USING CAPTCHAs TO MITIGATE THE VoIP SPAM PROBLEM

Size: px
Start display at page:

Download "USING CAPTCHAs TO MITIGATE THE VoIP SPAM PROBLEM"

Transcription

1 Second International Conference on Computer Research and Development USING CAPTCHAs TO MITIGATE THE VoIP SPAM PROBLEM Ismail Ahmedy Department of Computer System and Communication Faculty of Computer Science and Information System Universiti Teknologi Malaysia Johor, Malaysia Marius Portmann School of Information Technology and Electrical Engineering University of Queensland Queensland, Australia Abstract Voice over Internet Protocol (VoIP) is one of the emerging technologies today. This application offers the user a service by which one can call another person at a low cost as compare with traditional phone services. One drawback to the Internet is spam, which are unsolicited or unwanted objects which often appear as unwanted messages in various applications. For VoIP, spam refers to unsolicited and unwanted calls by the VoIP user. In this paper, we have purposed a solution to prevent the spam in VoIP. The CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Human Apart) method aims to determine whether the call is coming from a human or a machine. The key contribution of this paper is a proof-of-concept implementation of a CAPTCHA mechanism to prevent VoIP Spam. Keywords-component; CAPTCHA, VoIP, SPAM, VoIP user, integrate, VoIP client software I. INTRODUCTION Voice over Internet Protocol (VoIP) is a technology which uses packet switched networks to transmit real voices via the Internet. This technology also can be referred as IP telephony, Voice over broadband or Internet Telephony. The traditional telephony service which is PSTN (Public Switched Telephone Network) is circuit-switched, but VoIP uses packet networks since it uses Internet Protocol (IP) to transmit the voice packet. The VoIP application uses the Session Initiation Protocol (SIP) to establish calls between two VoIP users. Spam or unsolicited messages is one of the major problems for services. Since uses the Internet as a medium for communication, the problem of spam can be a major problem for VoIP as well since it is provides a similar service to . VoIP offers a low cost beneficial on telephony services [1]. This advantage attracts the spammer to send spam message using VoIP application since it offers a cheaper services rather than tradition telephony services. As far as we are concerned, the spam message in VoIP can be annoying the VoIP user since the message is playing automatically by itself. There are different types of VoIP spam [2]: i. Call Spam: Number of calls to attempt user VoIP. If user answers the call, the user hears a recorded message and the call ends when the message finishes. This type is used by spammers on PSTN for marketing and is used widely by telemarketers as well. This type of spam is also known as Spam over Internet Telephony (SPIT). ii. IM Spam: This type, which is similar to spam, describes the bulk of unsolicited messages where the spammer uses Instant Messaging (IM) to send spam to the VoIP user. This type of spam is also known as Spam over Instant Messaging (SPIM) iii. Presence Spam: This is similar to IM Spam since it consists of a large number of unsolicited set of presence requests. It means that the message is trying to get authenticated or white listed by the VoIP user. This is also known as Spam over Presence Protocol (SPPP). In this paper, we are focusing on the call spam or SPIT problem in VoIP applications. As we know, most of spam in VoIP is in the form of automatic voice play which is a SPIT. SPIT is sending to the large number of user and when user accepts the call from the machine that sends the SPIT, the voice message is automatically play. The scenario is quite different with the spam since the VoIP application is synchronous communication and application is asynchronous. VoIP is synchronous since the communication initiates at the same time when the sender wants to communicate with the receiver. The receiver and sender must be connected at the same time. In contrast, is asynchronous since the receiver does not have to be connected with the sender to establish communication. When the sender sends a message, the message is stored on a specific server and is unveiled by the receiver at a time of his choosing. Hence, this communication is asynchronous since the receiver does not connect with the sender at the same time /10 $ IEEE DOI /ICCRD

2 Next section will describe on the Session Initiation Protocol (SIP) environment. Later on, the framework of the proposed method will be shown. A. Session Inititation Protocol (SIP) SIP is one of the protocols for the VoIP application which has been standardized by the Internet Engineering Task Force (IETF) [3]. It is used for the signaling process in the telephony application to initiate, establish and terminate calls. There are two general components for SIP in the VoIP application environment: User Agent (UA) and SIP proxy. UA acts as a VoIP client while UA can be referred to as a client in SIP architecture. The call establishment starts on the UA side before it through to the other user. The SIP proxy is responsible to establish calls when a call request has been made by the UA. According to [3], there are four logical components which make up the basic SIP architecture: UAs, registrars, proxy and redirect servers. UA acts as a client basis where it is responsible to initiate the SIP request to another UA which is also a client. The registrars are responsible to manage all the UAs in the same domain so it knows the SIP domain to which each client belongs. The proxy server acts as a router to forward the SIP request from UA to the UA destination. Redirect servers are responsible to redirect the SIP request to another SIP network where the destination UA might be. II. RELATED WORKS There are number of method which has been implemented to prevent the VoIP spam problem. In method [8], the author uses a decoying system to block the SPIT senders. To block these unwanted calls, the author suggests a decoy be used to detect legitimate calls to the user. The decoy should be a non-existing user in the same proxy. This decoy should have an address and the address should be posted on the Internet where the address can be detected as a decoy by humans but not by machines. When the caller attempts to send to the decoys address two or more times, the user is automatically blocked. When the decoy receives or is hit by spammers, it automatically stores the information regarding the spammers and informs all other users about this sender s information. The users can put the sender information received from the decoys into their black lists account. Unfortunately, this technique is not foolproof as it is dependent on the decoy s address. If the spammer learns that a decoy has been set up, the spammer can change his information each time he sends spam. Signal analysis method has been suggested by [9] where it uses a signal in the voice message to detect all SPIT messages coming through the Gateway or SIP. The problem addressed here is that the caller recipient does not know the caller s identity and, of course, the caller could be a spammer. The author shows three ways to detect a pattern from spammers. One of the detection methods used to identify the majority of spammers sending SPIT over the network employs a unidirectional process [9]. The spammers use the FROM: header field which targets the VoIP network proxy. As usual, all users are registered in the SIP proxy. From the SIP proxy, the message can be spread inside the proxy or to another proxy. This technique is not applicable to the VoIP spam problem since the specific technique involves observation of the SPIT attack pattern. It also requires the VoIP user to observe all calls from any caller, which makes the technique quite inefficient and inconvenient for the user. In research paper [10], the author used a grey level as a threshold to determine whether the caller is a spammer or not. The term grey indicates its position on a level between the white and black lists [10]. The white and black lists are commonly used in the system to prevent spam in applications. All calls are analyzed by the PMG algorithm to determine whether they are VoIP spam or not. The result has a grey level value to be determined at a certain threshold. If the grey level value is higher than the threshold value, the call is identified as spam and blocked. The grey level of the caller is not permanent which means that it can change anytime regardless of the analysis of the calls. The black list approach dictates that the caller is permanently blocked as the caller is unable to remove himself from the user black lists. PMG analyses call patterns when a user intends to establish calls. The grey level of the caller is determined by analysing the way users make the calls over time [10]. The user s calls are blocked when the grey level reaches the limits of the given threshold. As previously mentioned, the PMG method is not permanent like the black list approach, as the caller stops sending spam within a certain time [10]. This scenario makes the grey level decrease and the caller is permitted to make calls again. III. CAPTCHA METHOD CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Human Apart) uses the Turing Test approach to determine whether the user or caller is human or machine [4]. is one application that uses the CAPTCHA method to prevent spam entering the user s mailbox. The strength of this method and its success in preventing spam in made it appealing as a means of preventing spam in VoIP applications. Figure 1 shows an example of CAPTCHA image. Fig. 1: Example of CAPTCHA image The basic idea of this method is to implement a challengeresponse application for call establishment in VoIP application. As shown on figure 2, Alice is trying to establish a call with Bob and Bob challenge Alice with CAPTCHA images to prove Alice is a human rather than a machine. Alice needs to response with the correct answer of the CAPTCHA in order to establish calls with Bob. The main purpose of using the challenge-response is to prevent the spammer from establishing call with the VoIP users. In order to implement this approach, the CAPTCHA 137

3 application needs to be integrates with the existing UA clients. The CAPTCHA application has been implemented as a pop-up application in the existing UA client. In the next section, the implementation on this method will be described. Fig. 2: Challenge-Response Scenario for CAPTCHA Method IV. IMPLEMENTATION Basically, the UA functionality is to establish a call between the UA and another UA. All the processes for establishing a call, initiating a call, and sending the SIP message request and response are done in the UA client software. The approach solution using a single independent window program to shows a CAPTCHA image and to receive an input which is the answer from the user. The window program has been implemented as a pop-up window application in the UA client where the pop-up window only executes when the UA intends to initiate a call with another UA. The pop-up window is not executed if the UA receives a call from the other UA. The preliminary research on this approach is to find a suitable way to fit the pop-up window program into the existing UA client to ensure all the processes mentioned above execute correctly. While most CAPTCHA applications are used in an Internet based environments, the proposed solution has been implemented in the UA client applications. This application has used only one CAPTCHA image which is shown in the CAPTCHA window application. This image is identified by a URL (Uniform Resource Locator). For example, the URL for the CAPTCHA image is where this URL points to the location of the CAPTCHA image. In order to send the URL to the CAPTCHA pop-up window application, the TCP connection has been used for this purpose. The TCP port is open when the user starts the call establishment process. When the user starts the call, the recipient is acknowledge it with the URL message of the CAPTCHA. Once the user has answered the CAPTCHA correctly, the call is established. A. MjUA SIP UA Most VoIP applications are open source at the present time. As mentioned before, the approach for spam solution in VoIP is to be used in the VoIP client application software. One of the open source has been selected to implement this research to see whether this approach is suitable on each open source VoIP client. For this research, we have selected MjUA [11] from MjSIP application as a VoIP client for implementing the approach and integrate it. The main outcome of this project research is: the program is able to block spam calls without user interference. The program automatically blocks any attempted call that is suspected to be spam with a challenge program embedded in the VoIP client. Each call that attempts the VoIP client is not permitted to establish or request a call unless the sender provides the correct CAPTCHA answer when challenged. Figure 3 shows the connection to Alice finally established after Bob answer the CAPTCHA correctly. In contrast to Figure 3, Figure 4 shows the VoIP client is blocked from establishing a call with Alice because the answer to the CAPTCHA is not correct. A pop-up window has appeared to alert the user that the call is not authorized. Bob enters the correct answer Fig. 3: MjUA client establishes call after correctly answering the CAPTCHA Fig. 4: MjUA client is not permitted for established calls The approach method employed in this VoIP client has proved that it can block any unsolicited calls without interrupting the user. The program is able to prevent spam while hiding the process from the user itself. The pop-up 138

4 window application makes it more interactive for the user who intended to call somebody. The method approach guarantees the calls can only be made by legitimate users since the pop-up application is embedded into the VoIP client and only a user permitted to use the VoIP client can make a call. This proves that a machine cannot send spam to the VoIP client who used the program as it will challenge any incoming request who intends to establish a call. The used of URL approach for showing the CAPTCHA has shown that it can manage the image perfectly. The CAPTCHA image itself does not need to be sent through the network since the image size can slow the whole process. Instead of sending the CAPTCHA image through the network, only a URL is sent; this approach is faster and more efficient. V. DISCUSSION AND FUTURE WORK The SPAM prevention method has proved that it can block any unsolicited calls without interrupt the user. The program itself has the ability to do the prevention with hiding the process from the user itself. The pop-up window application makes it more interactively to the user who intended to calls somebody. The solution also can guarantee the calls can be made from the legitimate user since the popup application is embedded into the UA client and only the user who permitted to use the UA client can makes a call. This proof that a machine can t send a SPAM to the UA client who used the program since it will challenge any incoming request who intended to establish a call. This solution is mainly focus to block or denied any SPAM in VoIP and has been implemented without changing any structure in the SIP protocol program in the MjUA client application. As mentioned before, SIP protocol is used to establish a connection between two users in VoIP application. The solution ability was to challenge any intended calls makes from any users before the SIP establishment can be executed. The CAPTCHA URL approach has shown that it can manage the image in perfect way. The CAPTCHA image it self doesn t need to being send through the network since it can slow the whole process because the image size it self. The only thing that has been done is a URL is being sent through the network instead of the CAPTCHA image. This approach can utilize the whole timing process and a lot faster if sends the image through the network. The pop-up application just needs to use the URL for showing the CAPTCHA image. The pop-up application has been enabled in the program to showing the image using an URL. The user doesn t have to wait for the image to be appearing since it doesn t take a long time for the URL to locate the image. The only problem in this approach is only one CAPTCHA image is being used for CAPTCHA challenge. To overcome this problem, the CAPTCHA handler should select randomly CAPTCHA image from the CAPTCHA location. The answer that has been received is being checked within the CAPTCHA program. The approach doesn t seem well because it checked in the program itself. If the user can extract the program, all the answer can be seen and the attacker can used all the answer to be programmed for guessing every CAPTCHA image. Even though the extraction of program seems to be impossible, but the attacker can learn the answer in many ways since that s the attribute of the attacker. This weakness seems the only flaws in the solution implementation. In the CAPTCHA URL sending process, the only thing that has a drawback is that the particular process is not entirely in the SIP protocol itself. As mentioned before, the sending process used TCP connection to sends the CAPTCHA URL before the call establishment process can be executed. This should have a problem when two different UA clients want to communicate to each other since the implementation on each UA has a different way of doing it. Call establishment in SIP is a standard in the VoIP application. If the SIP call establishment process can be restructured to implementing the CAPTCHA challenge method, it should not be a problem if two different UA clients want to communicate since every UA clients need to follow the standard for call establishment in SIP. The restructure process need a quite of time since the protocol for the call establishment has been implemented using the SIP standard. To restructure it, the SIP call establishment needs to be reorganized with some challenge procedure since the CAPTCHA method needs to be implemented in the call establishment process. The proposed solution outcome also has made the user more comfortably since the challenge didn t involve the user entirely. The user only knew there is a call request when the CAPTCHA challenge has been finished. The call initiation process can t be executed unless the CAPTCHA challenge is successfully done. The program that has been embedded has been shown that it will deny any call initiation process until the challenge is done. VI. CONCLUSION The key contribution of this paper is a proof-of-concept implementation of a CAPTCHA mechanism to prevent VoIP spam. The spam prevention in VoIP that has been implemented on this project provides an advantage especially from the user s point of view. We have demonstrated that the CAPTCHA method can be applied in the VoIP applications. The method also has been adapted to fit in with the selected VoIP client during the execution of the entire process. As mentioned before, there are some limitations in our implementations. The purposed solution that we ve come out has shown the successful for preventing spam in VoIP. This solution can be expend to integrate with the SIP protocol to make the solution approach been acceptable by all the VoIP client application since the SIP protocol is a standard for the VoIP application. REFERENCES [1] So Young Park; Jeong Tae Kim; Shin Gak Kang, "Analysis of applicability of traditional spam regulations to VoIP spam," Advanced Communication Technology, ICACT The 8th International Conference, vol.2, no., pp. 3 pp.-, Feb [2] Rosenberg, J., Jennings, C., The Session Initiation Protocol (SIP) and Spam, RFC 5039, January

5 [3] Schulzrinne, H.; Rosenberg, J., "The Session Initiation Protocol: Internet-centric signalling," Communications Magazine, IEEE, vol.38, no.10, pp , Oct [4] Luis von Ahn, Manuel Blum and John Langford, How Lazy Cryptographers do AI In Communications of the ACM, Feb [5] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and E. Schooler, SIP: Session Initiation Protocol, RFC 3261, June [6] Shirali-Shahreza, S.; Movaghar, A., "A New Anti-Spam Protocol Using CAPTCHA," Networking, Sensing and Control, 2007 IEEE International Conference on, vol., no., pp , April [7] Hoanca, B., "How good are our weapons in the spam wars?," Technology and Society Magazine, IEEE, vol.25, no.1, pp , Spring [8] Salehin, S.M.A.; Ventura, N., "Blocking Unsolicited Voice Calls Using Decoys for the IMS," Communications, ICC '07. IEEE International Conference on, vol., no., pp , June [9] MacIntosh, R.; Vinokurov, D., "Detection and mitigation of spam in IP telephony networks using signalling protocol analysis," Advances in Wired and Wireless Communication, 2005 IEEE/Sarnoff Symposium on, vol., no., pp.49-52, April [10] Dongwook Shin; Ahn, J.; Choon Shim, "Progressive multi gray-leveling: a voice spam protection algorithm," Network, IEEE, vol.20, no.5, pp.18-24, Sept.-Oct [11] MjSIP VoIP Client 140

Presence Scalability Architectures 1

Presence Scalability Architectures 1 Scalability Architectures 1 Vishal K. Singh and Henning Schulzrinne Department of Computer Science, Columbia University {vs2140, hgs}@cs.columbia.edu Abstract: We apply the two-stage reliable and scalable

More information

CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol

CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol CDCS: a New Case-Based Method for Transparent NAT Traversals of the SIP Protocol Mustapha GUEZOURI LISSI/SCTIC, University of Paris XII-Val de Marne, France e-mail mguezouri@yahoo.fr and Abdelhamid MELLOUK

More information

Ericsson D. Willis. Cisco Systems. April 2006

Ericsson D. Willis. Cisco Systems. April 2006 Network Working Group Request for Comments: 4453 Category: Informational J. Rosenberg Cisco Systems G. Camarillo, Ed. Ericsson D. Willis Cisco Systems April 2006 Status of This Memo Requirements for Consent-Based

More information

Network-based Fast Handover for IMS Applications and Services

Network-based Fast Handover for IMS Applications and Services Network-based Fast Handover for IMS Applications and Services Sang Tae Kim 1, Seok Joo Koh 1, Lee Kyoung-Hee 2 1 Department of Computer Science, Kyungpook National University 2 Electronics and Telecommunications

More information

Request for Comments: 5079 Category: Standards Track December Rejecting Anonymous Requests in the Session Initiation Protocol (SIP)

Request for Comments: 5079 Category: Standards Track December Rejecting Anonymous Requests in the Session Initiation Protocol (SIP) Network Working Group J. Rosenberg Request for Comments: 5079 Cisco Category: Standards Track December 2007 Rejecting Anonymous Requests in the Session Initiation Protocol (SIP) Status of This Memo This

More information

Journal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč

Journal of Information, Control and Management Systems, Vol. X, (200X), No.X SIP OVER NAT. Pavel Segeč SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: Pavel.Segec@fri.uniza.sk Abstract Session Initiation Protocol is one of key IP communication

More information

Department of Computer Science. Burapha University 6 SIP (I)

Department of Computer Science. Burapha University 6 SIP (I) Burapha University ก Department of Computer Science 6 SIP (I) Functionalities of SIP Network elements that might be used in the SIP network Structure of Request and Response SIP messages Other important

More information

Performance Evaluation of a Flooding Detection Mechanism for VoIP Networks

Performance Evaluation of a Flooding Detection Mechanism for VoIP Networks Performance Evaluation of a Flooding Detection Mechanism for VoIP Networks Dimitris Geneiatakis Dept. of Telecommunications Science and Technology, University of Peloponnese End of Karaiskaki St., GR-2200,

More information

Session Initiation Protocol (SIP) Ragnar Langseth University of Oslo April 26th 2013

Session Initiation Protocol (SIP) Ragnar Langseth University of Oslo April 26th 2013 Session Initiation Protocol (SIP) Ragnar Langseth University of Oslo April 26th 2013 Overview SIP Basic principles Components Message flow Mobility in SIP Personal Mobility Terminal Mobility Pre-call Mid-call

More information

Unified Communications Platform

Unified Communications Platform Platforms (Products/Software) Unified Communications Platform TSUTSUI Kensaku, ARAO Shinya, SERADA Teruharu, HOKARI Makoto Abstract Integration of communications services used by an enterprise on an IP

More information

Analyze of SIP Messages and Proposal of SIP Routing

Analyze of SIP Messages and Proposal of SIP Routing Analyze of SIP Messages and Proposal of SIP Routing F. Csoka, I. Baronak, E. Chromy and L. Kockovic Abstract This paper deals with the functionality of SIP and design of an efficient and optimized process

More information

Request for Comments: 3764 Category: Standards Track April enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record

Request for Comments: 3764 Category: Standards Track April enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record Network Working Group J. Peterson Request for Comments: 3764 NeuStar Category: Standards Track April 2004 enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record Status of this

More information

Simulation of SIP-Based VoIP for Mosul University Communication Network

Simulation of SIP-Based VoIP for Mosul University Communication Network Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems Simulation of SIP-Based VoIP for Mosul University Communication Network Abdul-Bary Raouf Suleiman

More information

An Efficient NAT Traversal for SIP and Its Associated Media sessions

An Efficient NAT Traversal for SIP and Its Associated Media sessions An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,

More information

A Survey of SIP Peering

A Survey of SIP Peering A Survey of SIP Peering Lars Strand lars.strand@nr.no Norwegian Computing Center, P.O. Box 114 Blindern, NO-0314 Oslo, Norway Wolfgang Leister wolfgang.leister@nr.no Norwegian Computing Center, P.O. Box

More information

SPHINX: A system for telling computers and humans apart through audio CAPTCHA. Yannis Soupionis

SPHINX: A system for telling computers and humans apart through audio CAPTCHA. Yannis Soupionis SPHINX: A system for telling computers and humans apart through audio CAPTCHA Yannis Soupionis Outline Introduction Internet Telephony Spam over Internet Telephony (SPIT) SPIT Phenomenon Methodology Research

More information

Using Cross-Media Relations to Identify Important Communication Requests: Testing the Concept and Implementation

Using Cross-Media Relations to Identify Important Communication Requests: Testing the Concept and Implementation Using Cross-Media Relations to Identify Important Communication Requests: Testing the Concept and Implementation Kumiko Ono and Henning Schulzrinne {kumiko, hgs}@cs.columbia.edu Outline 1. Introduction

More information

ZyXEL V120 Support Notes. ZyXEL V120. (V120 IP Attendant 1 Runtime License) Support Notes

ZyXEL V120 Support Notes. ZyXEL V120. (V120 IP Attendant 1 Runtime License) Support Notes ZyXEL V120 (V120 IP Attendant 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V120 IP Attendant...3 2. Setting up the V120...4 3. Auto Provision...7 4. V120

More information

Internet Engineering Task Force (IETF) Request for Comments: 8465 September 2018 Category: Informational ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 8465 September 2018 Category: Informational ISSN: Internet Engineering Task Force (IETF) R. Atarius, Ed. Request for Comments: 8465 September 2018 Category: Informational ISSN: 2070-1721 Using the Mobile Equipment Identity (MEID) URN as an Instance ID

More information

Request for Comments: 3578 Category: Standards Track dynamicsoft J. Peterson NeuStar L. Ong Ciena August 2003

Request for Comments: 3578 Category: Standards Track dynamicsoft J. Peterson NeuStar L. Ong Ciena August 2003 Network Working Group Request for Comments: 3578 Category: Standards Track G. Camarillo Ericsson A. B. Roach dynamicsoft J. Peterson NeuStar L. Ong Ciena August 2003 Mapping of Integrated Services Digital

More information

Robocall and fake caller-id detection

Robocall and fake caller-id detection Technical Disclosure Commons Defensive Publications Series December 01, 2017 Robocall and fake caller-id detection Junda Liu Naveen Kalla Shi Lu Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

Improvement of SPIT prevention technique based on Turing test. Alexander Joseph Johansen

Improvement of SPIT prevention technique based on Turing test. Alexander Joseph Johansen Improvement of SPIT prevention technique based on Turing test Alexander Joseph Johansen A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Information

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

New and Current Approaches for Secure VoIP Service

New and Current Approaches for Secure VoIP Service New and Current Approaches for Secure VoIP Service H. Hakan Kılınç, Uğur Cağal Netas, Cyber Security Department, Istanbul hakank@netas.com.tr, ucagal@netas.com.tr Abstract: The current telecom technology

More information

SIP SERVICES USING SIP SERVLET API THE INFOLINE SERVICE

SIP SERVICES USING SIP SERVLET API THE INFOLINE SERVICE Journal of Information, Control and Management Systems, Vol. 8, (2010), No.3 SIP SERVICES USING SIP SERVLET API THE INFOLINE SERVICE Pavel SEGEČ University of Žilina, Faculty of Management Science and

More information

VoIP Security Threat Analysis

VoIP Security Threat Analysis 2005/8/2 VoIP Security Threat Analysis Saverio Niccolini, Jürgen Quittek, Marcus Brunner, Martin Stiemerling (NEC, Network Laboratories, Heidelberg) Introduction Security attacks taxonomy Denial of Service

More information

Request for Comments: 3959 Category: Standards Track December 2004

Request for Comments: 3959 Category: Standards Track December 2004 Network Working Group G. Camarillo Request for Comments: 3959 Ericsson Category: Standards Track December 2004 Status of This Memo The Early Session Disposition Type for the Session Initiation Protocol

More information

Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP) Session Initiation Protocol (SIP) Introduction A powerful alternative to H.323 More flexible, simpler Easier to implement Advanced features Better suited to the support of intelligent user devices A part

More information

Unsolicited Communication in the NGN

Unsolicited Communication in the NGN Unsolicited Communication in the NGN Overview of Status and Activities in different SDOs Thilo Ewald Research Scientist NEC Laboratories Europe NEC Europe Ltd., Heidelberg, Germany ewald@nw.neclab.eu Page

More information

S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN. Antti Keurulainen,

S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN. Antti Keurulainen, S-72.333 Postgraduate Course in Radio Communications. Application Layer Mobility in Antti Keurulainen, 13.5.2004 antti.keurulainen@bitville.fi The Mobility Concepts is Link layer Mobility Network layer

More information

nsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network

nsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network nsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network Peyman Behbahani City University, London, UK p.behbahani@city.ac.uk Veselin Rakocevic City University, London,

More information

Expires: August 2, 2003 February SIP Authenticated Identity Body (AIB) Format draft-ietf-sip-authid-body-01. Status of this Memo

Expires: August 2, 2003 February SIP Authenticated Identity Body (AIB) Format draft-ietf-sip-authid-body-01. Status of this Memo SIP WG J. Peterson Internet-Draft NeuStar Expires: August 2, 2003 February 2003 Status of this Memo SIP Authenticated Identity Body (AIB) Format draft-ietf-sip-authid-body-01 This document is an Internet-Draft

More information

IMS signalling for multiparty services based on network level multicast

IMS signalling for multiparty services based on network level multicast IMS signalling for multiparty services based on network level multicast Ivan Vidal, Ignacio Soto, Francisco Valera, Jaime Garcia, Arturo Azcorra UniversityCarlosIIIofMadrid Av.Universidad,30 E-28911, Madrid,

More information

Request for Comments: 4759 Category: Standards Track Neustar Inc. L. Conroy Roke Manor Research November 2006

Request for Comments: 4759 Category: Standards Track Neustar Inc. L. Conroy Roke Manor Research November 2006 Network Working Group Request for Comments: 4759 Category: Standards Track R. Stastny Oefeg R. Shockey Neustar Inc. L. Conroy Roke Manor Research November 2006 Status of This Memo The ENUM Dip Indicator

More information

Internet Engineering Task Force (IETF) Request for Comments: ISSN: March 2017

Internet Engineering Task Force (IETF) Request for Comments: ISSN: March 2017 Internet Engineering Task Force (IETF) M. Mohali Request for Comments: 8119 Orange Updates: 4458 M. Barnes Category: Informational MLB@Realtime Communications ISSN: 2070-1721 March 2017 Abstract SIP "cause"

More information

SDN-Based Network Security Functions for VoIP and VoLTE Services

SDN-Based Network Security Functions for VoIP and VoLTE Services SDN-Based Network Security Functions for VoIP and VoLTE Services Daeyoung Hyun, Jinyoug Kim, Jaehoon (Paul) Jeong, Hyoungshick Kim, Jungsoo Park, and Taejin Ahn Department of Software, Sungkyunkwan University,

More information

This is the published version of a paper presented at Workshop on Innovative Mobile Applications of Context (IMAC) at MobileHCI 2006, Espoo, Finland.

This is the published version of a paper presented at Workshop on Innovative Mobile Applications of Context (IMAC) at MobileHCI 2006, Espoo, Finland. http://www.diva-portal.org This is the published version of a paper presented at Workshop on Innovative Mobile Applications of Context (IMAC) at MobileHCI 2006, Espoo, Finland. Citation for the original

More information

PREVENTING SPIT WITH NAIVE BAYES IN VOIP COMMUNICATION

PREVENTING SPIT WITH NAIVE BAYES IN VOIP COMMUNICATION PREVENTING SPIT WITH NAIVE BAYES IN VOIP COMMUNICATION Intesab Hussain Sadhayo*, Fareed Ahmed Jokhio**, Umair Ali Khan*, Pardeep Kumar*, Nisar Ahmed Memon* ABSTRACT Spams over Internet telephony is a serious

More information

VoIP Gateway Series. Unwanted Call Blocking Service Features (Hacking Call, Illegal Call, etc) AddPac Technology. 2011, Sales and Marketing

VoIP Gateway Series. Unwanted Call Blocking Service Features (Hacking Call, Illegal Call, etc) AddPac Technology. 2011, Sales and Marketing VoIP Gateway Series Unwanted Call Blocking Service Features (Hacking Call, Illegal Call, etc) www.addpac.com Technology 2011, Sales and Marketing Contents Overview Unwanted Call Blocking Service for VoIP

More information

IP Possibilities Conference & Expo. Minneapolis, MN April 11, 2007

IP Possibilities Conference & Expo. Minneapolis, MN April 11, 2007 IP Possibilities Conference & Expo Minneapolis, MN April 11, 2007 Rural VoIP Protocol, Standards and Technologies Presented by: Steven P. Senne, P.E Chief Technology Officer Finley Engineering Company,

More information

ABSTRACT. ZHOU, YUZHENG. Mitigating Voice over IP Spam Using Computational Puzzles. (Under the direction of Associate Professor Peng Ning).

ABSTRACT. ZHOU, YUZHENG. Mitigating Voice over IP Spam Using Computational Puzzles. (Under the direction of Associate Professor Peng Ning). ABSTRACT ZHOU, YUZHENG. Mitigating Voice over IP Spam Using Computational Puzzles. (Under the direction of Associate Professor Peng Ning). Voice over IP (VoIP) has gained increasing popularity in recent

More information

ns-2 Implementation of the OMA PoC Control Plane

ns-2 Implementation of the OMA PoC Control Plane Vol. 3, Issue. 6, Nov - Dec. 2013 pp-3416-3424 ISSN: 2249-6645 ns-2 Implementation of the OMA PoC Control Plane Jong Min Lee Dept. of Computer Software Engineering, Dong-Eui University, Busan, Republic

More information

Internet Engineering Task Force (IETF) Request for Comments: 7255 Category: Informational May 2014 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7255 Category: Informational May 2014 ISSN: Internet Engineering Task Force (IETF) A. Allen, Ed. Request for Comments: 7255 Blackberry Category: Informational May 2014 ISSN: 2070-1721 Using the International Mobile station Equipment Identity (IMEI)

More information

Secure Telephony Enabled Middle-box (STEM)

Secure Telephony Enabled Middle-box (STEM) Report on Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen 04/14/2003 Dr. Mark Stamp - SJSU - CS 265 - Spring 2003 Table of Content 1. Introduction 1 2. IP Telephony Overview.. 1 2.1 Major Components

More information

SIP Session Initiation Protocol Part 2. ITS VoIP; 2009 P. Campbell, H.Kruse

SIP Session Initiation Protocol Part 2. ITS VoIP; 2009 P. Campbell, H.Kruse SIP Session Initiation Protocol Part 2 ITS 441 - VoIP; 2009 P. Campbell, H.Kruse Multiple Call Opportunities 2 Alice Calls Bob How? One Way: Alice s UA can set up a SIP trapezoid. Corners: Alice s phone,

More information

The Sys-Security Group

The Sys-Security Group The Sys-Security Group Security Advisory More Vulnerabilities with Pingtel xpressa SIP-based IP Phones How one can exploit vulnerabilities with MyPingtel Portal to subvert a VoIP infrastructure which includes

More information

Overview of the Session Initiation Protocol

Overview of the Session Initiation Protocol CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction

More information

Towards Standardized Prevention of Unsolicited Communications and Phishing Attacks

Towards Standardized Prevention of Unsolicited Communications and Phishing Attacks Towards Standardized Prevention of Unsolicited Communications and Phishing Attacks JaeSeung Song and Andreas Kunz NEC Laboratories Europe Received 3 April 2013; Accepted 14 May 2013 Abstract The world

More information

Presenting Solutions to Increase Simultaneous Call in VOIP System by SIP Protocol - Based Media Server

Presenting Solutions to Increase Simultaneous Call in VOIP System by SIP Protocol - Based Media Server International Journal of Wireless Communications and Mobile Computing 2016; 4(2): 12-17 http://www.sciencepublishinggroup.com/j/wcmc doi: 10.11648/j.wcmc.20160402.11 ISSN: 2330-1007 (Print); ISSN: 2330-1015

More information

Medical Sensor Application Framework Based on IMS/SIP Platform

Medical Sensor Application Framework Based on IMS/SIP Platform Medical Sensor Application Framework Based on IMS/SIP Platform I. Markota, I. Ćubić Research & Development Centre, Ericsson Nikola Tesla d.d. Poljička cesta 39, 21000 Split, Croatia Phone: +38521 305 656,

More information

Service Learning in Internet Telephony

Service Learning in Internet Telephony Service Learning in Internet Telephony Xiaotao Wu Department of Computer Science Columbia University ew ork, ew ork 10027 Email: xiaotaow@cs.columbia.edu Henning Schulzrinne Department of Computer Science

More information

Network Working Group. BCP: 131 July 2007 Category: Best Current Practice

Network Working Group. BCP: 131 July 2007 Category: Best Current Practice Network Working Group D. Wing Request for Comments: 4961 Cisco Systems BCP: 131 July 2007 Category: Best Current Practice Status of This Memo Symmetric RTP / RTP Control Protocol (RTCP) This document specifies

More information

Internet Engineering Task Force (IETF) Request for Comments: 7403 Category: Standards Track November 2014 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7403 Category: Standards Track November 2014 ISSN: Internet Engineering Task Force (IETF) H. Kaplan Request for Comments: 7403 Oracle Category: Standards Track November 2014 ISSN: 2070-1721 Abstract A Media-Based Traceroute Function for the Session Initiation

More information

Unsolicited Communication / SPIT / multimedia-spam

Unsolicited Communication / SPIT / multimedia-spam Unsolicited Communication / SPIT / multimedia-spam overview of this topic in different SDOs Thilo Ewald NGN Group, NEC Laboratories Europe NEC Europe Ltd., Heidelberg, Germany ewald@nw.neclab.eu Page

More information

CAPTCHAs and Information Hiding

CAPTCHAs and Information Hiding CAPTCHAs and Information Hiding Neal R. Wagner The University of Texas at San Antonio Department of Computer Science San Antonio, Texas 78249 USA wagner@cs.utsa.edu Abstract. The goal of steganography

More information

Internet Engineering Task Force (IETF) Request for Comments: 8055 Category: Standards Track. January 2017

Internet Engineering Task Force (IETF) Request for Comments: 8055 Category: Standards Track. January 2017 Internet Engineering Task Force (IETF) Request for Comments: 8055 Category: Standards Track ISSN: 2070-1721 C. Holmberg Ericsson Y. Jiang China Mobile January 2017 Abstract Session Initiation Protocol

More information

Network Working Group. Expires: April 30, 2002 October 30, The Refer Method draft-ietf-sip-refer-02. Status of this Memo

Network Working Group. Expires: April 30, 2002 October 30, The Refer Method draft-ietf-sip-refer-02. Status of this Memo Network Working Group R. Sparks Internet-Draft dynamicsoft Expires: April 30, 2002 October 30, 2001 Status of this Memo The Refer Method draft-ietf-sip-refer-02 This document is an Internet-Draft and is

More information

User Customisation of Service Request Routing for the IP Multimedia Subsystem

User Customisation of Service Request Routing for the IP Multimedia Subsystem User Customisation of Service Request Routing for the IP Multimedia Subsystem Richard Spiers and Neco Ventura University of Cape Town, Rondebosch, South Africa 021 650 5296 Email: {rspiers,neco}@crg.ee.uct.ac.za

More information

Towards the Convergence between IMS and Social Networks

Towards the Convergence between IMS and Social Networks Towards the Convergence between IMS and Social Networks Ramon Alcarria, Tomas Robles Telematics Department Technical University of Madrid Madrid, Spain {ralcarria, trobles}@dit.upm.es Gonzalo Camarillo

More information

VoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts

VoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP System Gatekeeper: A gatekeeper is useful for handling VoIP call connections includes managing terminals, gateways and MCU's (multipoint

More information

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

CPSC156a: The Internet Co-Evolution of Technology and Society

CPSC156a: The Internet Co-Evolution of Technology and Society CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 16: November 4, 2003 Spam Acknowledgement: V. Ramachandran What is Spam? Source: Mail Abuse Prevention System, LLC Spam is unsolicited

More information

Have I Met You Before? Using Cross-Media

Have I Met You Before? Using Cross-Media Have I Met You Before? Using CrossMedia Kumiko Ono and Henning Schulzrinne Columbia University Outline 1. Introduction Results of our quick survey Legitimate calls from those with weak social ties Legitimate

More information

ICS 451: Today's plan. Network Layer Protocols: virtual circuits Static Routing Distance-Vector Routing

ICS 451: Today's plan. Network Layer Protocols: virtual circuits Static Routing Distance-Vector Routing ICS 451: Today's plan Network Layer Protocols: virtual circuits Static Routing Distance-Vector Routing Virtual Circuits: Motivation Implementing the routing table in hardware can be expensive to make it

More information

arxiv: v1 [cs.cr] 10 Jun 2008

arxiv: v1 [cs.cr] 10 Jun 2008 SPAM OVER INTERNET TELEPHONY AND HOW TO DEAL WITH IT Dr. Andreas U. Schmidt 1, Nicolai Kuntze 1, Rachid El Khayari 2 arxiv:0806.1610v1 [cs.cr] 10 Jun 2008 1 Fraunhofer-Insitute for Secure Information Technology

More information

A Cost-Effective Mechanism for Protecting SIP Based Internet Telephony Services Against Signaling Attacks Dimitris Geneiatakis and Costas Lambrinoudakis Laboratory of Information and Communication Systems

More information

Request for Comments: 5369 Category: Informational October Framework for Transcoding with the Session Initiation Protocol (SIP)

Request for Comments: 5369 Category: Informational October Framework for Transcoding with the Session Initiation Protocol (SIP) Network Working Group G. Camarillo Request for Comments: 5369 Ericsson Category: Informational October 2008 Framework for Transcoding with the Session Initiation Protocol (SIP) Status of This Memo This

More information

A Review Paper on Voice over Internet Protocol (VoIP)

A Review Paper on Voice over Internet Protocol (VoIP) A Review Paper on Voice over Internet Protocol (VoIP) Aastha Tiwari* Research Scholar, M.tech. 2 nd Computer Networks 1 Bhilai Institute of Technology, Durg, Chattisgarh, India tiwariaastha17@gmail.com

More information

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 07:53:57 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 15 Feb 2000 17:03:00 GMT ETag: "3239a5-465b-38a986c4" Accept-Ranges: bytes Content-Length: 18011 Connection:

More information

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks So we are proposing a network intrusion detection system (IDS) which uses a Keywords: DDoS (Distributed Denial

More information

Audio and Video Communication Software Design Based on SIP

Audio and Video Communication Software Design Based on SIP TELKOMNIKA Indonesian Journal of Electrical Engineering Vol. 12, No. 11, November 2014, pp. 7946 ~ 7951 DOI: 10.11591/telkomnika.v12i11.6478 7946 Audio and Video Communication Software Design Based on

More information

The implementation of multicast with SIP in distance education system

The implementation of multicast with SIP in distance education system I.J. Education and Management Engineering 2012, 8, 20-24 Published Online August 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2012.08.04 Available online at http://www.mecs-press.net/ijeme

More information

Mobile Computing #MC05 Internet Protocol and Mobile Computing

Mobile Computing #MC05 Internet Protocol and Mobile Computing Mobile Computing #MC05 Internet Protocol and Mobile Computing CS60002: Distributed Systems Winter 2006-2007 Where we left off... Device databases Flash, OR/direct Synchronization Algorithms Push/notifications

More information

Request for Comments: 3574 Category: Informational August 2003

Request for Comments: 3574 Category: Informational August 2003 Network Working Group J. Soininen, Ed. Request for Comments: 3574 Nokia Category: Informational August 2003 Status of this Memo Transition Scenarios for 3GPP Networks This memo provides information for

More information

Modular Design of Call Control Layer in Telephony Software

Modular Design of Call Control Layer in Telephony Software 8 Modular Design of Call Control Layer in Telephony Software Ilija Basicevic University of Novi Sad, Faculty of Technical Sciences Novi Sad, 21000, Serbia Abstract An important property of a telephony

More information

CS 595: Cryptography Final Project

CS 595: Cryptography Final Project CS 595: Cryptography Final Project Tim Wylie December 7, 2009 Project Overview I have implemented a basic covert multi-party communication instant messaging program. The users can communicate with any

More information

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP). This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,

More information

Provide a generic transport capabilities for real-time multimedia applications Supports both conversational and streaming applications

Provide a generic transport capabilities for real-time multimedia applications Supports both conversational and streaming applications Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP Performance Tests Build-out Delay

More information

HOSTED VOIP - PC CLIENT

HOSTED VOIP - PC CLIENT HOSTED VOIP - PC CLIENT Getting started user guide June 2012 Application release 8.0 Document version 1 T: 0844 871 8125 support@timico.co.uk www.timico.co.uk The Personal Communicator Client (PC Client)

More information

TODAY AGENDA. VOIP Mobile IP

TODAY AGENDA. VOIP Mobile IP VOIP & MOBILE IP PREVIOUS LECTURE Why Networks? And types of Networks Network Topologies Protocols, Elements and Applications of Protocols TCP/IP and OSI Model Packet and Circuit Switching 2 TODAY AGENDA

More information

A Survey of BGP Security Review

A Survey of BGP Security Review A Survey of BGP Security Review Network Security Instructor:Dr. Shishir Nagaraja Submitted By: Jyoti Leeka November 16, 2011 1 Introduction to the topic and the reason for the topic being interesting Border

More information

atl IP Telephone SIP Compatibility

atl IP Telephone SIP Compatibility atl IP Telephone SIP Compatibility Introduction atl has released a new range of IP Telephones the IP 300S (basic business IP telephone) and IP400 (Multimedia over IP telephone, MOIP or videophone). The

More information

Unit 5 Research Project. Eddie S. Jackson. Kaplan University. IT530: Computer Networks. Dr. Thomas Watts, PhD, CISSP

Unit 5 Research Project. Eddie S. Jackson. Kaplan University. IT530: Computer Networks. Dr. Thomas Watts, PhD, CISSP Running head: UNIT 5 RESEARCH PROJECT 1 Unit 5 Research Project Eddie S. Jackson Kaplan University IT530: Computer Networks Dr. Thomas Watts, PhD, CISSP 09/09/2014 UNIT 5 RESEARCH PROJECT 2 Abstract Telephony

More information

Request for Comments: 2976 Category: Standards Track October 2000

Request for Comments: 2976 Category: Standards Track October 2000 Network Working Group S. Donovan Request for Comments: 2976 dynamicsoft Category: Standards Track October 2000 Status of this Memo The SIP INFO Method This document specifies an Internet standards track

More information

Information About SIP Compliance with RFC 3261

Information About SIP Compliance with RFC 3261 APPENDIX A Information About SIP Compliance with RFC 3261 This appendix describes how the Cisco SIP IP phone complies with the IETF definition of SIP as described in RFC 3261. It has compliance information

More information

Comparison of Signaling and Media Approaches to Detect VoIP SPIT Attack

Comparison of Signaling and Media Approaches to Detect VoIP SPIT Attack Comparison of Signaling and Media Approaches to Detect VoIP SPIT Attack Ahmed Fawzy Gad Information Technology Depr. Faculty of Computers and Information Menofia University, Egypt ahmed.fawzy@ci.menofia.edu.eg

More information

Request for Comments: Ericsson February 2004

Request for Comments: Ericsson February 2004 Network Working Group Request for Comments: 3702 Category: Informational J. Loughney Nokia G. Camarillo Ericsson February 2004 Authentication, Authorization, and Accounting Requirements for the Session

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

Adapting SIP for Enabling Voice Calls in MANET

Adapting SIP for Enabling Voice Calls in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Evaluation of Media Server in SIP-Based Voice Conferencing

Evaluation of Media Server in SIP-Based Voice Conferencing International Journal of Computer Theory and Engineering, Vol. 5, No. 4, August 13 Evaluation of Media Server in SIP-Based Voice Conferencing Fatemeh Samsami and Ahmad Akbari evaluations[2]-[7]. M. Ahmed

More information

Category: Standards Track August 2002

Category: Standards Track August 2002 Network Working Group G. Parsons Request for Comments: 3362 Nortel Networks Category: Standards Track August 2002 Status of this Memo Real-time Facsimile (T.38) - image/t38 MIME Sub-type Registration This

More information

Request for Comments: 4715 Category: Informational NTT November 2006

Request for Comments: 4715 Category: Informational NTT November 2006 Network Working Group Request for Comments: 4715 Category: Informational M. Munakata S. Schubert T. Ohba NTT November 2006 Status of This Memo The Integrated Services Digital Network (ISDN) Subaddress

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

Use and Abuse of Anti-Spam White/Black Lists

Use and Abuse of Anti-Spam White/Black Lists Page 1 of 5 Use and Abuse of Anti-Spam White/Black Lists September 26, 2006 White and Black lists are standard spam filters. Their typically simple interface, provide a way to quickly identify emails as

More information

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.

VoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved. VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like

More information

Request for Comments: April Control of Service Context using SIP Request-URI

Request for Comments: April Control of Service Context using SIP Request-URI Network Working Group Request for Comments: 3087 Category: Informational B. Campbell R. Sparks dynamicsoft April 2001 Status of this Memo Control of Service Context using SIP Request-URI This memo provides

More information

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Internet Engineering Task Force (IETF) ISSN: C. Holmberg Ericsson M. Patel Huawei Technologies (UK) Co., Ltd. April 2014

Internet Engineering Task Force (IETF) ISSN: C. Holmberg Ericsson M. Patel Huawei Technologies (UK) Co., Ltd. April 2014 Internet Engineering Task Force (IETF) H. Schulzrinne Request for Comments: 7090 Columbia University Category: Standards Track H. Tschofenig ISSN: 2070-1721 C. Holmberg Ericsson M. Patel Huawei Technologies

More information

Collaborative Spam Mail Filtering Model Design

Collaborative Spam Mail Filtering Model Design I.J. Education and Management Engineering, 2013, 2, 66-71 Published Online February 2013 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2013.02.11 Available online at http://www.mecs-press.net/ijeme

More information

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels Network Security - ISA 656 Voice Over IP (VoIP) Security Simple SIP ing Alice s Bob Session Initiation Protocol Control channel for Voice over IP (Other control channel protocols exist, notably H.323 and

More information