scholarly journals A Security Analysis on OpenSIPS

Author(s):  
Gandeva Bayu Satrya ◽  
Muhammad Caesara Nicovandia

IP Telephony, Internet Telephony, Digital Phone or often also called VoIP (Voice Over Internet Protocol) is a technology that allows long-distance voice conversations with the Internet. The increasing number of VoIP users and other IP-based multimedia streaming services naturally raises security issues. Many users are likely to lose their privacy in communication. To overcome this security problem a security system must be implemented. Implementing a security system will use VPN Gateway using SSL and TLS encryption on the VoIP server. The VPN Gateway method is used to build a private network so that only certain users can use the private network. The TLS method is used to secure a user signaling session to the server. From the test results obtained that the VoIP server that uses VPN Gateway and TLS on the server can overcome the attacks e.g., eavesdropping, attacking authentication, teardown session, and denial of service.

2020 ◽  
Vol 13 (2) ◽  
pp. 85-98
Author(s):  
Ameen Al-Azzawi

This paper surveys the five most important technologies for IPv4aaS (IPv4-as-a-Service), namely 464XLAT, DS-Lite (Dual-Stack Lite), lw4o6 (Lightweight 4over6), MAP-E and MAP-T. The aim of our effort is to identify the potential security issues within these technologies. We plan to perform their security analysis following the STRIDE approach, which stands for spoofing, tampering, repudiation, information disclosure, denial of service and elevation of privilege. We give a short introduction for the method. Within the five IPv4aaS technologies, we focus on 464XLAT, its architecture and operation. We construct a DFD diagram suitable for its security analysis according to the STRIDE methodology, thus making the first steps towards finding its potential vulnerabilities and seeking for their mitigations.


2019 ◽  
Author(s):  
Amarudin ◽  
Sampurna Dadi Riskiono

Akhir-akhir ini sudah mulai banyak perusahaan yang memanfaatkan protokol Virtual Private Network (VPN) sebagai media akses/komunikasi antar jaringan interlokal. VPN adalah sebuah protokol keamanan jaringan yang dapat digunakan sebagai salah satu cara untuk meningkatkan keamanan jaringan dari sisi transmisi data. Dengan pemanfaatan VPN, koneksi antar jaringan dapat terbentuk secara virtual walaupun tidak terbentuk secara fisik. Selain itu, dengan memanfaatkan protokol VPN, user (client) dapat mengkases Server secara private melalui jaringan public. Dengan demikian komunikasi antara Client dan Server terjaga dari Sniffing (penyadapan) dari pihak yang tidak bertanggung jawab. Akan tetap tingkat keamanan yang dihasilkan dari penerapan VPN ini perlu dilakukan pengkajian yang lebih dalam. Sehingga tingkat keamanannya dapat diketahui apakah sudah termasuk dalam kategori aman ataukah masih ada peluang bug yang membahayakan dari penetrasi. Dalam penelitian ini dilakukan pengujian Scanning dan Sniffing pada penerapan VPN menggunakan toos hacking yaitu Nmap dan Wireshark. Sedangkan pengujian performansi service pada VPN Server, dilakukan pengujian Denial of Service (DoS) menggunakan tools hacking yaitu LOIC. Adapun objek penelitian ini adalah perangkat Mikrotik RouterOS yang digunakan pada Universitas Teknokrat Indonesia. Hasil penelitian yang didapatkan bahwa komunikasi data antar jaringan (antara VPN Server dan VPN Client) dapat terenkripsi dengan baik. Akan tetapi dari segi konektifitas antar jaringan sangat dipengaruhi oleh performansi bandwidth yang digunakan oleh sistem jaringan tersebut. Selain itu berdasarkan hasil pengujian performansi service pada VPN Server didapatkan hasil bahwa service pada VPN Server dapat dimatikan pada request (ping) sebesar 1.899.276 request. Hal ini dipengaruhi oleh spesifikasi perangkat Mikrotik RouterOS yang digunakan. Adapun untuk penelitian selanjutnya perlu dilakukan pengujian performansi konektifitas menggunakan bandwith yang lebih besar dan untuk menguji performansi service VPN Server menggunakan spesifikasi perangkat Mikrotik yang lebih baik.


2013 ◽  
Vol 846-847 ◽  
pp. 1628-1631
Author(s):  
Song Jie Gong ◽  
Lin Di Jin

With the rapid development of electronic commerce, payment is becoming the focus problem of electronic commerce. Electronic cash has become the ideal method of electronic payment for it is able to realize fair, secure, effect electronic transacts. Along with electronic commerce development, electronic cash payment systems are also gradually developing. However, most electronic cashes are facing the security issues. Moreover, the amount of money each electronic cash card contains is fixed at issuance and is available only within a specified system. The key technology is digital signature technology, including blind signature, group signature, and ring signature. The paper researches the security problems of electronic cash in information safety and e-commerce, and discusses the electronic payment and the security problem, which is regarded as the foundation of electronic commerce. The main factors are given that causes security problems of electronic payment, and suggests corresponding precautionary measures.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient Hashing, Encryption and Chebyshev HEC-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms, and 1878bytes for 100Kb data size, respectively.


2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Run Xie ◽  
Chanlian He ◽  
Dongqing Xie ◽  
Chongzhi Gao ◽  
Xiaojun Zhang

With the advent of cloud computing, data privacy has become one of critical security issues and attracted much attention as more and more mobile devices are relying on the services in cloud. To protect data privacy, users usually encrypt their sensitive data before uploading to cloud servers, which renders the data utilization to be difficult. The ciphertext retrieval is able to realize utilization over encrypted data and searchable public key encryption is an effective way in the construction of encrypted data retrieval. However, the previous related works have not paid much attention to the design of ciphertext retrieval schemes that are secure against inside keyword-guessing attacks (KGAs). In this paper, we first construct a new architecture to resist inside KGAs. Moreover we present an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture. This instance is secure under the inside KGAs. Finally, security analysis and efficiency comparison show that the proposal is effective for the retrieval of encrypted data in cloud computing.


Author(s):  
Mykola Ryzhkov ◽  
Anastasiia Siabro

Achievements in the sphere of automatization and telecommunication are an essential component of transformation of the international peace and security system. This article presents, that consequences of changes are of a dual character. On the one hand, new technologies are becoming an important component of society modernization strategies in developing countries, on the other hand, they can be used for armament modernization or creation of new means of confrontation in modern international relations. APR countries face the most relevant issue of information technologies usage. The article deals with the process of discussion of new challenges and threats to international security, emerging as a result of development and large-scale implementation of information-communication technologies. Positions of states regarding the adoption of resolution in the sphere of international information security were studied through examples of Japan, India, and China. It is proved in the article, that information technologies have become an important component of the security system in the world. Technologies usage may lead to steady international development as well as to information arms race. That is why working out a common position on international information security issues is of crucial importance. It is within the framework of the UN, that different states of the world are given an opportunity to express their visions of the problem of international information security and work out common approaches to its solution. The article shows, that states’ positions have similar as well as different features. For instance, all states express concern regarding possible limitation of technology transfer for the establishment of a more controlled international political environment. But states’ positions have major differences as to mechanisms of information security provision. Thus, Japan and India strive to achieve a balanced system of international information security, which should at the same time have preventive mechanisms against the emergence of threats in the information and science and technology spheres and guarantee continuation of scientific-technological development, which is a crucial component of development and modernization strategies in many countries of the world. China came forward with position of strong regulation of international information security issues and suggested framing of corresponding regulations of the states’ conduct in the cyberspace.


2018 ◽  
Vol 5 (1) ◽  
pp. 137-144
Author(s):  
Ade Mubarok ◽  
Ivan Sofyan ◽  
Ali Akbar Rismayadi ◽  
Ina Najiyah

Abstrak Keamanan merupakan hal sangat penting bagi setiap orang. Rumah yang sering ditinggal pemiliknya dapat dimanfaatkan oleh pencuri untuk melakukan aksinya. Oleh karena itu diperlukan sistem keamanan rumah yang efektif agar pemilik rumah dapat mengetahui informasi apabila rumahnya dibobol oleh pencuri. Penulis merancang sebuah sistem keamanan rumah dengan memanfaatkan teknologi RFID yang di lengkapi dengan sensor PIR dan modul GSM sebagai sistem informasi peringatan SMS, dimana semua sistemnya diolah dalam sebuah mikrokontroler ATmega328. Tujuan dari penelitian ini untuk mengganti kunci konvesional dengan kunci solenoid sehingga sulit untuk diduplikat serta mengurangi kesempatan aksi pencurian ketika rumah dalam keadaan kosong. Metode penelitian yang digunakan antara lain dimulai dari pengumpulan data (observasi, wawancara dan studi pustaka) serta pembuatan alat (planning, analisis, desain dan testing). Berdasarkan hasil pengujian diperoleh bahwa kunci solenoid dapat bekerja sesuai dengan kartu akses RFID yang diberikan. Sensor PIR dan modul GSM dapat bekerja dengan baik saat pencuri masuk kedalam rumah, sehingga rumah menjadi aman ketika ditinggalkan oleh pemiliknya. Kata Kunci: RFID, Sensor PIR, Modul GSM, ATmega328 Abstract Security is very important for everyone. Homes that are often left the owner can be used by thieves to perform the action. Therefore required an effective home security system so that homeowners can find out information if the house burglarized by thieves. The author designed a home security system by utilizing RFID technology that is equipped with PIR sensor and GSM module as SMS warning information system, where all the system is processed in an ATmega328 microcontroller. The purpose of this research is to change the conventional key with the solenoid key so that it is difficult to duplicate and reduce the chance of theft action when the house is empty. Research methods used, among others, starting from data collection (observation, interview and literature study) as well as making tools (planning, analysis, design and testing). Based on the test results obtained that the solenoid key can work in accordance with the given RFID access card. PIR sensors and GSM modules work well when thieves enter the house, so the house becomes secure when left by the owner. Key Word: RFID, PIR Sensor, GSM Module, ATmega328


2011 ◽  
pp. 131-144
Author(s):  
Sridhar Asvathanarayanan

Computing strategies have constantly undergone changes, from being completely centralized to client-servers and now to peer-to-peer networks. Databases on peer-to-peer networks offer significant advantages in terms of providing autonomy to data owners, to store and manage the data that they work with and, at the same time, allow access to others. The issue of database security becomes a lot more complicated and the vulnerabilities associated with databases are far more pronounced when considering databases on a peer-to-peer network. Issues associated with database security in a peer-to-peer environment could be due to file sharing, distributed denial of service, and so forth, and trust plays a vital role in ensuring security. The components of trust in terms of authentication, authorization, and encryption offer methods to ensure security.


Author(s):  
Ioana Lasc ◽  
Reiner Dojen ◽  
Tom Coffey

Many peer-to-peer security protocols proposed for wireless communications use one-time shared secrets for authentication purposes. This paper analyses online update mechanisms for one-time shared secrets. A new type of attack against update mechanisms, called desynchronisation attack, is introduced. This type of attack may lead to a permanent denial of service condition. A case study demonstrates the effectiveness of desynchronisation attacks against a security protocol for mobile satellite communications. A new mutual authentication protocol for satellite communications, incorporating a resynchronisation capability, is proposed to counter the disruptive effects of desynchronisation attacks. The new protocol has an esynchronisation phase that is initiated whenever desynchronisation is suspected. Thus, the possibility of causing permanent denial of service conditions by mounting desynchronisation attacks is eliminated. A security analysis of the proposed protocol establishes its resistance against attacks like replay attacks, dictionary attacks, and desynchronisation attacks.


Sign in / Sign up

Export Citation Format

Share Document