System for rogue VoIP phone detection and managing VoIP phone mobility

Ilyas Khudhair Dubi, Ghiath Mageb Waheeb, Saif Ahmed Jabbar, Hasimi Sallehuddin, Nurhizam Safie Mohd Satar, Farashazillah Yahya, Nur Azaliah Abu Bakar

Research output: Contribution to journalArticle

Abstract

The quickly propelling Voice over Internet Protocol (VoIP) innovation, is picking up customer fascination in the business today. Its uses, including IP communication frameworks, includes the transmission of voice as information bundles which after achieving the getting side, reassembles and deciphers according to necessity. This encourages open just as private IP frameworks. The real drawback, keeping numerous organizations off from utilizing VoIP advances is related to the security of this framework. This paper examines a strategy and the following framework that get to arrange data for approved system gadgets. The entrance insights and data empower to follow gadget development all through the system. In addition, it offers to recognize unapproved gadgets making false endeavors to get to the system, presenting to be an approved access gadget.

Original languageEnglish
Pages (from-to)2469-2474
Number of pages6
JournalInternational Journal of Recent Technology and Engineering
Volume8
Issue number2
DOIs
Publication statusPublished - Jul 2019

Fingerprint

Internet protocols
Innovation
Communication
World Wide Web
Industry

Keywords

  • VoIP attacks
  • VoIP security threats

ASJC Scopus subject areas

  • Engineering(all)
  • Management of Technology and Innovation

Cite this

System for rogue VoIP phone detection and managing VoIP phone mobility. / Dubi, Ilyas Khudhair; Waheeb, Ghiath Mageb; Jabbar, Saif Ahmed; Sallehuddin, Hasimi; Satar, Nurhizam Safie Mohd; Yahya, Farashazillah; Bakar, Nur Azaliah Abu.

In: International Journal of Recent Technology and Engineering, Vol. 8, No. 2, 07.2019, p. 2469-2474.

Research output: Contribution to journalArticle

Dubi, Ilyas Khudhair ; Waheeb, Ghiath Mageb ; Jabbar, Saif Ahmed ; Sallehuddin, Hasimi ; Satar, Nurhizam Safie Mohd ; Yahya, Farashazillah ; Bakar, Nur Azaliah Abu. / System for rogue VoIP phone detection and managing VoIP phone mobility. In: International Journal of Recent Technology and Engineering. 2019 ; Vol. 8, No. 2. pp. 2469-2474.
@article{fe57fe4616b54126b8a6bf2e36a1eac6,
title = "System for rogue VoIP phone detection and managing VoIP phone mobility",
abstract = "The quickly propelling Voice over Internet Protocol (VoIP) innovation, is picking up customer fascination in the business today. Its uses, including IP communication frameworks, includes the transmission of voice as information bundles which after achieving the getting side, reassembles and deciphers according to necessity. This encourages open just as private IP frameworks. The real drawback, keeping numerous organizations off from utilizing VoIP advances is related to the security of this framework. This paper examines a strategy and the following framework that get to arrange data for approved system gadgets. The entrance insights and data empower to follow gadget development all through the system. In addition, it offers to recognize unapproved gadgets making false endeavors to get to the system, presenting to be an approved access gadget.",
keywords = "VoIP attacks, VoIP security threats",
author = "Dubi, {Ilyas Khudhair} and Waheeb, {Ghiath Mageb} and Jabbar, {Saif Ahmed} and Hasimi Sallehuddin and Satar, {Nurhizam Safie Mohd} and Farashazillah Yahya and Bakar, {Nur Azaliah Abu}",
year = "2019",
month = "7",
doi = "10.35940/ijrte.B2080.078219",
language = "English",
volume = "8",
pages = "2469--2474",
journal = "International Journal of Recent Technology and Engineering",
issn = "2277-3878",
publisher = "Blue Eyes Intelligence Engineering and Sciences Publication",
number = "2",

}

TY - JOUR

T1 - System for rogue VoIP phone detection and managing VoIP phone mobility

AU - Dubi, Ilyas Khudhair

AU - Waheeb, Ghiath Mageb

AU - Jabbar, Saif Ahmed

AU - Sallehuddin, Hasimi

AU - Satar, Nurhizam Safie Mohd

AU - Yahya, Farashazillah

AU - Bakar, Nur Azaliah Abu

PY - 2019/7

Y1 - 2019/7

N2 - The quickly propelling Voice over Internet Protocol (VoIP) innovation, is picking up customer fascination in the business today. Its uses, including IP communication frameworks, includes the transmission of voice as information bundles which after achieving the getting side, reassembles and deciphers according to necessity. This encourages open just as private IP frameworks. The real drawback, keeping numerous organizations off from utilizing VoIP advances is related to the security of this framework. This paper examines a strategy and the following framework that get to arrange data for approved system gadgets. The entrance insights and data empower to follow gadget development all through the system. In addition, it offers to recognize unapproved gadgets making false endeavors to get to the system, presenting to be an approved access gadget.

AB - The quickly propelling Voice over Internet Protocol (VoIP) innovation, is picking up customer fascination in the business today. Its uses, including IP communication frameworks, includes the transmission of voice as information bundles which after achieving the getting side, reassembles and deciphers according to necessity. This encourages open just as private IP frameworks. The real drawback, keeping numerous organizations off from utilizing VoIP advances is related to the security of this framework. This paper examines a strategy and the following framework that get to arrange data for approved system gadgets. The entrance insights and data empower to follow gadget development all through the system. In addition, it offers to recognize unapproved gadgets making false endeavors to get to the system, presenting to be an approved access gadget.

KW - VoIP attacks

KW - VoIP security threats

UR - http://www.scopus.com/inward/record.url?scp=85071170883&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85071170883&partnerID=8YFLogxK

U2 - 10.35940/ijrte.B2080.078219

DO - 10.35940/ijrte.B2080.078219

M3 - Article

AN - SCOPUS:85071170883

VL - 8

SP - 2469

EP - 2474

JO - International Journal of Recent Technology and Engineering

JF - International Journal of Recent Technology and Engineering

SN - 2277-3878

IS - 2

ER -