• DocumentCode
    2368355
  • Title

    A study of global numbering plan with active anti-spit capability on VoIP

  • Author

    Hsia-Ling Chiang ; Shu-Ming, Yeh ; Ming-Hong, Hong ; Lin, John

  • Author_Institution
    Hsing Wu Coll., Taipei
  • fYear
    2008
  • fDate
    13-16 Oct. 2008
  • Firstpage
    17
  • Lastpage
    22
  • Abstract
    The traditional E.164 codepsilas regularity enables the scoundrel to be possible not after the telecommunication userpsilas permission on easily the segment to userpsilas telephone number. It is difficult to meet the VoIP protection needs for using the packet filtering technology with the network-level gatekeeper defense mechanism. This paper proposed a VoIP access authorization verifying center (AAVC) mechanism which uses cocktail-like concept, which is integrated network-layer and circuit-layer and application-layer together to obtain both security and convenience of telecommunication demands. The telephone number with an arbitrarily user-established authorization verifying code is used to protect this screen host gateway mechanism. When the sender dials the IP telephone, he must dial in the telephone number and then dial * (star key) and input the confirmed identification code, after the registration server and the remote-end verification database compare the verifying code, then it gives the connection transfer through. This research inquired the AAVC confirmation mechanism has confirmed the whole construction design of the query server and the verification server. Also, under the global telecommunication networkpsilas tidal current, this research founds one to have the jurisdiction management, active Anti-Spam and the IP service graduation authorization global numbering plan.
  • Keywords
    Internet telephony; authorisation; information filtering; internetworking; telecommunication security; unsolicited e-mail; IP telephony; VoIP; access authorization verifying center mechanism; active anti-SPIT capability; active anti-spam; global numbering plan; identification code; jurisdiction management; network-level gatekeeper defense mechanism; packet filtering technology; query server design; remote-end verification database; traditional E.164 code regularity; user telephone number; verification server design; Authentication; Authorization; Costs; Databases; Educational institutions; Internet telephony; Network servers; Protection; Telecommunication computing; Web server; AAVC; Active Anti-Spam; Numbering plan;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security Technology, 2008. ICCST 2008. 42nd Annual IEEE International Carnahan Conference on
  • Conference_Location
    Prague
  • Print_ISBN
    978-1-4244-1816-9
  • Electronic_ISBN
    978-1-4244-1817-6
  • Type

    conf

  • DOI
    10.1109/CCST.2008.4751270
  • Filename
    4751270