Attack Determination and its Security Analysis for Personal Communication in VoIP Networks

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 9, Issue 2

Abstract

 Voice over Internet Protocol (VoIP) is a technology that enables one to make and receive calls through the Internet instead of using the traditional analog PSTN (Public Switched Telephone Network) lines.Gtalk and Skype are frequently used for this purpose, which is a third party. So, we are utilizing their environment for conferencing. We are in need of a server to transfer the information from source to destination i.e. we are compromising our privacy at a certain level as they do not provide full security to our audio packets.Here, we do propose, novel flow analysis attacks that ensures both privacy and demonstrates the vulnerabilities in peer-to-peer VoIP networks. Solutions are proposed by quantifiable k-anonimity metrices.

Authors and Affiliations

Dr. K Venkatachalapathy

Keywords

Related Articles

 Reversible Watermarking based on Histogram ShiftingModification:A Review

 Abstract: When we talk about the data communication or exchange of information from sender to receiver, themajor concern is DATA. This (data) being of high importance, prone to various kinds of attacks. In order to...

ICHALEC Improved Cluster Head And Low Energy Consumption Protocol In Wireless Sensor Network

Wireless Sensor Network is an emerging field for research in most of the aspects of mankind. It is a network composed of nodes without any central controller. Sensor network protocols have high ability to be used in each...

 Secured Genetic Algorithm based image hiding technique with location number compression

 Abstract: Data hiding involves hiding of information in a cover media to obtain the indistinguishable media, in such a way that the cover media is supposed not to have any embedded image for its unintended recipien...

 DSNs & X.400 assist in ensuring email reliability

 Abstract: While email is fairly reliable, messages do get lost. This can be due to the store-and-forward natureof e- mail, which passes responsibility for delivering email from one mail server to another, but in do...

Efficient Detection of Internet Worms Using Data Mining Techniques

Internet worms pose a serious threat to computer security.Traditional approaches using signatures to detect worms pose little danger to the zero day attacks. The focus of malware research is shifting from using signature...

Download PDF file
  • EP ID EP93399
  • DOI -
  • Views 110
  • Downloads 0

How To Cite

Dr. K Venkatachalapathy (2013).  Attack Determination and its Security Analysis for Personal Communication in VoIP Networks. IOSR Journals (IOSR Journal of Computer Engineering), 9(2), 1-9. https://europub.co.uk./articles/-A-93399