Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/4918
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBhatia, Ekta Ravikumar-
dc.date.accessioned2014-08-27T07:21:21Z-
dc.date.available2014-08-27T07:21:21Z-
dc.date.issued2014-06-01-
dc.identifier.urihttp://hdl.handle.net/123456789/4918-
dc.description.abstractVoIP Protocol is designed to carry voice data on the IP Protocol. Nowadays, apart from Voice there is a longing for data and video transfer also. This leads us to unified networks. In this thesis, All hardware-specific and network-centered attacks carried out in VoIP and their security issues will be covered alongside detailed countermeasures and hands-on implementation techniques. Initially the attacks will be conducted in order to understand the vulnerabilities and then I am going to research to find loopholes for how to defend against the latest Denial of Service attack, man-in-the-middle attack, call flooding attack, VoIP fuzzing, Voice SPAM/SPIT, and voice phishing attacks.en_US
dc.publisherInstitute of Technologyen_US
dc.relation.ispartofseries12MCEI04;-
dc.subjectComputer 2012en_US
dc.subjectProject Report 2012en_US
dc.subjectComputer Project Reporten_US
dc.subjectProject Reporten_US
dc.subject12MCEIen_US
dc.subject12MCEI04en_US
dc.subjectINSen_US
dc.subjectINS 2012en_US
dc.subjectCE (INS)en_US
dc.titleVoIP Attacks & Securityen_US
dc.typeDissertationen_US
Appears in Collections:Dissertation, CE (INS)

Files in This Item:
File Description SizeFormat 
12MCEI04.pdf12MCEI042.49 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.