly occur in the future because of the reduced costs SPITters would encounter in using the Internet Telephony with respect to the PSTN. A simple cost analysis shows how much difference in costs occurs between calls delivered using the PSTN and the public Internet. There are three layers at which we can expect differences in costs between spam over PSTN and over Internet Telephony: the costs of the system in terms of software; the costs of the system in terms of hardware; the costs per spam call; The costs of the system in terms of software are basically not varying between the two different forms of voice spam (the software could be basically the same, it is just the hardware needed to connect to the network which changes). The costs of the system in terms of hardware are clearly in disfavor of the PSTN spammer (PSTN cards are much more expensive than network interface cards). As for the costs per spam call, they are in disfavor of the system for sending spam over PSTN because of the higher costs of the PSTN connections; a rough analysis speaks of three order of magnitude lower costs for a SPIT system. Table 1 resumes the costs comparison and clearly shows the costs saving that SPIT systems are offering to possible telemarketers. Table 1 Resume of costs comparison for call spam systems. Costs SPAM over SPIT Additional considerations PSTN Software costs X X X is depending on the signaling protocol Hardware costs 10 Y Y Y Y is independent of the signaling protocol Costs per spam call about 1000 Z Z Z is independent of the signaling protocol 3. A Generic SPIT Prevention System Architecture A SPIT prevention system has to meet some basic requirements in order to be effective. It must minimize the probability of blocking legitimate calls. It must maximize the probability of blocking SPIT calls. It should minimize the interaction required to the callee to determine whether a call is SPIT. It should limit the inconvenience caused to the caller that tries to place a legitimate call. It should be general enough to apply to different types of environments (e.g. office, home etc.), different cultures, and languages and so on. In the literature, several methods have been proposed to prevent SPIT calls; however none of them meets all of these requirements. Besides, most effective methods in preventing SPIT require interaction with the caller and are therefore too intrusive, so that the caller might decide to tear down the call causing the callee to possibly miss important calls. Even worse, other methods require a feedback from the callee. An effective SPIT prevention system must therefore combine the capabilities offered by different component methods, so that the resulting system is able to efficiently block SPIT calls while requiring the least possible interaction with the caller and the callee. Furthermore, we believe that, being the caller the one that starts the action, he or she is probably more willing to accept a certain level of inconvenience compared to the callee. For this reason, we consider a method involving the caller less intrusive than one requiring feedback from the callee. Based on the above assumptions, we propose a generic architecture for SPIT prevention systems consisting of five stages with increasing intrusiveness, see Fig. 1. At the first stage, prevention methods act invisible to the caller and callee. At stage two the prevention methods interact with the caller or at least with the callerʼs terminal. Stage three requires a feedback from the callee before the call is actually established, while stage four allocates those methods that judge a call while it is active. Finally, at stage five, feedback from the callee occurs after the call has been terminated and it contributes to blocking SPIT in the future. At all stages either the automated mechanisms peculiar to the stage or the callee provide a feedback to the SPIT prevention system, which requires such knowledge as input for some of the modules in the first stage. Furthermore, an incoming call will not have necessarily to pass through all stages. For instance, a call which has already
3 General Papers Prevention of Spam over IP Telephony (SPIT) Table 2 Stage 1 methods. Fig. 1 Generic SPIT prevention system architecture. been recognized as legitimate by the first stage does not need to be further controlled and can directly be established, i.e. passed to stage four. In general, the actual path followed by a call depends by implementation specific factors, like the level of intrusiveness accepted by the system. The discussion of methods for different stages in the next section shows that, in general, higher effectiveness can be achieved by higher stage methods which are more intrusive by nature. We assume that a very good SPIT prevention system will have to be composed of multiple methods and cover all stages while balancing well intrusiveness and effectiveness. 4. Building Blocks for SPIT Prevention Stage 1 Module Lists Circles of Trust Pattern/Anomaly Detection Greylisting The identity of a caller is compared to a set of stored identities to decide whether to accept or reject a call. Two types of lists are considered: white and black. Identities on a white list are the ones which are allowed to call while calls from identities which are on a black list should be rejected. Such a methodology has no obstacles to its implementation since related technology is mature and implementation is easy. Trusted inter-domain connections are checked before a call is forwarded to the intended recipient. The rationale is that each domain controls its own users and the domains agree not to send SPIT/SPAM to each other. Such a methodology has no obstacles to its implementation since related technology is mature and object of current standardization; the implementation itself has medium complexity. This method tries to detect suspicious patterns in traffic to identify SPIT calls. Suspicious patterns can be either defined by deterministic or by statistical rules. Such a methodology has no obstacles to its implementation since related technology is mature but has never been adapted to voice calls; the implementation itself has medium complexity. It is a technique referred to as PMG (Progressive Multi Grey-leveling). This method monitors calls and attribute a grey level to each caller. If a caller keeps trying to place calls in a certain time span the grey level increases. If the caller stops placing calls the grey level slowly decreases. Such a methodology has already been implemented by other researchers 3) and the implementation itself has medium complexity. Several methods are under discussion as potential building blocks of SPIT prevention systems, see Reference 1) and references therein. In this section, we provide an overview of known methods. We structure the section by mapping each method to the stage of our generic architecture in Fig. 1 at which the method can be applied. Each method is detailed with a short description and with comments whether the prerequisites (e.g. in terms of infrastructure, standardization activities, etc.) for a given module already exist, whether it is realistic to achieve them in the near future. Furthermore we provide a rough estimate of how difficult it would be to implement a module. 4.1 Stage 1: No Interactions with Call Participants Methods in this section do not require interaction with the caller and are completely invisible to him/her. The details are shown in Table Stage 2: Interaction with Caller Methods in this section require either an interaction with the callerʼs terminal (computational puzzles, sender checks) or with the caller (Turing test). The details are shown in Table Stage 3: Callee Interrupted by SPIT Call Methods in this section require - at least sometimes - an action by the callee on arrival of a SPIT call. The details are shown in Table Stage 4: Callee Receives Call Methods in this section require that the callee receives the call and operate while the call is active. From the current literature, only the content filtering method falls into this category, which as explained below is not suited for SPIT. However,
4 Stage 2 Module Computational Puzzle Sender Check Turing Test Stage 3 Module Consent-Based Communication Stage 4 Module Content Filtering Table 3 Stage 2 methods. This technique gives the callerʼs terminal a resourceconsuming task to perform before establishing the call. Computational puzzles in conjunction with SIP are currently being standardized by the IETF and implementation has medium complexity. The idea behind this method is to verify that a caller is a valid sender for the domain he is calling from. Such a methodology, even if the technology is mature, is not easily applicable to real-time communications and thus to SPIT prevention because of the time it takes to perform the sender checks. Turing tests are a method to tell humans and computers apart. These tests are also called CAPTCHAs (Completely Automated Public Turing Test to Tell Computers and Humans Apart). Audio CAPTCHAs are indeed suited to prevent SPIT even if technology is prone to errors; the implementation itself has medium complexity. Table 4 Stage 3 methods. This solution requires user A to authorize user B, the first time user B tries to contact user A. A framework for consent-based communications combined with lists is currently being standardized by the IETF for the SIP protocol; the implementation itself has medium complexity. Table 5 Stage 4 methods. Content analysis cannot be applied to prevent SPIT. The content is very different from (ASCII text versus coded speech) and voice recognition is not yet fully solved and consuming a lot of computational resources. Moreover, the content is not available when the check needs to be performed (the content is delivered online after the receiver has been disturbed by a ringing phone and after the receiver accepted the incoming call). potentially other methods might be proposed in the future that fit in this category; therefore we deem it useful to allocate a stage in the proposed architecture to take them into account. The details are shown in Table Stage 5: Feedback from Callee after Call Methods in this section require that the callee gives feedback on calls received. The details are shown in Table 6. Stage 5 Module Reputation System Limited-Use Addresses Payments at Risk Legal Action First-Contact Feedback Table 6 Stage 5 methods. A reputation system works by attaching a reputation score to a contact indicating if this contact has been showing good or bad behavior. This score can be most effectively evaluated based on user feedback but it could also be tied to other building blocks. Such a methodology has no obstacles to its implementation since technology is mature but the feedback framework needs to be standardized; the implementation itself has medium complexity. The limited use of addresses is a mechanism which tries to defeat spam by changing the address as soon as the first spam messages arrive at the address. Such a methodology has no obstacles to its implementation since the technology is mature but the implementation has high complexity because of the need to change addresses as soon as the first SPIT call is received. Payments at risk works by charging a fee for the first contact and refunding that fee if the call was not SPIT and adding the caller to a white list. This technique requires a feedback mechanism to indicate whether a call was SPIT or not and a payment infrastructure for micro-payments. Given the second prerequisite this methodology seems to be quite unrealistic and also implementation is estimated to have high complexity. This method works by introducing legislation in all countries to prohibit the distribution of spam over VoIP. Even if implementation is foreseen to be relatively easy the methodology is quite unrealistic because of the lack of a global legislation framework. This method relies on a mechanism where the callee can provide a feedback. The idea is that an unknown caller identity is allowed to call the callee exactly once and then the callee has to provide a feedback on this call. Such a methodology has no obstacles to its implementation since technology is mature but the feedback framework needs to be standardized; the implementation itself has medium complexity. 5. SPIT Prevention at Stage 2 This section describes a novel SPIT prevention method based on the analysis of human communication patterns. Its design and integration into a SPIT prevention system is based on considerations stated in Section 3. The major goal of a SPIT prevention system is protecting the callee from being disturbed by SPIT calls while ensuring that the callee does not miss legitimate calls. Ideally, this is achieved in a way which is friendly to the caller. However, methods suitable for stage one, i.e. invisible to both caller and callee in many cases are not effective enough; therefore, a certain level of intrusiveness has to be taken into account.
5 General Papers Prevention of Spam over IP Telephony (SPIT) In order to avoid disturbing the callee by any SPIT call, we focused our contribution on an innovative Turing test (Stage 2 method) for SPIT prevention. At stage 2, the SPIT prevention system accepts an incoming call on behalf of the callee and performs a check. Depending on the result, the call is then either forwarded to the callee or terminated, see Fig. 2. Assuming that SPIT calls would rather be performed by computer programs than by human callers, we searched for a strong method that separates human callers from machines. Such a Turing test should meet the following seven requirements: 1) be polite enough not to offend the caller, 2) be quick enough not to require too much patience from the caller, 3) work well with callers that have different kinds of background knowledge, 4) work well with caller using different kinds of pronunciation, 5) work well with callers speaking different dialects or languages, 6) be simple enough to be implemented on a relatively cheap devices at the calleeʼs side, 7) create a resource-intensive and complex task for a machine imitating a caller. We developed a Turing test based on checking human communication patterns that meets all these requirements and provides a high degree of protection for the callee, while at the same requiring only a very limited and adjustable level of inconvenience for the caller. 5.1 Checking Communication Patterns Our Turing test is based on the assumption that human conversation follows certain activity patterns. There are available studies that demonstrated that such communications patterns are identifiable, see for example 2). When a human caller calls another human being, then there are certain conventions that Fig. 2 SPIT filter at stage 2. Fig. 3 Basic voice signal energy pattern from caller to callee (top) and from callee to caller (bottom) at the beginning of a call. both follow. After the callee accepts the call, the callee is the first one to speak. During the call, typically one speaker is silent while the other one is speaking. The proposed Turing test checks if the caller follows these conventions. Fig. 3 shows an example communication pattern indicated by the voice signal energy of the two voice connections involved: caller to callee (top) and callee to caller (bottom). While the phone is ringing, the energy on both voice connections is low or zero. This pattern concerns the voice signal energy only. It is independent of the content of the voice signal and can therefore be implemented easily and be performed with very few resources. 5.2 SPIT Detection Scheme When the SPIT prevention system accepts the call it sends a pre-recorded greeting message to the caller that can be adapted to the level of intrusiveness that is assumed to be acceptable. If the caller interrupts the greeting he is either impolitely not following the common communication pattern, or it is a machine that immediately starts its SPIT message. In both cases, the SPIT prevention system would classify the call as SPIT and terminate it, optionally after sending a pre-recorded voice message explaining this. The intrusiveness of this method can be minimized by the SPIT detection system accepting the call, but instead of a greeting sending a ring tone. A human caller would then assume that the call has not yet been established, while a SPIT engine that does not analyze the greeting message would assume that it can start sending the SPIT message, because an established connection was signaled. More intrusive, but still assumed to be well acceptable, is a greeting message that tells the caller that the call is being forwarded and will be established soon. For a stronger check, the greeting can be followed by a quick simple question, for example, for the name of the called person.
6 Such a question should be made such that a short answer can be expected with high probability. Then the SPIT prevention system can check if first the caller starts speaking briefly after the question was made and stops talking and remains silent for at least a short time after answering the questions. For both checks, no speech recognition is necessary. Detection of the voice energy level switching from ʻlowʼ to ʻhighʼ and back to ʻlowʼ is sufficient. If this energy pattern cannot be observed, then the SPIT filter assumes that the caller is a machine and terminates the call. 5.3 Evaluation and Practical Experiences This procedure meets all seven requirements listed in the previous section. It is sufficiently polite and quick, independent of the callerʼs background knowledge and pronunciation and can be adapted to the callerʼs preferred language (if signaled by the caller at call setup). The voice energy analysis is computationally simple while the effort required on the SPIT engine side for passing this test is high. Furthermore, the level of intrusiveness can be selected according to the preferences of the callee. Experiments with a prototype implementation have shown that voice signal energy detection cannot just distinguish between ʻfull silenceʼ and ʻsome signal energy,ʼ because the caller may be in an environment creating background noise (in a bus, at a train station). Therefore, the detection system needs to use experimentally confirmed threshold levels for ʻlowʼ and ʻhighʼ voice energy. Also short peaks of signal energy originating in the callerʼs environment should be filtered and not detected as ʻhighʼ voice signal level. A SPIT prevention system using this method should still use stage 1 methods in addition. Particularly, white lists and black list should be maintained. A white list is convenient because it avoids that known callers are checked. Also the results of the Turing test can be fed back to white and black lists. A caller that has been rejected by the Turing test for a given number of times in a row should be added to the black list, while callers passing the test one or more times should eventually be added to the white list. This paper proposes a novel technique to identify SPIT calls based on typical voice communication patterns. For integrating it with other SPIT prevention methods, the paper further proposes a generic SPIT prevention system architecture that allows to flexibly integrate different SPIT prevention methods in order to minimize the inconvenience caused caller and callee. The architecture distinguished different stages that differ in the level of interaction with caller and callee. The stages model was used to classify the set of already known SPIT prevention methods. We elaborated requirements for realizing such a recommended system and described a SPIT prevention system design. As innovative component of this design that meets all requirements we developed a stage 2 Turing test for distinguishing human callers from SPIT engines. The test detects the reaction of the caller on a greeting message and compares it to common human communication patterns when communicating over the phone. The method limits interaction with the caller in a configurable way and can be performed with low computational resources. References 1) J. Rosenberg et al., "The Session Initiation Protocol (SIP) and Spam," draftietf-sipping-spam-01.txt, July Work in progress. 2) F. Hammer et al., "Elements of Interactivity in Telephone Conversations," Proc. 8th International Conference on Spoken Language Processing (ICSLP/INTERSPEECH 2004), Vol.3, pp , Jeju Island, Korea, Oct ) D. Shin, and C. Shim, "Voice Spam Control with Gray Leveling," Proc. of 2nd VoIP Security Workshop, Washington DC, June Juergen QUITTEK Senior Manager, Network Laboratories, NEC Europe Ltd. Saverio NICCOLINI Research Staff, Network Laboratories, NEC Europe Ltd. Sandra TARTARELLI Senior Research Staff, NEC Europe Ltd. Roman SCHLEGEL Swiss Federal Institute of Technology 6. Conclusions
A Study on Countering VoIP Spam using RBL
2011 2nd International Conference on Networking and Information Technology IPCSIT vol.17 (2011) (2011) IACSIT Press, Singapore A Study on Countering VoIP Spam using RBL Seokung Yoon, Haeryoung Park, Myoung
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Vijay Radhakrishnan & Ranjith Mukundan Wipro Technologies, Bangalore, India Email:{radhakrishnan.vijay,
A Phased Framework for Countering VoIP SPAM
International Journal of Advanced Science and Technology 21 A Phased Framework for Countering VoIP SPAM Jongil Jeong 1, Taijin Lee 1, Seokung Yoon 1, Hyuncheol Jeong 1, Yoojae Won 1, Myuhngjoo Kim 2 1
CE 817 - Advanced Network Security VoIP Security
CE 817 - Advanced Network Security VoIP Security Lecture 25 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially
Detecting Spam in VoIP Networks. Ram Dantu Prakash Kolan
Detecting Spam in VoIP Networks Ram Dantu Prakash Kolan More Multimedia Features Cost Why use VOIP? support for video-conferencing and video-phones Easier integration of voice with applications and databases
Countering Unsolicited Calls in the Internet Telephony: An anti-spit Architecture
Countering Unsolicited Calls in the Internet Telephony: An anti-spit Architecture Panos STAMATIOU 1 and Dimitris GRITZALIS 1,2 1 Hellenic Open University (HOU), Dept. of Informatics, Patras, Greece 2 Athens
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
Customize Approach for Detection and Prevention of Unsolicited Call in VoIP Scenario: A Review
Customize Approach for Detection and Prevention of Unsolicited Call in VoIP Scenario: A Review Jui Khamar 1, Hardik Upadhya 2, Jayesh Mevada 3 1 M.E Student, Department of Computer Engineering, Merchant
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea
Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document
Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general
How To Filter Email From A Spam Filter
Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver
New method for evaluating anti-spit in VoIP networks
New method for evaluating anti-spit in VoIP networks Mina Amanian Dept. of Computer engineering Imam Reza International University of Mashhad, Iran [email protected] Mohammad Hossein Yaghmaee Moghaddam
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Rudy Muslim 0057347 McMaster University Computing and Software Department Hamilton, Ontario Canada Introduction Voice over Internet Protocol
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
Detecting Spam in VoIP networks
Detecting Spam in VoIP networks Ram Dantu, Prakash Kolan Dept. of Computer Science and Engineering University of North Texas, Denton Presentation: Heikki Ollikainen /53089D Presentation Introduction Architecture
Why Content Filters Can t Eradicate spam
WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Spam Detection in Voice-over-IP Calls through Semi-Supervised Clustering
Spam Detection in Voice-over-IP Calls through Semi-Supervised Clustering Yu-Sung Wu, Saurabh Bagchi Purdue University, USA Navjot Singh Avaya Labs, USA Ratsameetip Wita Chulalongkorn University, Thailand
PART D NETWORK SERVICES
CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC
Emerging Trends in Fighting Spam
An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
A Smart Telephone Answering Machine with Voice Message Forwarding Capability
A Smart Telephone Answering Machine with Voice Message Forwarding Capability Chih-Hung Huang 1 Cheng Wen 2 Kuang-Chiung Chang 3 1 Department of Information Management, Lunghwa University of Science and
Hosted Fax Mail. Hosted Fax Mail. User Guide
Hosted Fax Mail Hosted Fax Mail User Guide Contents 1 About this Guide... 2 2 Hosted Fax Mail... 3 3 Getting Started... 4 3.1 Logging On to the Web Portal... 4 4 Web Portal Mailbox... 6 4.1 Checking Messages
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Managing Risks at Runtime in VoIP Networks and Services
Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
NCAS National Caller ID Authentication System
NCAS National Caller ID Authentication System The National Telecom Security Border Controller OmniBud INC. 2003 2013 Dedicate to Internet Communication and Access Security NCAS Registration Module PSTN
Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080
Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Savita Teli 1, Santoshkumar Biradar 2
Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,
WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC: Why and How? FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This docume nt is copyright of FRAFOS GmbH. Duplication or propagation or e xtracts
Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum
Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum V. Rajaravivarma and Farid Farahmand Computer Electronics and Graphics Technology School of Technology,
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
Voice over IP is Transforming Business Communications
White Paper Voice over IP is Transforming Business Communications Voice over IP (VoIP) is changing the world of telecommunications. It entails the transmission of voice calls over data networks that support
Indepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
Integration of GSM Module with PC Mother Board (GSM Trunking) WHITE/Technical PAPER. Author: Srinivasa Rao Bommana (srinivasrao.bommana@wipro.
(GSM Trunking) WHITE/Technical PAPER Author: Srinivasa Rao Bommana ([email protected]) Table of Contents 1. ABSTRACT... 3 2. INTRODUCTION... 3 3. PROPOSED SYSTEM... 4 4. SOLUTION DESCRIPTION...
EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens
Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : [email protected] Tel : (+32)
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
English Translation of SecurityGateway for Exchange/SMTP Servers
Testing: Alt N Technologies SecurityGateway by Sandra Lucifora Administrators spend a considerable amount of their time on the job on eliminating unwanted messages. Viruses, Phishing, and Spoofing pose
VoIP / SIP Planning and Disclosure
VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings
SIP, Session Initiation Protocol used in VoIP
SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1
Fax and Oracle Collaboration Suite. An Oracle White Paper August 2005
Fax and Oracle Collaboration Suite An Oracle White Paper August 2005 Fax and Oracle Collaboration Suite Introduction... 3 Fax Support in Oracle Collaboration Suite... 4 Outbound Fax Configuration... 7
SIP Trunking with Microsoft Office Communication Server 2007 R2
SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
RoboKiller Protection from robocalls once and for all!
RoboKiller Protection from robocalls once and for all! About RoboKiller Protection from robocalls, forever Every day robocalls invade our homes and distract us from our lives. In the worst cases, these
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
Contents. Specialty Answering Service. All rights reserved.
Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from
Virtual Call Center. Dragan Savić, Sara Stančin, Grega Jakus, Sašo Tomažič University of Ljubljana, Faculty of Electrical Engineering
Virtual Call Center Dragan Savić, Sara Stančin, Grega Jakus, Sašo Tomažič University of Ljubljana, Faculty of Electrical Engineering Abstract - A call center is a centralized workspace, primarily intended
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
Office Link System for FOMA Internal Line Connections
Enterprise-oriented Internal Line Service FOMA Internal Line Service Internal Line Optional Functions Office Link System for FOMA Internal Line Connections Although we have previously offered OFFICEED,
Introduction to VoIP Technology
Lesson 1 Abstract Introduction to VoIP Technology 2012. 01. 06. This first lesson of contains the basic knowledge about the terms and processes concerning the Voice over IP technology. The main goal of
Voice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Anti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
Feature and Technical
BlackBerry Mobile Voice System for SIP Gateways and the Avaya Aura Session Manager Version: 5.3 Feature and Technical Overview Published: 2013-06-19 SWD-20130619135120555 Contents 1 Overview...4 2 Features...5
How To Understand The Concept Of Circuit Switching
Module 2 Communication Switching Lesson 2 Circuit Switching INSTRUCTIONAL OBJECTIVES GENERAL This lesson is aimed at developing the concept and application of circuit switching which is a very important
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
Implementing SIP and H.323 Signalling as Web Services
Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
Interactive Voice Response System by Using Asterisk
Interactive Voice Response System by Using Asterisk Ankita Bhondge, Aditi Bhatkar, Sapna Fender, Sonali Thakre, Megha Goel Student, Dept. of C.S.E., SRMCEW, RTM University, Nagpur, India. Professor, Dept.
Anti Spam Best Practices
53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:
How To Block Ndr Spam
How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR
Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat K.Guirguis
Alexandria University Institute of Graduate Studies and Research Department of Information Technology. Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat
Prevention of Anomalous SIP Messages
International Journal of Future Computer and Communication, Vol., No., October 03 Prevention of Anomalous SIP Messages Ming-Yang Su and Chung-Chun Chen Abstract Voice over internet protocol (VoIP) communication
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN
ENSC 427 Communication Networks Final Project Report Spring 2014 Analysis and Simulation of VoIP Team #: 2 Kadkhodayan Anita ([email protected], 301129632) Majdi Yalda ([email protected], 301137361) Namvar Darya
Testing IVR Systems White Paper
Testing IVR Systems Document: Nexus8610 IVR 05-2005 Issue date: Author: Issued by: 26MAY2005 Franz Neeser Senior Product Manager Nexus Telecom AG, Switzerland We work to improve your network Abstract Interactive
Methods for Lawful Interception in IP Telephony Networks Based on H.323
Methods for Lawful Interception in IP Telephony Networks Based on H.323 Andro Milanović, Siniša Srbljić, Ivo Ražnjević*, Darryl Sladden*, Ivan Matošević, and Daniel Skrobo School of Electrical Engineering
DST EMAIL. Product FAQs. Thank you for using our products. DST UK www.dstsystems.co.uk
EFFECTIVE PERSONALISED PRINT AND E-COMMUNICATION SOLUTIONS DESIGNED WITH YOU IN MIND DSTSYSTEMS.CO.UK DST EMAIL Product FAQs version 01 Thank you for using our products. DST UK www.dstsystems.co.uk DST
VoIP and Videoconferencing: are they the same?
VoIP and Videoconferencing: are they the same? Dr. Saverio Niccolini Research Staff Member now @ Network Laboratories, NEC Europe Ltd. ([email protected]) VoIP and Videoconferencing 1 st
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
VoIP Conferencing. The latest in IP technologies deliver the next level of service innovation for better meetings. Global Collaboration Services
Global Collaboration Services VoIP Conferencing The latest in IP technologies deliver the next level of service innovation for better meetings. ENERGIZE YOUR CONNECTIONS Table of Contents > > Contents...
Ram Dantu. VOIP: Are We Secured?
Ram Dantu Professor, Computer Science and Engineering Director, Center for Information and Computer Security University of North Texas [email protected] www.cse.unt.edu/~rdantu VOIP: Are We Secured? 04/09/2012
Interoperability Test Plan for International Voice services (Release 6) May 2014
INTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP (i3 FORUM) Workstream Technical Aspects Workstream Operations Interoperability Test Plan for International Voice services (Release 6) May 2014 Interoperability
Operation Manual Voice Overview (Voice Volume) Table of Contents
Operation Manual Voice Over (Voice Volume) Table of Contents Table of Contents Chapter 1 Voice Over... 1-1 1.1 Introduction to VoIP... 1-1 1.1.1 VoIP System... 1-1 1.1.2 Basic VoIP Call Flow... 1-2 1.1.3
This specification this document to get an official version of this User Network Interface Specification
This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into
CAPTCHA-based DDoS Defense System of Call Centers against Zombie Smart-Phone
CAPTCHA-based DDoS Defense System of Call Centers against Zombie Smart-Phone Seung Wook Jung Soongsil University [email protected] Abstract Recently, some researchers alarm the security community that
