Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/4918
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bhatia, Ekta Ravikumar | - |
dc.date.accessioned | 2014-08-27T07:21:21Z | - |
dc.date.available | 2014-08-27T07:21:21Z | - |
dc.date.issued | 2014-06-01 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/4918 | - |
dc.description.abstract | VoIP Protocol is designed to carry voice data on the IP Protocol. Nowadays, apart from Voice there is a longing for data and video transfer also. This leads us to unified networks. In this thesis, All hardware-specific and network-centered attacks carried out in VoIP and their security issues will be covered alongside detailed countermeasures and hands-on implementation techniques. Initially the attacks will be conducted in order to understand the vulnerabilities and then I am going to research to find loopholes for how to defend against the latest Denial of Service attack, man-in-the-middle attack, call flooding attack, VoIP fuzzing, Voice SPAM/SPIT, and voice phishing attacks. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | 12MCEI04; | - |
dc.subject | Computer 2012 | en_US |
dc.subject | Project Report 2012 | en_US |
dc.subject | Computer Project Report | en_US |
dc.subject | Project Report | en_US |
dc.subject | 12MCEI | en_US |
dc.subject | 12MCEI04 | en_US |
dc.subject | INS | en_US |
dc.subject | INS 2012 | en_US |
dc.subject | CE (INS) | en_US |
dc.title | VoIP Attacks & Security | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
12MCEI04.pdf | 12MCEI04 | 2.49 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.