Learn More
VoIP provides multimedia (audio and video, etc) services through Internet Network. Due to the characteristic of Internet, there are many attacks and threats in Internet, so are VoIP. Therefore, user authentication, confidentiality, and integrity of signaling message, media stream are required for secure communication. TLS and S/MIME are proposed for SIP(More)
This paper proposes a ITU-T X.805 based Vulnerability Analysis Method for developing Security Framework of NGN infrastructure and services. It is derived from ITU-T X.805 and security consulting methods. It provides a holistic approach and a systematic vulnerability analysis view of security model for new network infrastructure and services. As a further(More)
VoIP market is growing fast and will replace a considerable portion of existing PSTN or 2G/3G which is under big trouble with spam calls. In VoIP, spam calls can be occurred more frequently because of its low cost and easy modification. In this paper, we propose user reputation based spam defense architecture which consists of four spam defense techniques.(More)
  • 1