National Repository of Grey Literature 8 records found  Search took 0.00 seconds. 
Design and implementation of VoIP protocols tester
Polášek, Jakub ; Číka, Petr (referee) ; Krajsa, Ondřej (advisor)
This paper deals with ways and means of testing SIP or IAX2 based equipment and protocols itselfs. I analyse terminology and methodology for benchmarking of proxy and registrar servers as it was described in documents RFC 7501 and RFC 7502 from organization IETF. In the practical part is described the tester realization programmed in PHP programming language witch will use described methodology. Aplication is available in web based interface.
Securing IP PBX against attacks and resistance testing
Kakvic, Martin ; Šedý, Jakub (referee) ; Šilhavý, Pavel (advisor)
This diploma thesis focuses on attacks on PBX Asterisk, FreeSWITCH and Yate in LTS versions. In this work was carried out two types of attacks, including an attack DoS and the attack Teardown. These attacks were carried out using two different protocols, SIP and IAX. During the denial of service attack was monitored CPU usage and detected if its possible to establish call and whether if call can be processed. The Security of PBX was build on two levels. As a first level of security there was used linux based firewall netfilter. The second level of security was ensured with protocols TLS and SRTP.
Securing IP PBX against attacks
Hynek, Luboš ; Krajsa, Ondřej (referee) ; Šilhavý, Pavel (advisor)
This master project focuses on the possibilities of protecting the most common free software PBX Asterisk, FreeSWITCH and YATE. In practice, it was verified the behavior of PBX in the attacks and suggested protection against them on one of the most popular distributions of Linux server on CentOS. Tool was created to simulate several types of attacks targeting denial of service. Both protective options PBX themselves and operating system capabilities are used in this work. Comparison was also the possibility of protection of individual PBX with each other. It also includes a brief description of the protocol, topology attacks and recommendation for the operation of softswitches.
Open source PBX FreeSWITCH
Hynek, Luboš ; Daněček, Vít (referee) ; Šilhavý, Pavel (advisor)
This bachelor thesis focuses on the possibilities of using alternative soft-switch FreeSWITCH. It is verified the possibilities and difficulties of the installation (including expansion cards) onto the most popular Linux distribution, Ubuntu, in practice. The installation is described in such a way that we can get a functional PBX with secure communication using the SIP protocol, the routing of the analog phone and the primary circuit E1, if the procedure is followed. Emphasis is placed on communication security against eavesdropping on the route. It also contains a comparison of their options with the most Asterisk PBX software. It also includes a brief history and division of telephone exchange and transmission systems into generations. Finally there are two laboratory tasks designed to focus on the configuration of the SIP protocol PBX and the use of secure protocols during communication.
Design and implementation of VoIP protocols tester
Polášek, Jakub ; Číka, Petr (referee) ; Krajsa, Ondřej (advisor)
This paper deals with ways and means of testing SIP or IAX2 based equipment and protocols itselfs. I analyse terminology and methodology for benchmarking of proxy and registrar servers as it was described in documents RFC 7501 and RFC 7502 from organization IETF. In the practical part is described the tester realization programmed in PHP programming language witch will use described methodology. Aplication is available in web based interface.
Open source PBX FreeSWITCH
Hynek, Luboš ; Daněček, Vít (referee) ; Šilhavý, Pavel (advisor)
This bachelor thesis focuses on the possibilities of using alternative soft-switch FreeSWITCH. It is verified the possibilities and difficulties of the installation (including expansion cards) onto the most popular Linux distribution, Ubuntu, in practice. The installation is described in such a way that we can get a functional PBX with secure communication using the SIP protocol, the routing of the analog phone and the primary circuit E1, if the procedure is followed. Emphasis is placed on communication security against eavesdropping on the route. It also contains a comparison of their options with the most Asterisk PBX software. It also includes a brief history and division of telephone exchange and transmission systems into generations. Finally there are two laboratory tasks designed to focus on the configuration of the SIP protocol PBX and the use of secure protocols during communication.
Securing IP PBX against attacks and resistance testing
Kakvic, Martin ; Šedý, Jakub (referee) ; Šilhavý, Pavel (advisor)
This diploma thesis focuses on attacks on PBX Asterisk, FreeSWITCH and Yate in LTS versions. In this work was carried out two types of attacks, including an attack DoS and the attack Teardown. These attacks were carried out using two different protocols, SIP and IAX. During the denial of service attack was monitored CPU usage and detected if its possible to establish call and whether if call can be processed. The Security of PBX was build on two levels. As a first level of security there was used linux based firewall netfilter. The second level of security was ensured with protocols TLS and SRTP.
Securing IP PBX against attacks
Hynek, Luboš ; Krajsa, Ondřej (referee) ; Šilhavý, Pavel (advisor)
This master project focuses on the possibilities of protecting the most common free software PBX Asterisk, FreeSWITCH and YATE. In practice, it was verified the behavior of PBX in the attacks and suggested protection against them on one of the most popular distributions of Linux server on CentOS. Tool was created to simulate several types of attacks targeting denial of service. Both protective options PBX themselves and operating system capabilities are used in this work. Comparison was also the possibility of protection of individual PBX with each other. It also includes a brief description of the protocol, topology attacks and recommendation for the operation of softswitches.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.