Based on SIP implement VoIP system security testing mechanism
碩士 === 雲林科技大學 === 資訊管理系碩士班 === 96 === In recent years, with advances in IT, modern people living in the use of IT in increasing the proportion, together with the information technology brought about by the convenience, its products and services related to modern life has gradually become an integral...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/95115533506235475132 |
id |
ndltd-TW-096YUNT5396066 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096YUNT53960662015-10-13T11:20:18Z http://ndltd.ncl.edu.tw/handle/95115533506235475132 Based on SIP implement VoIP system security testing mechanism 基於SIP協定實現網路電話系統安全性檢測機制 Zuo-Ren Liou 劉作仁 碩士 雲林科技大學 資訊管理系碩士班 96 In recent years, with advances in IT, modern people living in the use of IT in increasing the proportion, together with the information technology brought about by the convenience, its products and services related to modern life has gradually become an integral part of the life. At the same time, due to the vigorous development of the Internet, in addition to the phone, cellular phone, fax and other means of communication, the other communication tools which developed on the Internet, such as: e-mail, instant messaging and VoIP (Voice over IP, VoIP) and so on, also bring modern people more options to choosing communication medium. Many of the emerging information technology like a double-sided blade, in the community only see that these are often only brought about by information technology facilities of the Department, hardly realize that they hide behind a lot of unknown crisis. For instance, SIP, the most use of the VoIP, is a protocol that designed based on the Internet; it inherited the current available on the Internet vulnerability. In order to solve the information security issue, the more and more vulnerability scanner to be born. The report produced by vulnerability scanner for lack of experience of system managers can only inform the current system has vulnerabilities which might be used, and no way to find the correlation between each vulnerabilities. Therefore, this study uses penetration test and attack tree designing a mechanism to inspect VoIP system security. Managers who are lack of experience forward to helping the system administrator to find out within the organization by the operation of the VoIP system in the existence of leaks, and provide the solution to the leaks. Tung-Ming Koo 古東明 2008 學位論文 ; thesis 77 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 雲林科技大學 === 資訊管理系碩士班 === 96 === In recent years, with advances in IT, modern people living in the use of IT in increasing the proportion, together with the information technology brought about by the convenience, its products and services related to modern life has gradually become an integral part of the life. At the same time, due to the vigorous development of the Internet, in addition to the phone, cellular phone, fax and other means of communication, the other communication tools which developed on the Internet, such as: e-mail, instant messaging and VoIP (Voice over IP, VoIP) and so on, also bring modern people more options to choosing communication medium.
Many of the emerging information technology like a double-sided blade, in the community only see that these are often only brought about by information technology facilities of the Department, hardly realize that they hide behind a lot of unknown crisis. For instance, SIP, the most use of the VoIP, is a protocol that designed based on the Internet; it inherited the current available on the Internet vulnerability. In order to solve the information security issue, the more and more vulnerability scanner to be born. The report produced by vulnerability scanner for lack of experience of system managers can only inform the current system has vulnerabilities which might be used, and no way to find the correlation between each vulnerabilities.
Therefore, this study uses penetration test and attack tree designing a mechanism to inspect VoIP system security. Managers who are lack of experience forward to helping the system administrator to find out within the organization by the operation of the VoIP system in the existence of leaks, and provide the solution to the leaks.
|
author2 |
Tung-Ming Koo |
author_facet |
Tung-Ming Koo Zuo-Ren Liou 劉作仁 |
author |
Zuo-Ren Liou 劉作仁 |
spellingShingle |
Zuo-Ren Liou 劉作仁 Based on SIP implement VoIP system security testing mechanism |
author_sort |
Zuo-Ren Liou |
title |
Based on SIP implement VoIP system security testing mechanism |
title_short |
Based on SIP implement VoIP system security testing mechanism |
title_full |
Based on SIP implement VoIP system security testing mechanism |
title_fullStr |
Based on SIP implement VoIP system security testing mechanism |
title_full_unstemmed |
Based on SIP implement VoIP system security testing mechanism |
title_sort |
based on sip implement voip system security testing mechanism |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/95115533506235475132 |
work_keys_str_mv |
AT zuorenliou basedonsipimplementvoipsystemsecuritytestingmechanism AT liúzuòrén basedonsipimplementvoipsystemsecuritytestingmechanism AT zuorenliou jīyúsipxiédìngshíxiànwǎnglùdiànhuàxìtǒngānquánxìngjiǎncèjīzhì AT liúzuòrén jīyúsipxiédìngshíxiànwǎnglùdiànhuàxìtǒngānquánxìngjiǎncèjīzhì |
_version_ |
1716841513095266304 |