Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Problem 1:

Recently Voice over IP (VoIP) is experiencing an exceptional growth. Being a real-time service, VoIP is more susceptible to attacks. Furthermore, VoIP uses multiple protocols for call control and data delivery, making it vulnerable to different attacks at different protocol layers. An attacker can without difficulty disrupt VoIP services by flooding TCP SYN packets, UDP-based RTP packets, or SIP-based INVITE messages, which pose a critical threat to IP telephony.

Attack to an IP telephony network is not new concept. However, the manifestation of attacks, their targets, and how they are implemented has evolved over the past decade. To date, most Internet originated attacks have targeted the transport and network layers of the TCP/IP protocol stack. Typically, the goal of these attacks is either to overwhelm a specific machine or to saturate the communication link. But, as the Internet evolves and enterprises deploy multiple connections to the Internet, attacking the infrastructure has become less critical. Certain attacks are being targeted at particular services that consumers demand and rely upon, e.g., e-mail and web. This trend will continue as new complex services are deployed and gain widespread adoption. IP telephony is one such complex service that is gaining rapid momentum and has the potential for becoming a strategic new technology in coming decades. In turn, it is a prime target for new forms of attacks.  In order to support IP telephony in enterprise network, new network elements must be deployed and existing network elements must be modified. To support calls between endpoints connected to the IP network, referred to as Net-to-Net calls, SIP (Session Initiation Protocol) Proxy and Registrar/Location Server (RLS) must be deployed. To support call between endpoints in Public Switched Telephone Network (PSTN) and endpoints connected to the IP network, referred to Net-to-PSTN and PSTN-to-Net calls, it is necessary to deploy a Media or Signal Gateway (MSG) that can act as an application level proxy between the IP network and the PSTN. Besides these new network elements, supporting IP telephony requires modifications in enterprise firewall to allow dynamic protocol ports to be opened at the clients to send and receive audio and/or signalling and control messages.

problem1. The case study says that different attacks are possible on an IP telephony network. describe in detail the famous attacks on an IP telephony network.

problem2. From the case study we can deduce that there is a need to have vulnerabilities for a hacker to break in the system. Hence, what are the dissimilar significant steps which require to be followed to mitigate the vulnerabilities associated in VoIP network?

problem3. When a hacker performs a DoS attack on IP telephony network, the two major protocols that he may use are namely:

i. ICMP

ii. TCP/SYN

describe how the hacker would use the above protocols to perform his attack.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96283

Have any Question? 


Related Questions in Computer Network & Security

Data information decision please respond to the

"Data Information Decision" Please respond to the following: · With the obvious pace of current technology development, data continues to grow daily. Imagine that you are a Database Administrator for a large organization ...

Assignment elastic and inelastic trafficwrite a three to

Assignment: Elastic and Inelastic Traffic Write a three to four page paper in which you: 1. Outline a plan for the development of an addressing and naming model in an environment of the following scenario: o Ten departme ...

Case projectnbsp law firm companynbsp law firm lincoln

CASE PROJECT:  LAW FIRM Company:  Law Firm: Lincoln Partners, Esq. A law firm has hired you as a Network Security Consultant to help its operations by providing a secure network to support its growth.  The Law firm curre ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Wireless and remote access securitykey assignment

Wireless and Remote Access Security Key Assignment Draft Great progress has been made on the design of the network with the addition of the client and server security models in the previous assignment. With the increasin ...

Assignmentyou have been asked by a local charity retail

Assignment You have been asked by a local charity retail organization to install a network in its downtown office. It currently has seven PCs running Windows XP Home Edition. They are configured as follows: Pentium 4 at ...

Assignmentin this project we will design a network solution

Assignment In this project we will design a network solution that is suitable for a small business. Our business is located in an office park in one floor of a new office building. Our office has all of the modern featur ...

Questions1 describe three factors that help to influence

Questions: 1. Describe three factors that help to influence our nation's focus on natural or man-made disasters. 2. What issues have been raised concerning some of the authorities granted to government agencies in the PA ...

Assignmentthe vice president of sales for your company has

Assignment The Vice President of Sales for your company has asked you for more information on cloud-based office productivity suites. He tells you that the Sales team is often remote and needs to be able to stay connecte ...

Lab assignment- assessment questions1 explain the two

Lab Assignment- Assessment Questions 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? 2. Compare and ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen