National Repository of Grey Literature 13 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
A Tool for VoIP Audio Extraction
Ružička, Jakub ; Ryšavý, Ondřej (referee) ; Matoušek, Petr (advisor)
In this thesis, we describe VoIP protocols and design of a system to reconstruct audio data from VoIP communication. The system is able to detect VoIP packet streams in an IP network traffic and assemble an audio signal they carry. RTP and IAX VoIP protocols are supported. Unlike widespread RTP protocol, IAX is not fully supported by available tools although it is used by increasingly popular Asterisk communications project and offers interesting features not found in RTP. The system is implemented as a library with minimal frontend.
Securing IP PBX against attacks and resistance testing
Kakvic, Martin ; Šedý, Jakub (referee) ; Šilhavý, Pavel (advisor)
This diploma thesis focuses on attacks on PBX Asterisk, FreeSWITCH and Yate in LTS versions. In this work was carried out two types of attacks, including an attack DoS and the attack Teardown. These attacks were carried out using two different protocols, SIP and IAX. During the denial of service attack was monitored CPU usage and detected if its possible to establish call and whether if call can be processed. The Security of PBX was build on two levels. As a first level of security there was used linux based firewall netfilter. The second level of security was ensured with protocols TLS and SRTP.
Modular web interface for Asterisk PBX
Moučka, Martin ; Rášo, Ondřej (referee) ; Krajsa, Ondřej (advisor)
This bachelor thesis is dealing with various ways of configuring Asterisk PBX and creating a modular web interface. This interface’s goal is to simplify the configuration of PBX and allow expanding its functions by adding new modules. Apart from a simple configuration, interface contains a self care zone where user can check his call history and keep his own phone book. As part of this work, there are two modules especially useful in environment of technical support and call centers. Those modules provide an opportunity to create interactive voice response menu, calling automat and queues management. Interface depends on Asterisk in version 13 which is the newest version with long term support. The application is secured by user account management with role assigning. The role can be modified by permitting only specified actions.
Security of VoIP protocols
Novotný, František ; Číka, Petr (referee) ; Krajsa, Ondřej (advisor)
This bachelor dissertation deals with the VoIP (Voice over Internet Protocol) safety. The most used transport and signal protocols employing this technology are presented first. Two extended protocols, SIP (Session Initiation Protocol) and IAX (Inter-Asterisk eXchange Protocol), as well as open source Asterisk, which is closely connected with these protocols, are shown in detail. After that, methods, attacks and threats able to assure secure transfer in the use of VoIP among users are described. Afterwards the practical part of this essay, divided into two parts, is presented. In the first part, a passive attack in the form of tapping is demonstrated, and in the second, active attacks are described which take the form of forced cancellations and forwarded calls between two communicating users. With both attacks, safety measures that could effectively prevent against their potential attacking are proposed. In the closing part, the VoIP safety is evaluated for securing a quality connection between users communicating through it.
Open source PBX YATE
Kovář, Jan ; Daněček, Vít (referee) ; Šilhavý, Pavel (advisor)
The work discusses about the PBX Yate, describes its configuration from the initial installation, through the basic setup and description of the way through the logs of user registration, the syntax for defining the calling plan, including examples, and additional services, including demonstration of practical verification of the functionality in the computer lab. Are also created two samples job for more familiar with the principles of operation and the Yate PBX settings.
Possibilities of connecting the Asterisk softswitch to the 4th generation PBX
Halamík, Zdeněk ; Krajsa, Ondřej (referee) ; Šilhavý, Pavel (advisor)
This master’s thesis dissertate the possibilities of the linkage between Asterisk softswitch and the 4th generation private branch exchange. This should create a new generation’s network, so-called NGN, by the convergence of existing telecommunication networks with an IP computer network. This master’s thesis is divided into several chapters. In introduction is described the evolution of the private branch exchanges as well as the principles of the voice digitizing, codecs and signaling commonly used in both TDM and VoIP networks. The main aim of this project is the configuration of Asterisk software exchange for connection with PBX Alcatel 4400 as well as public phone network PSTN. Another goal of this master’s thesis was the configuration of Alcatel PBX and diagnostics of CCS and CAS signaling on E1 interface. In conclusion there are summarized advantages of NGN networks and their utilization in the future.
Modular web interface for Asterisk PBX
Moučka, Martin ; Rášo, Ondřej (referee) ; Krajsa, Ondřej (advisor)
This bachelor thesis is dealing with various ways of configuring Asterisk PBX and creating a modular web interface. This interface’s goal is to simplify the configuration of PBX and allow expanding its functions by adding new modules. Apart from a simple configuration, interface contains a self care zone where user can check his call history and keep his own phone book. As part of this work, there are two modules especially useful in environment of technical support and call centers. Those modules provide an opportunity to create interactive voice response menu, calling automat and queues management. Interface depends on Asterisk in version 13 which is the newest version with long term support. The application is secured by user account management with role assigning. The role can be modified by permitting only specified actions.
A Tool for VoIP Audio Extraction
Ružička, Jakub ; Ryšavý, Ondřej (referee) ; Matoušek, Petr (advisor)
In this thesis, we describe VoIP protocols and design of a system to reconstruct audio data from VoIP communication. The system is able to detect VoIP packet streams in an IP network traffic and assemble an audio signal they carry. RTP and IAX VoIP protocols are supported. Unlike widespread RTP protocol, IAX is not fully supported by available tools although it is used by increasingly popular Asterisk communications project and offers interesting features not found in RTP. The system is implemented as a library with minimal frontend.
Security of VoIP protocols
Novotný, František ; Číka, Petr (referee) ; Krajsa, Ondřej (advisor)
This bachelor dissertation deals with the VoIP (Voice over Internet Protocol) safety. The most used transport and signal protocols employing this technology are presented first. Two extended protocols, SIP (Session Initiation Protocol) and IAX (Inter-Asterisk eXchange Protocol), as well as open source Asterisk, which is closely connected with these protocols, are shown in detail. After that, methods, attacks and threats able to assure secure transfer in the use of VoIP among users are described. Afterwards the practical part of this essay, divided into two parts, is presented. In the first part, a passive attack in the form of tapping is demonstrated, and in the second, active attacks are described which take the form of forced cancellations and forwarded calls between two communicating users. With both attacks, safety measures that could effectively prevent against their potential attacking are proposed. In the closing part, the VoIP safety is evaluated for securing a quality connection between users communicating through it.
Securing IP PBX against attacks and resistance testing
Kakvic, Martin ; Šedý, Jakub (referee) ; Šilhavý, Pavel (advisor)
This diploma thesis focuses on attacks on PBX Asterisk, FreeSWITCH and Yate in LTS versions. In this work was carried out two types of attacks, including an attack DoS and the attack Teardown. These attacks were carried out using two different protocols, SIP and IAX. During the denial of service attack was monitored CPU usage and detected if its possible to establish call and whether if call can be processed. The Security of PBX was build on two levels. As a first level of security there was used linux based firewall netfilter. The second level of security was ensured with protocols TLS and SRTP.

National Repository of Grey Literature : 13 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.