- Title
- Securing softswitches from malicious attacks
- Creator
- Opie, Jake Weyman
- ThesisAdvisor
- Terzoli, Alfredo
- ThesisAdvisor
- Irwin, Barry Vivian William
- Subject
- Internet telephony -- Security measures
- Subject
- Computer networks -- Security measures
- Subject
- Digital telephone systems
- Subject
- Communication -- Technological innovations
- Subject
- Computer network protocols
- Subject
- TCP/IP (Computer network protocol)
- Subject
- Switching theory
- Date
- 2007
- Type
- Thesis
- Type
- Masters
- Type
- MSc
- Identifier
- vital:4683
- Identifier
- http://hdl.handle.net/10962/d1007714
- Identifier
- Internet telephony -- Security measures
- Identifier
- Computer networks -- Security measures
- Identifier
- Digital telephone systems
- Identifier
- Communication -- Technological innovations
- Identifier
- Computer network protocols
- Identifier
- TCP/IP (Computer network protocol)
- Identifier
- Switching theory
- Description
- Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. Of all the limitations that these networks had, the ability of malicious attacks to cripple communication was not a crucial one. This situation has changed radically now that real-time communication and data have merged to share the same network. The objective of this project is to investigate the securing of softswitches with functionality similar to Private Branch Exchanges (PBX) from malicious attacks. The focus of the project will be a practical investigation of how to secure ILANGA, an ASTERISK-based system under development at Rhodes University. The practical investigation that focuses on ILANGA is based on performing six varied experiments on the different components of ILANGA. Before the six experiments are performed, basic preliminary security measures and the restrictions placed on the access to the database are discussed. The outcomes of these experiments are discussed and the precise reasons why these attacks were either successful or unsuccessful are given. Suggestions of a theoretical nature on how to defend against the successful attacks are also presented.
- Format
- 151 p., pdf
- Publisher
- Rhodes University, Faculty of Science, Computer Science
- Language
- English
- Rights
- Opie, Jake Weyman
- Hits: 2958
- Visitors: 3062
- Downloads: 161
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details | SOURCEPDF | 12 MB | Adobe Acrobat PDF | View Details |