PostHeaderIcon

Security issiues in VOIP Applications

The result may prevent legitimate attempts to leave a subscriber a message.   Man in the Middle attacks always refer to an intruder who is able to read, and modify at will, messages between two parties without either party knowing that the link between them has been compromised. The most common man in the middle attack usually involves Address Resolution Protocol (ARP), which can cause an VoIP application to redirect its traffic to the attack computer system. Then the attack computer system can gain complete control over that VoIP application’s sessions, which can be altered, dropped, or recorded. For example, an attacker can inject speech, noise or delay (e.g., silent gaps) into a conversation .In general, there are three types of vulnerabilities:(1) Eavesdropping: Unauthorized  interception of voice data packets or   Real-Time Transport Protocol (RTP) media stream and decoding of signaling messages; (2) Packet Spoofing: Intercept a call by impersonating voice packets or transmitting information; and (3) Replay: Retransmit genuine sessions so that the VoIP applications will reprocess the information.   To tackle all these types of vulnerabilities,VoIP applications can adopt the Public Key Infrastructure (PKI) a security mechanism to ensure confidentiality of all transmitted data, and to verify and authenticate the validity of each party in the context of public and private key. Without proper encryption, anyone can sniff any voice data packets transmitted over IP networks that make security threats to confidentiality and integrity.

Pages: 1 2 3 4 [5] 6 7 8 9 10 11 12 13 14


Add comment:
Name:
Sait link: http://
Your message:
Enter today\\\\'s date, 2 digits
(spam protection):
 



News

Teen Sex - How Fashionable is Having Sex in your Teens?

Teen Sex - How Fashionable is Having Sex in your Teens?Author: Kacy CarrTeen sex is getting more like fashion everyday, meaning, if you are not wearing the latest in clothes designs then you are behind the times, it is because of this that young girls/boys feel obligated to participate because it is the in thing to do. Teen sex it is not about love, it is more like trying out something new for the first time and when you have finished - move on. Sex is sex, but to make love is a nicer way to describe two people coming together in body unison where the sex has meaning.



Popular

Phone Number Lookup - How To Find Cell Phone Numbers

Find someones name and location of their cell phone number has not been easy, due to the fact that there is no central public phone directory. This has been a big problem, but thanks to the Internet, it is one that finally a solution. A reverse lookup cell phone is a convenient trick that you find out exactly who owns a phone makes. With a reverse lookup phone number for more information about the owner of the phone, including their full names and background information.



New!

The 5 Best Computer Buys of 2009

The 5 Best Computer Buys of 2009Author: Meg JohnsonI recently decided to buy my father a new computer (his was a dinosaur). Like most people in the market for a new computer, I wanted one that didn't cost a small fortune, but was still good. What I found was quite a bit of stress and a LOT of hype. Everyone claims to be the best for your money, so how do you know if it's true or not without being a computer genius? So I decided to write this article with the hopes of saving you some time and tears when searching for the perfect computer.