SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Individual Assignment


Fraud monitoring system for voip or ip telephony




         Name: M.Abdullah -Al -Mamun
                   ID# 062507056

            Faculty: Dr. Mashiur Rahman
                 ETE- 605      Sec- 2

                Semester: Spring 2008
                   Date: 15/04/2008
Table of contents



1. Introduction

2. Voice over IP Connections and communications

3. what type of illegality can be occurred

4. What will Fraud management do

5. Deep Packet Inspection

6. PTS Deployment for BTTB

7. Security Operations Services

8. Conclusion

9. Sources and references
Acknowledgments
This document has benefited from review and comment by many experts. I
particularly want to thank, Sandvine International, Dr. Moshiur Rahman and
BTRC for many contributions to improving the quality of this case study. First part
of this document is derived what is VoIP, than what type of illegality can be
occurred and finaly the fraud management system developed and derived by
sandvine international.
Introduction

What is voip:
voIP (pronounced voyp or vip) is the name of a new communications technology
that changes the meaning of the phrase telephone call. VoIP stands for voice
over Internet protocol, and it means “voice transmitted over a computer network.”

Internet protocol (IP) networking is supported by all sorts of networks: corporate,
private, public, cable, and even wireless networks. Don’t be fooled by the
“Internet” part of the acronym. VoIP runs over any type of network. Currently, in
the corporate sector, the private dedicated network option is the preferred type.
For the telecommuter or home user, the hands-down favorite is broadband. You
can access your account on the VoIP network by a desktop telephone, a wireless
IP phone (similar to a cell phone), or the soft screen dial pad of your laptop or
desktop computer.

What is Fraud:
In criminal law, fraud is the crime or offense of deliberately deceiving another in
order to damage them – usually, to obtain property or services unjustly. Fraud
can be accomplished through the aid of forged objects. In the criminal law of
common law jurisdictions it may be called "theft by deception," "larceny by trick,"
"larceny by fraud and deception" or something similar.


History of VoIP:

Voice over Internet Protocol has been a subject of interest almost since the first
computer network. By 1973, voice was being transmitted over the early Internet.
The technology for transmitting voice conversations over the Internet has been
available to end-users since at least the early 1980s. In 1996, a shrink-wrapped
software product called Vocaltec Internet Phone (release 4) provided VoIP along
with extra features such as voice mail and caller ID. However, it did not offer a
gateway to the PSTN, so it was only possible to speak to other Vocaltec Internet
Phone users. In 1997, Level 3 began development of its first soft switch (a term
they invented in 1998); soft switches were designed to replace traditional
hardware telephone switches by serving as gateways between telephone
networks.
Voice over IP Connections and communications:

Voice over IP – the transmission of voice over packet-switched IP networks – is
one of the most important emerging trends in telecommunications. As with many
new technologies, VOIP introduces both security risks and opportunities. VOIP
has a very different architecture than traditional circuit-based telephony, and
these differences result in significant security issues. Lower cost and greater
flexibility are among the promises of VOIP for the enterprise, but VOIP should not
be installed without careful consideration of the security problems introduced.
Administrators may mistakenly assume that since digitized voice travels in
packets, they can simply plug VOIP components into their already-secured
networks and remain secure. However, the process is not that simple. This
publication explains the challenges of VOIP security for agency and commercial
users of VOIP, and outlines steps needed to help secure an organization’s VOIP
network. VOIP security considerations for the public switched telephone network
(PSTN) are largely outside the scope of this document.


VOIP systems take a wide variety of forms, including traditional telephone
handsets, conferencing units, and mobile units. In addition to end-user
equipment, VOIP systems include a variety of other components, including call
processors/call managers, gateways, routers, firewalls, and protocols. Most of
these components have counterparts used in data networks, but the performance
demands of VOIP mean that ordinary network software and hardware must be
supplemented with special VOIP components. Not only does VOIP require higher
performance than most data systems, critical services, such as Emergency 911
must be accommodated. One of the main sources of confusion for those new to
VOIP is the (natural) assumption that because digitized voice travels in packets
just like other data, existing network architectures and tools can be used without
change. However, VOIP adds a number of complications to existing network
technology, and these problems are magnified by security considerations.


Quality of Service (QoS) is fundamental to the operation of a VOIP network that
meets users’ quality expectations. However, the implementation of various
security measures can cause a marked deterioration in QoS. These
complications range from firewalls delaying or blocking call setups to encryption-
produced latency and delay variation (jitter). Because of the time-critical nature of
VOIP, and its low tolerance for disruption and packet loss, many security
measures implemented in traditional data networks are simply not applicable to
VOIP in their current form; firewalls, intrusion detection systems, and other
components must be specialized for VOIP. Current VOIP systems use either a
proprietary protocol, or one of two standards, H.323 and the Session Initiation
Protocol (SIP). Although SIP seems to be gaining in popularity, neither of these
protocols has become dominant in the market yet, so it often makes sense to
incorporate components that can support both. In addition to SIP and H.323
there are also two further standards, media gateway control protocol (MGCP)
and Megaco/H.248, which may be used in large deployments for gateway
decomposition. These standards may be used to ease message handling with
media gateways, or on the other hand they can easily be used to implement
terminals without any intelligence, similar to today’s phones connected to a PBX
using a stimulus protocol.


Packet networks depend for their successful operation on a large number of
configurable parameters: IP and MAC (physical) addresses of voice terminals,
addresses of routers and firewalls, and VOIP specific software such as call
processing components (call managers) and other programs used to place and
route calls. Many of these network parameters are established dynamically every
time network components are restarted, or when a VOIP telephone is restarted
or added to the network. Because there are so many places in a network with
dynamically configurable parameters, intruders have a wide array of potentially
vulnerable points to attack.


Firewalls are a staple of security in today’s IP networks. Whether protecting a
LAN or WAN, encapsulating a DMZ, or just protecting a single computer, a
firewall is usually the first line of defense against would be attackers. Firewalls
work by blocking traffic deemed to be invasive, intrusive, or just plain malicious
from flowing through them. Acceptable traffic is determined by a set of rules
programmed into the firewall by the network administrator. The introduction of
firewalls to the VOIP network complicates several aspects of VOIP, most notably
dynamic port trafficking and call setup procedures. Network Address Translation
(NAT) is a powerful tool that can be used to hide internal network addresses and
enable several endpoints within a LAN to use the same (external) IP address.
The benefits of NATs come at a price. For one thing, an attempt to make a call
into the network becomes very complex when a NAT is introduced. The situation
is somewhat similar to an office building where mail is addressed with
employees’ names and the building address, but internal addressing is handled
by the company mailroom. There are also several issues associated with the
transmission of voice data across the NAT, including an incompatibility with
IPsec. Although the use of NATs may be reduced as IPv6 is adopted, they will
remain a common component in networks for years to come, so VOIP systems
must deal with the complexities of NATs.



Firewalls, gateways, and other such devices can also help keep intruders from
compromising a network. However, firewalls are no defense against an internal
hacker. Another layer of defense is necessary at the protocol level to protect the
voice traffic. In VOIP, as in data networks, this can be accomplished by
encrypting the packets at the IP level using IPsec, or at the application level with
secure RTP, the real-time transport protocol (RFC 3550). However, several
factors, including the expansion of packet size, ciphering latency, and a lack of
QoS urgency in the cryptographic engine itself can cause an excessive amount
of latency in the VOIP packet delivery. This leads to degraded voice quality,
again highlighting the tradeoff between security and voice quality, and
emphasizing a need for speed.

VOIP is still an emerging technology, so it is difficult to develop a complete
picture of what a mature worldwide VOIP network will one day look like. As the
emergence of SIP has shown, new technologies and new protocol designs have
the ability to radically change VOIP. Although there are currently many different
architectures and protocols to choose from, eventually a true standard will
emerge. Unless a widely used open standard emerges, solutions will be likely to
include a number of proprietary elements, which can limit an enterprise’s future
choices. The most widely used of the competing standards are SIP and H.323.
Some observers believe that SIP will become dominant. Major vendors are
investing an increasing portion of their development effort into SIP products. An
extension of SIP, the SIP for Instant Messaging and Presence Leveraging
Extensions (SIMPLE) standard, is being incorporated into products that support
Instant Messaging. Until a truly dominant standard emerges, organizations
moving to VOIP should consider gateways and other network elements that
support both H.323 and SIP. Such a strategy helps to ensure a stable and robust
VOIP network in the years that come, no matter which protocol prevails.
Designing, deploying, and securely operating a VOIP network is a complex effort
that requires careful preparation. The integration of a VOIP system into an
already congested or overburdened network could create serious problems for
the organization. There is no easy “one size fits all” solution to the issues
discussed in these chapters. An organization must investigate carefully how its
network is laid out and which solution fits its needs best. In recent years, a new
way to connect to the PSTN has cropped up. Companies are using PRIs, T1, and
other technologies to connect to the PSTN, and then resell those connections to
consumers. The users connect to the companies offering these connections
through Voice over IP technologies. By so doing, we can skip dealing with LECs
completely. This service is called Origination and Termination. Through these
services, we can receive a real telephone number, with the area code depending
on what the provider has access to. Not all providers can offer numbers in every
locality. This means that our number could be long distance from our next-door
neighbor, yet local to someone in the next state. The advantage of this, however,
is that the provider will route most of the calls over their VoIP infrastructure and
will then use the PSTN when they get to their most local point at the receiving
end, which can mean that long distance charges are dramatically reduced. If we
call a variety of countries, states or cities it can be worthwhile to research a
provider that offers local PSTN access to the areas we call most.

The rates per minute are usually very attractive. Often, long distance is at the
same rate as local calls. One thing to watch out for is that some providers charge
for incoming minutes, much like on a cellular telephone, and some providers also
charge for local calls. Another thing to be aware of is that some providers require
that you use their Analog Terminal Adapter (ATA). This means that they will send
you a box that you plug into the Internet, which speaks Voice over IP. Then, you
have a POTS line to connect a phone (or Asterisk) to. Voice over IP makes
sense in many installations. But for the quality to be acceptable, a reliable
Internet connection with low latency is required. Another thing to watch out for is
jitter. Jitter refers to the variation in latency from packet to packet. Most protocols
can handle latency a lot better if it is constant throughout the call.



what type of illegality can be occurred:

   •   Illegal generating and terminating of VoIP calls
   •   Less QOS
   •   Network Traffic jamming


What will Fraud management do:

   •   Stop illegal VoIP usage
   •   Allow licensed VoIP usage
   •   Monitor VoIP services
   •   Set the traffic policy for better VoIP service
   •   CDR for usage billing

Deep Packet Inspection:

Deep Packet Inspection (DPI) is a packet filtering technology that examines not
only the header part but also the data part of a through-passing packet,
searching for non-protocol compliance or predefined criteria to decide if the
packet can pass.

This is in contrast to shallow packet inspection (usually called just packet
inspection) which just checks the header portion of a packet.


DPI-based policy solutions offer a truly flexible approach to manage today’s VoIP
based upon the national regulatory requirements. The leading provider of
intelligent broadband network solutions for the industry’s most powerful platform
enabling per-subscriber DPI-based policy solutions to solve both business and
technology challenges in the world’s largest broadband networks
fig 1: DPI inspection




              •   Proven application identification and traffic shaping
              •   Flexible network deployment options
              •   Advanced reporting including VoIP analysis
              •   Recognize True Scalability
              •   Leading Redundancy Options
              •   Seamless Integration
              •   Gain Control and Visibility

Enhanced DPI Signature Analysis: Recognizes protocol identifiers anywhere
within a TCP packet, across multiple TCP packets and even using UDP control
messages. Flexible processing ensures that we can address new techniques as
application protocols continue to evolve in the future. Real-time Behavioral
Analysis: characterizes traffic by application categories through a real-time
comparison with defined behavior thresholds. Service providers can immediately
control unwanted traffic behavior that is affecting reliable network operation and
service quality.
fig 2: Bandwidth by protocol




fig 3: VoIP Bandwidth by protocol
fig 3: VoIP call by provider by protocol




PTS Deployment for BTTB:
For a customized solution for BTTB we will need to know
1. The network topology
2. The bandwidth
3. The exact solution requirements
Policy Traffic Switch (PTS) enables service providers to apply different traffic
policies for voice calls originating or terminating on the public network.

Restrict selective VoIP services that provide domestic or international
connections to the PSTN network
fig 5:Detailed Drill Down, Network Provider, VoIP Provider, Subscriber




Security Operations Services:

    • Attack monitoring, analysis, and classification: determines the nature of
      the attack and identifies specific remedies in real time.

    • Behavior detection and signature updates:
      may be automated or as designated by the service provider.

    • Security research and test lab:
      delivers in depth traffic analysis to discover hidden and emerging threats,
      provides 24X7 monitoring and attack response.

Cans spam:
Spam trojan mitigation arms service providers with a network-based approach to
eliminating all malicious worm and spam trojan traffic on service provider
networks

Kills worms:
Network-based worm mitigation attacks worms at all five stages of their
development, effectively shutting down worm/DoS traffic.
Prevents DoS attacks:
Network-based DoS mitigation protects the subscriber experience by filtering
DoS attacks and eliminating malicious traffic while allowing all legitimate requests
to proceed through the network.

Defends servers:
Protects inherently vulnerable mail servers and prevents DNS poisoning by
stopping illegitimate requests before they become a threat to subscribers and the
network.

Cleanses network:
Security Operations team provides ongoing analysis to ensure optimal network
health and distant warning in the event of an attack. Sandvine’s visibility into
global service provider networks acts as a 'network telescope,' uncovering
malicious traffic threats before they spread around the globe.


Conclusion:

If we consider the physical security is managed than this web base solution is a
smart monitoring and control tool for BTRC or any other lawful authority/

This can be the ultimate solution for VoIP management in Bangladesh.

DPI based solution provides the total transparency needed to manage VoIP
according to set policies.

Policy Traffic Switch can stop the illegal use of VoIP while optimizing bandwidth
for licensed VoIP in Bangladesh.
Sources:
IETF http://www.ietf.org
SIP Forum http://www.sipforum.org
3rd Generation Partnership Project http://www.3gpp.org
SIP Working Group http://www.softarmor.com/sipwg
SIPPING Working Group http://www.softarmor.com/sipping
ETSI TISPAN http://portal.etsi.org/tispan

References:
Ericsson – ‘Combinational services – the pragmatic first step toward all-IP’,
published in Ericsson Review No.2, 2003
Sandvine intervational

Mais conteúdo relacionado

Mais procurados

Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...guestbda3307
 
The known unknowns of SS7 and beyond
The known unknowns of SS7 and beyondThe known unknowns of SS7 and beyond
The known unknowns of SS7 and beyondSiddharth Rao
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowDan York
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
Public wifi architecture_12072017
Public wifi architecture_12072017Public wifi architecture_12072017
Public wifi architecture_12072017Saurabh Verma
 
Wi fi Technilogy
Wi fi TechnilogyWi fi Technilogy
Wi fi Technilogythasnim1304
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...Lindsey Landolfi
 
Frost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketFrost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketNetMotion Wireless
 
smart ms voip for lte networks
smart ms voip for lte networkssmart ms voip for lte networks
smart ms voip for lte networksStreamWIDE
 
Securing IP Fax - A New Standard Approach
Securing IP Fax - A New Standard ApproachSecuring IP Fax - A New Standard Approach
Securing IP Fax - A New Standard ApproachJames Rafferty
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
 
Security lte environment_cook_zuong
Security lte environment_cook_zuongSecurity lte environment_cook_zuong
Security lte environment_cook_zuongHoanPeterDuongPronou
 
Global Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorsGlobal Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorspaul young cpa, cga
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISIJNSA Journal
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopFatih Ozavci
 
Presentation on 5G security
Presentation on 5G securityPresentation on 5G security
Presentation on 5G securityRanjitUpadhyay4
 

Mais procurados (20)

Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...
 
The known unknowns of SS7 and beyond
The known unknowns of SS7 and beyondThe known unknowns of SS7 and beyond
The known unknowns of SS7 and beyond
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Public wifi architecture_12072017
Public wifi architecture_12072017Public wifi architecture_12072017
Public wifi architecture_12072017
 
Wi fi Technilogy
Wi fi TechnilogyWi fi Technilogy
Wi fi Technilogy
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
VoIP – vulnerabilities and attacks
VoIP – vulnerabilities and attacksVoIP – vulnerabilities and attacks
VoIP – vulnerabilities and attacks
 
Frost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketFrost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products Market
 
smart ms voip for lte networks
smart ms voip for lte networkssmart ms voip for lte networks
smart ms voip for lte networks
 
Securing IP Fax - A New Standard Approach
Securing IP Fax - A New Standard ApproachSecuring IP Fax - A New Standard Approach
Securing IP Fax - A New Standard Approach
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
Security lte environment_cook_zuong
Security lte environment_cook_zuongSecurity lte environment_cook_zuong
Security lte environment_cook_zuong
 
Global Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorsGlobal Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendors
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
 
Juniper sa-sslvpn
Juniper sa-sslvpnJuniper sa-sslvpn
Juniper sa-sslvpn
 
Presentation on 5G security
Presentation on 5G securityPresentation on 5G security
Presentation on 5G security
 

Destaque

Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksRohan Fernandes
 
Vineyard Networks Product Overview
Vineyard Networks Product OverviewVineyard Networks Product Overview
Vineyard Networks Product Overviewlaurenjthomson
 
Traffic Management, DPI, Internet Offload Gateway
Traffic Management, DPI, Internet Offload GatewayTraffic Management, DPI, Internet Offload Gateway
Traffic Management, DPI, Internet Offload GatewayContinuous Computing
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementIlya Mikov
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyIxia
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)military
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDaniel Vinyar
 
Attachment report IAT
Attachment report IATAttachment report IAT
Attachment report IATitronics
 
23 Amazing Lessons Learned From Interviewing The World's Top Developers!
23 Amazing Lessons Learned From Interviewing The World's Top Developers!23 Amazing Lessons Learned From Interviewing The World's Top Developers!
23 Amazing Lessons Learned From Interviewing The World's Top Developers!Usersnap
 
Attachment report Victor
Attachment report VictorAttachment report Victor
Attachment report VictorNg'eno Victor
 
Field attachment report (alie chibwe)
Field attachment report (alie chibwe)Field attachment report (alie chibwe)
Field attachment report (alie chibwe)AlieChibwe
 
Report format
Report formatReport format
Report formatzirram
 
Let Non-Developers Develop your Site. Manu Raivio
Let Non-Developers Develop your Site. Manu RaivioLet Non-Developers Develop your Site. Manu Raivio
Let Non-Developers Develop your Site. Manu RaivioFuture Insights
 
Become a Better Engineer Through Writing
Become a Better Engineer Through WritingBecome a Better Engineer Through Writing
Become a Better Engineer Through WritingIntuit Inc.
 

Destaque (19)

Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacks
 
Vineyard Networks Product Overview
Vineyard Networks Product OverviewVineyard Networks Product Overview
Vineyard Networks Product Overview
 
Traffic Management, DPI, Internet Offload Gateway
Traffic Management, DPI, Internet Offload GatewayTraffic Management, DPI, Internet Offload Gateway
Traffic Management, DPI, Internet Offload Gateway
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic management
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
 
Attachment report IAT
Attachment report IATAttachment report IAT
Attachment report IAT
 
23 Amazing Lessons Learned From Interviewing The World's Top Developers!
23 Amazing Lessons Learned From Interviewing The World's Top Developers!23 Amazing Lessons Learned From Interviewing The World's Top Developers!
23 Amazing Lessons Learned From Interviewing The World's Top Developers!
 
Attachment report Victor
Attachment report VictorAttachment report Victor
Attachment report Victor
 
INTERNSHIP REPORT
INTERNSHIP REPORTINTERNSHIP REPORT
INTERNSHIP REPORT
 
Attachment report
Attachment report Attachment report
Attachment report
 
Field attachment report (alie chibwe)
Field attachment report (alie chibwe)Field attachment report (alie chibwe)
Field attachment report (alie chibwe)
 
Report format
Report formatReport format
Report format
 
Industrial Training Report-1
Industrial Training Report-1Industrial Training Report-1
Industrial Training Report-1
 
Let Non-Developers Develop your Site. Manu Raivio
Let Non-Developers Develop your Site. Manu RaivioLet Non-Developers Develop your Site. Manu Raivio
Let Non-Developers Develop your Site. Manu Raivio
 
The Programmer
The ProgrammerThe Programmer
The Programmer
 
Become a Better Engineer Through Writing
Become a Better Engineer Through WritingBecome a Better Engineer Through Writing
Become a Better Engineer Through Writing
 

Semelhante a Abdullah Al Mamun 062507056

AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxdaniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)mashiur
 
VoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfVoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfOkan YILDIZ
 
Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)mashiur
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999TomParker
 
Paul final voip
Paul final voipPaul final voip
Paul final voipPaul Fares
 
why-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdfwhy-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdftardis2
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedureijsrd.com
 
Voip
VoipVoip
VoipPTCL
 
Shahnshah Sarker 072802556
Shahnshah Sarker  072802556Shahnshah Sarker  072802556
Shahnshah Sarker 072802556mashiur
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...csandit
 
Sajjad Hossain 071297056
Sajjad Hossain  071297056Sajjad Hossain  071297056
Sajjad Hossain 071297056mashiur
 
introduction to voip
introduction to voipintroduction to voip
introduction to voipdeeq maxamed
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
 

Semelhante a Abdullah Al Mamun 062507056 (20)

AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
 
How does VOIP work diagram
How does VOIP work diagramHow does VOIP work diagram
How does VOIP work diagram
 
Voip on Wimax
Voip on WimaxVoip on Wimax
Voip on Wimax
 
VoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfVoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdf
 
Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)
 
Kartik Powerpoit
Kartik PowerpoitKartik Powerpoit
Kartik Powerpoit
 
VoIP Research Paper
VoIP Research PaperVoIP Research Paper
VoIP Research Paper
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
Paul final voip
Paul final voipPaul final voip
Paul final voip
 
why-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdfwhy-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdf
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
 
Voip
VoipVoip
Voip
 
Shahnshah Sarker 072802556
Shahnshah Sarker  072802556Shahnshah Sarker  072802556
Shahnshah Sarker 072802556
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
Sajjad Hossain 071297056
Sajjad Hossain  071297056Sajjad Hossain  071297056
Sajjad Hossain 071297056
 
introduction to voip
introduction to voipintroduction to voip
introduction to voip
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 

Mais de mashiur

Touseef Kamal062159056
Touseef Kamal062159056Touseef Kamal062159056
Touseef Kamal062159056mashiur
 
Towfique 063382056
Towfique 063382056Towfique 063382056
Towfique 063382056mashiur
 
Tasmiah Binte Zilani (071649556)
Tasmiah Binte Zilani (071649556)Tasmiah Binte Zilani (071649556)
Tasmiah Binte Zilani (071649556)mashiur
 
Sk M Rezaul Karim 072899056
Sk M Rezaul Karim  072899056Sk M Rezaul Karim  072899056
Sk M Rezaul Karim 072899056mashiur
 
Syeda Farhana Shirin Id#062681056
Syeda Farhana Shirin  Id#062681056Syeda Farhana Shirin  Id#062681056
Syeda Farhana Shirin Id#062681056mashiur
 
Shihab Uddin 062483056
Shihab Uddin  062483056Shihab Uddin  062483056
Shihab Uddin 062483056mashiur
 
Shakhawat Hossain (062364056)
Shakhawat Hossain (062364056)Shakhawat Hossain (062364056)
Shakhawat Hossain (062364056)mashiur
 
Shahriar Khaled 062473056
Shahriar Khaled 062473056Shahriar Khaled 062473056
Shahriar Khaled 062473056mashiur
 
Shah M Saklaen 072809056
Shah M Saklaen 072809056Shah M Saklaen 072809056
Shah M Saklaen 072809056mashiur
 
Sayef Almaji (063170056)
Sayef Almaji (063170056)Sayef Almaji (063170056)
Sayef Almaji (063170056)mashiur
 
Shah Md Zobair(063560056)
Shah Md Zobair(063560056)Shah Md Zobair(063560056)
Shah Md Zobair(063560056)mashiur
 
Shahed.Anwar 061708556
Shahed.Anwar 061708556Shahed.Anwar 061708556
Shahed.Anwar 061708556mashiur
 
S K Ashikur Rahman (072874556)
S K Ashikur Rahman (072874556)S K Ashikur Rahman (072874556)
S K Ashikur Rahman (072874556)mashiur
 
Rumana Rashid Riti (Id 053 507 056)
Rumana Rashid Riti (Id 053 507 056)Rumana Rashid Riti (Id 053 507 056)
Rumana Rashid Riti (Id 053 507 056)mashiur
 
Rumana Akther Id#072842056
Rumana Akther Id#072842056Rumana Akther Id#072842056
Rumana Akther Id#072842056mashiur
 
Ridhwana Mohammad (071403056)
Ridhwana Mohammad (071403056)Ridhwana Mohammad (071403056)
Ridhwana Mohammad (071403056)mashiur
 
Riaz Rahman (072878056)
Riaz Rahman (072878056)Riaz Rahman (072878056)
Riaz Rahman (072878056)mashiur
 
Rehana Zakia (063411056)
Rehana Zakia (063411056)Rehana Zakia (063411056)
Rehana Zakia (063411056)mashiur
 
Razin Kabir (063452556)
Razin Kabir (063452556)Razin Kabir (063452556)
Razin Kabir (063452556)mashiur
 
Ranjan Kumar Das (071503056)
Ranjan Kumar Das (071503056)Ranjan Kumar Das (071503056)
Ranjan Kumar Das (071503056)mashiur
 

Mais de mashiur (20)

Touseef Kamal062159056
Touseef Kamal062159056Touseef Kamal062159056
Touseef Kamal062159056
 
Towfique 063382056
Towfique 063382056Towfique 063382056
Towfique 063382056
 
Tasmiah Binte Zilani (071649556)
Tasmiah Binte Zilani (071649556)Tasmiah Binte Zilani (071649556)
Tasmiah Binte Zilani (071649556)
 
Sk M Rezaul Karim 072899056
Sk M Rezaul Karim  072899056Sk M Rezaul Karim  072899056
Sk M Rezaul Karim 072899056
 
Syeda Farhana Shirin Id#062681056
Syeda Farhana Shirin  Id#062681056Syeda Farhana Shirin  Id#062681056
Syeda Farhana Shirin Id#062681056
 
Shihab Uddin 062483056
Shihab Uddin  062483056Shihab Uddin  062483056
Shihab Uddin 062483056
 
Shakhawat Hossain (062364056)
Shakhawat Hossain (062364056)Shakhawat Hossain (062364056)
Shakhawat Hossain (062364056)
 
Shahriar Khaled 062473056
Shahriar Khaled 062473056Shahriar Khaled 062473056
Shahriar Khaled 062473056
 
Shah M Saklaen 072809056
Shah M Saklaen 072809056Shah M Saklaen 072809056
Shah M Saklaen 072809056
 
Sayef Almaji (063170056)
Sayef Almaji (063170056)Sayef Almaji (063170056)
Sayef Almaji (063170056)
 
Shah Md Zobair(063560056)
Shah Md Zobair(063560056)Shah Md Zobair(063560056)
Shah Md Zobair(063560056)
 
Shahed.Anwar 061708556
Shahed.Anwar 061708556Shahed.Anwar 061708556
Shahed.Anwar 061708556
 
S K Ashikur Rahman (072874556)
S K Ashikur Rahman (072874556)S K Ashikur Rahman (072874556)
S K Ashikur Rahman (072874556)
 
Rumana Rashid Riti (Id 053 507 056)
Rumana Rashid Riti (Id 053 507 056)Rumana Rashid Riti (Id 053 507 056)
Rumana Rashid Riti (Id 053 507 056)
 
Rumana Akther Id#072842056
Rumana Akther Id#072842056Rumana Akther Id#072842056
Rumana Akther Id#072842056
 
Ridhwana Mohammad (071403056)
Ridhwana Mohammad (071403056)Ridhwana Mohammad (071403056)
Ridhwana Mohammad (071403056)
 
Riaz Rahman (072878056)
Riaz Rahman (072878056)Riaz Rahman (072878056)
Riaz Rahman (072878056)
 
Rehana Zakia (063411056)
Rehana Zakia (063411056)Rehana Zakia (063411056)
Rehana Zakia (063411056)
 
Razin Kabir (063452556)
Razin Kabir (063452556)Razin Kabir (063452556)
Razin Kabir (063452556)
 
Ranjan Kumar Das (071503056)
Ranjan Kumar Das (071503056)Ranjan Kumar Das (071503056)
Ranjan Kumar Das (071503056)
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Abdullah Al Mamun 062507056

  • 1. Individual Assignment Fraud monitoring system for voip or ip telephony Name: M.Abdullah -Al -Mamun ID# 062507056 Faculty: Dr. Mashiur Rahman ETE- 605 Sec- 2 Semester: Spring 2008 Date: 15/04/2008
  • 2. Table of contents 1. Introduction 2. Voice over IP Connections and communications 3. what type of illegality can be occurred 4. What will Fraud management do 5. Deep Packet Inspection 6. PTS Deployment for BTTB 7. Security Operations Services 8. Conclusion 9. Sources and references
  • 3. Acknowledgments This document has benefited from review and comment by many experts. I particularly want to thank, Sandvine International, Dr. Moshiur Rahman and BTRC for many contributions to improving the quality of this case study. First part of this document is derived what is VoIP, than what type of illegality can be occurred and finaly the fraud management system developed and derived by sandvine international.
  • 4. Introduction What is voip: voIP (pronounced voyp or vip) is the name of a new communications technology that changes the meaning of the phrase telephone call. VoIP stands for voice over Internet protocol, and it means “voice transmitted over a computer network.” Internet protocol (IP) networking is supported by all sorts of networks: corporate, private, public, cable, and even wireless networks. Don’t be fooled by the “Internet” part of the acronym. VoIP runs over any type of network. Currently, in the corporate sector, the private dedicated network option is the preferred type. For the telecommuter or home user, the hands-down favorite is broadband. You can access your account on the VoIP network by a desktop telephone, a wireless IP phone (similar to a cell phone), or the soft screen dial pad of your laptop or desktop computer. What is Fraud: In criminal law, fraud is the crime or offense of deliberately deceiving another in order to damage them – usually, to obtain property or services unjustly. Fraud can be accomplished through the aid of forged objects. In the criminal law of common law jurisdictions it may be called "theft by deception," "larceny by trick," "larceny by fraud and deception" or something similar. History of VoIP: Voice over Internet Protocol has been a subject of interest almost since the first computer network. By 1973, voice was being transmitted over the early Internet. The technology for transmitting voice conversations over the Internet has been available to end-users since at least the early 1980s. In 1996, a shrink-wrapped software product called Vocaltec Internet Phone (release 4) provided VoIP along with extra features such as voice mail and caller ID. However, it did not offer a gateway to the PSTN, so it was only possible to speak to other Vocaltec Internet Phone users. In 1997, Level 3 began development of its first soft switch (a term they invented in 1998); soft switches were designed to replace traditional hardware telephone switches by serving as gateways between telephone networks.
  • 5. Voice over IP Connections and communications: Voice over IP – the transmission of voice over packet-switched IP networks – is one of the most important emerging trends in telecommunications. As with many new technologies, VOIP introduces both security risks and opportunities. VOIP has a very different architecture than traditional circuit-based telephony, and these differences result in significant security issues. Lower cost and greater flexibility are among the promises of VOIP for the enterprise, but VOIP should not be installed without careful consideration of the security problems introduced. Administrators may mistakenly assume that since digitized voice travels in packets, they can simply plug VOIP components into their already-secured networks and remain secure. However, the process is not that simple. This publication explains the challenges of VOIP security for agency and commercial users of VOIP, and outlines steps needed to help secure an organization’s VOIP network. VOIP security considerations for the public switched telephone network (PSTN) are largely outside the scope of this document. VOIP systems take a wide variety of forms, including traditional telephone handsets, conferencing units, and mobile units. In addition to end-user equipment, VOIP systems include a variety of other components, including call processors/call managers, gateways, routers, firewalls, and protocols. Most of these components have counterparts used in data networks, but the performance demands of VOIP mean that ordinary network software and hardware must be supplemented with special VOIP components. Not only does VOIP require higher performance than most data systems, critical services, such as Emergency 911 must be accommodated. One of the main sources of confusion for those new to VOIP is the (natural) assumption that because digitized voice travels in packets just like other data, existing network architectures and tools can be used without change. However, VOIP adds a number of complications to existing network technology, and these problems are magnified by security considerations. Quality of Service (QoS) is fundamental to the operation of a VOIP network that meets users’ quality expectations. However, the implementation of various security measures can cause a marked deterioration in QoS. These complications range from firewalls delaying or blocking call setups to encryption- produced latency and delay variation (jitter). Because of the time-critical nature of VOIP, and its low tolerance for disruption and packet loss, many security measures implemented in traditional data networks are simply not applicable to VOIP in their current form; firewalls, intrusion detection systems, and other components must be specialized for VOIP. Current VOIP systems use either a proprietary protocol, or one of two standards, H.323 and the Session Initiation Protocol (SIP). Although SIP seems to be gaining in popularity, neither of these protocols has become dominant in the market yet, so it often makes sense to incorporate components that can support both. In addition to SIP and H.323
  • 6. there are also two further standards, media gateway control protocol (MGCP) and Megaco/H.248, which may be used in large deployments for gateway decomposition. These standards may be used to ease message handling with media gateways, or on the other hand they can easily be used to implement terminals without any intelligence, similar to today’s phones connected to a PBX using a stimulus protocol. Packet networks depend for their successful operation on a large number of configurable parameters: IP and MAC (physical) addresses of voice terminals, addresses of routers and firewalls, and VOIP specific software such as call processing components (call managers) and other programs used to place and route calls. Many of these network parameters are established dynamically every time network components are restarted, or when a VOIP telephone is restarted or added to the network. Because there are so many places in a network with dynamically configurable parameters, intruders have a wide array of potentially vulnerable points to attack. Firewalls are a staple of security in today’s IP networks. Whether protecting a LAN or WAN, encapsulating a DMZ, or just protecting a single computer, a firewall is usually the first line of defense against would be attackers. Firewalls work by blocking traffic deemed to be invasive, intrusive, or just plain malicious from flowing through them. Acceptable traffic is determined by a set of rules programmed into the firewall by the network administrator. The introduction of firewalls to the VOIP network complicates several aspects of VOIP, most notably dynamic port trafficking and call setup procedures. Network Address Translation (NAT) is a powerful tool that can be used to hide internal network addresses and enable several endpoints within a LAN to use the same (external) IP address. The benefits of NATs come at a price. For one thing, an attempt to make a call into the network becomes very complex when a NAT is introduced. The situation is somewhat similar to an office building where mail is addressed with employees’ names and the building address, but internal addressing is handled by the company mailroom. There are also several issues associated with the transmission of voice data across the NAT, including an incompatibility with IPsec. Although the use of NATs may be reduced as IPv6 is adopted, they will remain a common component in networks for years to come, so VOIP systems must deal with the complexities of NATs. Firewalls, gateways, and other such devices can also help keep intruders from compromising a network. However, firewalls are no defense against an internal hacker. Another layer of defense is necessary at the protocol level to protect the voice traffic. In VOIP, as in data networks, this can be accomplished by encrypting the packets at the IP level using IPsec, or at the application level with
  • 7. secure RTP, the real-time transport protocol (RFC 3550). However, several factors, including the expansion of packet size, ciphering latency, and a lack of QoS urgency in the cryptographic engine itself can cause an excessive amount of latency in the VOIP packet delivery. This leads to degraded voice quality, again highlighting the tradeoff between security and voice quality, and emphasizing a need for speed. VOIP is still an emerging technology, so it is difficult to develop a complete picture of what a mature worldwide VOIP network will one day look like. As the emergence of SIP has shown, new technologies and new protocol designs have the ability to radically change VOIP. Although there are currently many different architectures and protocols to choose from, eventually a true standard will emerge. Unless a widely used open standard emerges, solutions will be likely to include a number of proprietary elements, which can limit an enterprise’s future choices. The most widely used of the competing standards are SIP and H.323. Some observers believe that SIP will become dominant. Major vendors are investing an increasing portion of their development effort into SIP products. An extension of SIP, the SIP for Instant Messaging and Presence Leveraging Extensions (SIMPLE) standard, is being incorporated into products that support Instant Messaging. Until a truly dominant standard emerges, organizations moving to VOIP should consider gateways and other network elements that support both H.323 and SIP. Such a strategy helps to ensure a stable and robust VOIP network in the years that come, no matter which protocol prevails. Designing, deploying, and securely operating a VOIP network is a complex effort that requires careful preparation. The integration of a VOIP system into an already congested or overburdened network could create serious problems for the organization. There is no easy “one size fits all” solution to the issues discussed in these chapters. An organization must investigate carefully how its network is laid out and which solution fits its needs best. In recent years, a new way to connect to the PSTN has cropped up. Companies are using PRIs, T1, and other technologies to connect to the PSTN, and then resell those connections to consumers. The users connect to the companies offering these connections through Voice over IP technologies. By so doing, we can skip dealing with LECs completely. This service is called Origination and Termination. Through these services, we can receive a real telephone number, with the area code depending on what the provider has access to. Not all providers can offer numbers in every locality. This means that our number could be long distance from our next-door neighbor, yet local to someone in the next state. The advantage of this, however, is that the provider will route most of the calls over their VoIP infrastructure and will then use the PSTN when they get to their most local point at the receiving end, which can mean that long distance charges are dramatically reduced. If we call a variety of countries, states or cities it can be worthwhile to research a provider that offers local PSTN access to the areas we call most. The rates per minute are usually very attractive. Often, long distance is at the same rate as local calls. One thing to watch out for is that some providers charge
  • 8. for incoming minutes, much like on a cellular telephone, and some providers also charge for local calls. Another thing to be aware of is that some providers require that you use their Analog Terminal Adapter (ATA). This means that they will send you a box that you plug into the Internet, which speaks Voice over IP. Then, you have a POTS line to connect a phone (or Asterisk) to. Voice over IP makes sense in many installations. But for the quality to be acceptable, a reliable Internet connection with low latency is required. Another thing to watch out for is jitter. Jitter refers to the variation in latency from packet to packet. Most protocols can handle latency a lot better if it is constant throughout the call. what type of illegality can be occurred: • Illegal generating and terminating of VoIP calls • Less QOS • Network Traffic jamming What will Fraud management do: • Stop illegal VoIP usage • Allow licensed VoIP usage • Monitor VoIP services • Set the traffic policy for better VoIP service • CDR for usage billing Deep Packet Inspection: Deep Packet Inspection (DPI) is a packet filtering technology that examines not only the header part but also the data part of a through-passing packet, searching for non-protocol compliance or predefined criteria to decide if the packet can pass. This is in contrast to shallow packet inspection (usually called just packet inspection) which just checks the header portion of a packet. DPI-based policy solutions offer a truly flexible approach to manage today’s VoIP based upon the national regulatory requirements. The leading provider of intelligent broadband network solutions for the industry’s most powerful platform enabling per-subscriber DPI-based policy solutions to solve both business and technology challenges in the world’s largest broadband networks
  • 9. fig 1: DPI inspection • Proven application identification and traffic shaping • Flexible network deployment options • Advanced reporting including VoIP analysis • Recognize True Scalability • Leading Redundancy Options • Seamless Integration • Gain Control and Visibility Enhanced DPI Signature Analysis: Recognizes protocol identifiers anywhere within a TCP packet, across multiple TCP packets and even using UDP control messages. Flexible processing ensures that we can address new techniques as application protocols continue to evolve in the future. Real-time Behavioral Analysis: characterizes traffic by application categories through a real-time comparison with defined behavior thresholds. Service providers can immediately control unwanted traffic behavior that is affecting reliable network operation and service quality.
  • 10. fig 2: Bandwidth by protocol fig 3: VoIP Bandwidth by protocol
  • 11. fig 3: VoIP call by provider by protocol PTS Deployment for BTTB: For a customized solution for BTTB we will need to know 1. The network topology 2. The bandwidth 3. The exact solution requirements Policy Traffic Switch (PTS) enables service providers to apply different traffic policies for voice calls originating or terminating on the public network. Restrict selective VoIP services that provide domestic or international connections to the PSTN network
  • 12. fig 5:Detailed Drill Down, Network Provider, VoIP Provider, Subscriber Security Operations Services: • Attack monitoring, analysis, and classification: determines the nature of the attack and identifies specific remedies in real time. • Behavior detection and signature updates: may be automated or as designated by the service provider. • Security research and test lab: delivers in depth traffic analysis to discover hidden and emerging threats, provides 24X7 monitoring and attack response. Cans spam: Spam trojan mitigation arms service providers with a network-based approach to eliminating all malicious worm and spam trojan traffic on service provider networks Kills worms: Network-based worm mitigation attacks worms at all five stages of their development, effectively shutting down worm/DoS traffic.
  • 13. Prevents DoS attacks: Network-based DoS mitigation protects the subscriber experience by filtering DoS attacks and eliminating malicious traffic while allowing all legitimate requests to proceed through the network. Defends servers: Protects inherently vulnerable mail servers and prevents DNS poisoning by stopping illegitimate requests before they become a threat to subscribers and the network. Cleanses network: Security Operations team provides ongoing analysis to ensure optimal network health and distant warning in the event of an attack. Sandvine’s visibility into global service provider networks acts as a 'network telescope,' uncovering malicious traffic threats before they spread around the globe. Conclusion: If we consider the physical security is managed than this web base solution is a smart monitoring and control tool for BTRC or any other lawful authority/ This can be the ultimate solution for VoIP management in Bangladesh. DPI based solution provides the total transparency needed to manage VoIP according to set policies. Policy Traffic Switch can stop the illegal use of VoIP while optimizing bandwidth for licensed VoIP in Bangladesh.
  • 14. Sources: IETF http://www.ietf.org SIP Forum http://www.sipforum.org 3rd Generation Partnership Project http://www.3gpp.org SIP Working Group http://www.softarmor.com/sipwg SIPPING Working Group http://www.softarmor.com/sipping ETSI TISPAN http://portal.etsi.org/tispan References: Ericsson – ‘Combinational services – the pragmatic first step toward all-IP’, published in Ericsson Review No.2, 2003 Sandvine intervational