ASIC Design and Implementation for VoIP Intrusion Detection /Prevention

碩士 === 國立中正大學 === 電機工程所 === 97 === With pervasion and rapid growth of Internet , the requirements of transmitting Multimedia data on IP network have become larger and larger . VoIP ( Voice over IP ) is one of killer applications in Internet , even it will replace PSTN in the future. Because of scal...

Full description

Bibliographic Details
Main Authors: Hsin-chen Lin, 林信成
Other Authors: Yuan-san Chu
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/07521251455768490642
id ndltd-TW-097CCU05442091
record_format oai_dc
spelling ndltd-TW-097CCU054420912016-05-04T04:26:07Z http://ndltd.ncl.edu.tw/handle/07521251455768490642 ASIC Design and Implementation for VoIP Intrusion Detection /Prevention 應用於VoIP入侵偵測防禦之ASIC設計與實作 Hsin-chen Lin 林信成 碩士 國立中正大學 電機工程所 97 With pervasion and rapid growth of Internet , the requirements of transmitting Multimedia data on IP network have become larger and larger . VoIP ( Voice over IP ) is one of killer applications in Internet , even it will replace PSTN in the future. Because of scalability、openness and simple format,SIP has become the most important signaling protocol for VoIP . Due to SIP is a plaintext format ,it will face many additional threats. Well-known antivirus software “Mcafee Avert Labs” published an article by” McAfee Avert Labs Top 10 Threat Predictions for 2008”, forecasting VoIP Vulnerabilities in 2008 than the 50 percent over 2007, and it pointed out that VoIP technology is still very progressive, but the VoIP defense strategies is lagging far behind.Therefore, the issue of VoIP security is a very serious problem. In this paper, the attack can be detected “Spoofing Attack”, “SIP Flooding Attack”, “Call Hijacking Attack” .. etc. We defense the above attack such as “Stateful Protocol Analysis”. “Stateful Protocol Analysis” most can detect abnormal behavior protocol. We increase the overall throughput for “Stateful Protocol Analysis”, so we increased Traffic Filter, it can be filter out a large number of normal packets in TCP/IP layer. And the entire VoIP IDPS (Intrusion Detection / Prevention System) to enhance the overall throughput and reached a parallel processing in ASIC. Yuan-san Chu 朱元三 2009 學位論文 ; thesis 55 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中正大學 === 電機工程所 === 97 === With pervasion and rapid growth of Internet , the requirements of transmitting Multimedia data on IP network have become larger and larger . VoIP ( Voice over IP ) is one of killer applications in Internet , even it will replace PSTN in the future. Because of scalability、openness and simple format,SIP has become the most important signaling protocol for VoIP . Due to SIP is a plaintext format ,it will face many additional threats. Well-known antivirus software “Mcafee Avert Labs” published an article by” McAfee Avert Labs Top 10 Threat Predictions for 2008”, forecasting VoIP Vulnerabilities in 2008 than the 50 percent over 2007, and it pointed out that VoIP technology is still very progressive, but the VoIP defense strategies is lagging far behind.Therefore, the issue of VoIP security is a very serious problem. In this paper, the attack can be detected “Spoofing Attack”, “SIP Flooding Attack”, “Call Hijacking Attack” .. etc. We defense the above attack such as “Stateful Protocol Analysis”. “Stateful Protocol Analysis” most can detect abnormal behavior protocol. We increase the overall throughput for “Stateful Protocol Analysis”, so we increased Traffic Filter, it can be filter out a large number of normal packets in TCP/IP layer. And the entire VoIP IDPS (Intrusion Detection / Prevention System) to enhance the overall throughput and reached a parallel processing in ASIC.
author2 Yuan-san Chu
author_facet Yuan-san Chu
Hsin-chen Lin
林信成
author Hsin-chen Lin
林信成
spellingShingle Hsin-chen Lin
林信成
ASIC Design and Implementation for VoIP Intrusion Detection /Prevention
author_sort Hsin-chen Lin
title ASIC Design and Implementation for VoIP Intrusion Detection /Prevention
title_short ASIC Design and Implementation for VoIP Intrusion Detection /Prevention
title_full ASIC Design and Implementation for VoIP Intrusion Detection /Prevention
title_fullStr ASIC Design and Implementation for VoIP Intrusion Detection /Prevention
title_full_unstemmed ASIC Design and Implementation for VoIP Intrusion Detection /Prevention
title_sort asic design and implementation for voip intrusion detection /prevention
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/07521251455768490642
work_keys_str_mv AT hsinchenlin asicdesignandimplementationforvoipintrusiondetectionprevention
AT línxìnchéng asicdesignandimplementationforvoipintrusiondetectionprevention
AT hsinchenlin yīngyòngyúvoiprùqīnzhēncèfángyùzhīasicshèjìyǔshízuò
AT línxìnchéng yīngyòngyúvoiprùqīnzhēncèfángyùzhīasicshèjìyǔshízuò
_version_ 1718258122009608192