語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security Enhancements in Voice over ...
~
Iranmanesh, Seyed Amir.
FindBook
Google Book
Amazon
博客來
Security Enhancements in Voice over IP Networks.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Security Enhancements in Voice over IP Networks./
作者:
Iranmanesh, Seyed Amir.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2018,
面頁冊數:
140 p.
附註:
Source: Dissertation Abstracts International, Volume: 79-08(E), Section: B.
Contained By:
Dissertation Abstracts International79-08B(E).
標題:
Computer engineering. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10640427
ISBN:
9780355666755
Security Enhancements in Voice over IP Networks.
Iranmanesh, Seyed Amir.
Security Enhancements in Voice over IP Networks.
- Ann Arbor : ProQuest Dissertations & Theses, 2018 - 140 p.
Source: Dissertation Abstracts International, Volume: 79-08(E), Section: B.
Thesis (Ph.D.)--The College of William and Mary, 2018.
Voice delivery over IP networks including VoIP (Voice over IP) and VoLTE (Voice over LTE) are emerging as the alternatives to the conventional public telephony networks. With the growing number of subscribers and the global integration of 4/5G by operations, VoIP/VoLTE as the only option for voice delivery becomes an attractive target to be abused and exploited by malicious attackers.
ISBN: 9780355666755Subjects--Topical Terms:
621879
Computer engineering.
Security Enhancements in Voice over IP Networks.
LDR
:03890nmm a2200337 4500
001
2199715
005
20181029135739.5
008
201008s2018 ||||||||||||||||| ||eng d
020
$a
9780355666755
035
$a
(MiAaPQ)AAI10640427
035
$a
(MiAaPQ)wmgrad:10227
035
$a
AAI10640427
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Iranmanesh, Seyed Amir.
$0
(orcid)0000-0002-4641-1089
$3
3426460
245
1 0
$a
Security Enhancements in Voice over IP Networks.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2018
300
$a
140 p.
500
$a
Source: Dissertation Abstracts International, Volume: 79-08(E), Section: B.
500
$a
Adviser: Haining Wang.
502
$a
Thesis (Ph.D.)--The College of William and Mary, 2018.
520
$a
Voice delivery over IP networks including VoIP (Voice over IP) and VoLTE (Voice over LTE) are emerging as the alternatives to the conventional public telephony networks. With the growing number of subscribers and the global integration of 4/5G by operations, VoIP/VoLTE as the only option for voice delivery becomes an attractive target to be abused and exploited by malicious attackers.
520
$a
This dissertation aims to address some of the security challenges in VoIP/VoLTE. When we examine the past events to identify trends and changes in attacking strategies, we find that spam calls, caller-ID spoofing, and DoS attacks are the most imminent threats to VoIP deployments. Compared to email spam, voice spam will be much more obnoxious and time consuming nuisance for human subscribers to filter out. Since the threat of voice spam could become as serious as email spam, we first focus on spam detection and propose a content-based approach to protect telephone subscribers' voice mailboxes from voice spam.
520
$a
Caller-ID has long been used to enable the callee parties know who is calling, verify his identity for authentication and his physical location for emergency services. VoIP and other packet switched networks such as all-IP Long Term Evolution (LTE) network provide flexibility that helps subscribers to use arbitrary caller-ID. Moreover, interconnecting between IP telephony and other Circuit-Switched (CS) legacy telephone networks has also weakened the security of caller-ID systems. We observe that the determination of true identity of a calling device helps us in preventing many VoIP attacks, such as caller-ID spoofing, spamming and call flooding attacks. This motivates us to take a very different approach to the VoIP problems and attempt to answer a fundamental question: is it possible to know the type of a device a subscriber uses to originate a call? By exploiting the impreciseness of the codec sampling rate in the caller's RTP streams, we propose a fuzzy rule-based system to remotely identify calling devices.
520
$a
Finally, we propose a caller-ID based public key infrastructure for VoIP and VoLTE that provides signature generation at the calling party side as well as signature verification at the callee party side. The proposed signature can be used as caller-ID trust to prevent caller-ID spoofing and unsolicited calls. Our approach is based on the identity-based cryptography, and it also leverages the Domain Name System (DNS) and proxy servers in the VoIP architecture, as well as the IP Multimedia Subsystem (IMS) architecture. Using OPNET, we then develop a comprehensive simulation test-bed for the evaluation. Our simulation results show that the call setup delays induced by our infrastructure are hardly noticeable by the subscribers and the extra signaling overhead is negligible. Therefore, our proposed infrastructure can be adopted to widely verify caller-ID in telephony networks.
590
$a
School code: 0261.
650
4
$a
Computer engineering.
$3
621879
650
4
$a
Multimedia communications.
$3
590562
690
$a
0464
690
$a
0558
710
2
$a
The College of William and Mary.
$b
Computer Science.
$3
3288980
773
0
$t
Dissertation Abstracts International
$g
79-08B(E).
790
$a
0261
791
$a
Ph.D.
792
$a
2018
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10640427
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9376264
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入