Amazines Free Article Archive
www.amazines.com - Saturday, June 28, 2025
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133577)
 Advice (161673)
 Affiliate Programs (34799)
 Art and Culture (73858)
 Automotive (145724)
 Blogs (75621)
 Boating (9851)
 Books (17224)
 Buddhism (4130)
 Business (1331047)
 Business News (426461)
 Business Opportunities (366525)
 Camping (10974)
 Career (72796)
 Christianity (15854)
 Collecting (11638)
 Communication (115089)
 Computers (241958)
 Construction (38976)
 Consumer (49954)
 Cooking (17080)
 Copywriting (6734)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20323)
 Dating (45910)
 EBooks (19704)
 E-Commerce (48279)
 Education (185536)
 Electronics (83525)
 Email (6438)
 Entertainment (159864)
 Environment (29004)
 Ezine (3040)
 Ezine Publishing (5454)
 Ezine Sites (1551)
 Family & Parenting (111011)
 Fashion & Cosmetics (196613)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310639)
 Fitness (106492)
 Food & Beverages (63058)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25207)
 Government (10519)
 Health (630186)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91752)
 Home Improvement (251307)
 Home Repair (46261)
 Humor (4729)
 Import - Export (5462)
 Insurance (45104)
 Interior Design (29637)
 International Property (3488)
 Internet (191033)
 Internet Marketing (146690)
 Investment (22864)
 Islam (1161)
 Judaism (1352)
 Law (80500)
 Link Popularity (4596)
 Manufacturing (20933)
 Marketing (99328)
 MLM (14140)
 Motivation (18237)
 Music (27000)
 New to the Internet (9498)
 Non-Profit Organizations (4049)
 Online Shopping (129743)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12691)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126912)
 Recreation & Leisure (95497)
 Relationships (87678)
 Research (16182)
 Sales (80369)
 Science & Technology (110299)
 Search Engines (23525)
 Self Improvement (153318)
 Seniors (6224)
 Sexuality (36012)
 Small Business (49393)
 Software (83054)
 Spiritual (23537)
 Sports (116156)
 Tax (7664)
 Telecommuting (34070)
 Travel & Tourism (308300)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11803)
 Website Design (56951)
 Website Promotion (36671)
 World News (1000+)
 Writing (35853)
Author Spotlight
LINDA HOLLAND

I am a passionate article and blog writer based in South Africa. With a love for life and a strong d...more
AREESH ISHTIAQ

Areesh Ishtiaq a Top Rated SEO and Digital Marketing Guru on Upwork, working as a project manager fo...more
RAJESH THAPALIYA

I am in Nepalest tourism industery working since 2000 as a trekking porter to the senior tour leader...more
DESIGNPLUZ PTY LTD

Designpluz has steadily matured from a passionate graphics design start-up, into a full service digi...more
SHOVON JOARDER

Shovon Joarder has been working as Freelance Marketing Project Manager for over four years. He also ...more


Security research and standards H.323-H.323, security - Communications Industry - Tool Chest by wgre ergrg





Article Author Biography
Security research and standards H.323-H.323, security - Communications Industry - Tool Chest by
Article Posted: 12/23/2010
Article Views: 101
Articles Written: 1512
Word Count: 1085
Article Votes: 0
AddThis Social Bookmark Button

Security research and standards H.323-H.323, security - Communications Industry - Tool Chest


 
Business,Business News,Business Opportunities
Summary  Development ahead of other VoIP H.323 protocol. As the Internet's openness and lack of effective monitoring, as well as the agreement itself H.323 protocol cluster loopholes, H.323 to H.323 network security issues pose many threats to the system. H.323 system first introduces security threats, network security and then on H.323 describes a detailed analysis, and finally introduced the relevant standards of international and domestic situation.

  With the rapid development of Internet, VoIP business has been widely carried out. In the past few years, due to the development of early and consistent H.323 system operators operating ideas, so its development is far ahead of other VoIP protocols, and a large number of deployed operating the network. At present, the vast majority of operations are based on the H.323 protocol, VoIP cluster. However, due to the openness of the Internet itself and the lack of effective monitoring, as well as the agreement itself H.323 protocol cluster loopholes, H.323 network security is more important in bringing a number of threats to the H.323 system, a serious impediment to the H.323 of development, the main security threats in the following areas:

denial of service attacks. Based on the open port denial of service attacks. Key equipment on the H.323 system to synchronize (SYN), Internet Control Message Protocol (ICMP) packets in the high-volume attacks can lead to communications disruption can not be normal to provide services.

theft of services. Mainly directed against non-authorized access. These include: user identity theft counterfeit legitimate user; impersonate legitimate nodes network services to deceive.

signaling flow attack. H.323 control signaling as the open, anyone can monitor the network listener H.323 signaling stream. Malicious user to intercept and tamper with the network transmission of signaling data packet, modify the packet domain, so that H.323 call is not working. Thus the introduction of session hijacking, man-in-phone tracking threats.

media stream monitoring. H.323 system, RTP / RTCP is the transmission of voice information in the IP Internet protocol. As the protocol itself is open, a malicious user can monitor the network monitoring the media stream, if you can understand the content of the media stream can undermine the confidentiality of the media stream.

With network security using IP networks increasingly become the greatest concern, therefore, the same network security has become the most important problems facing the H.323 system, one can say that the network security problem is not solved, not only H.323 would be no future development prospects, the existing H.323 soon lost its vitality.

1, H.323 network security architecture H.323 systems to enhance network security, international and domestic standards organizations, related manufacturers to carry out active H.323 network security research. Figure 1 Schematic diagram of network security system for the H.323, H.323 which is involved in the shadow of some of the security scope of the study.

Figure 1 H.323 network security system to indicate Can be seen from Figure 1, H.225.0 and H.245 is the H.323 system, the core of the agreement. H.225.0 for call control, including two parts: the call to accept (RAS) and call signaling protocol. RAS is mainly used for sending the terminal registration information, authentication information and call processing information. Q.931 call signaling protocol is based on enacted primarily used to complete the call setup process. H.245 for media control, the main stream communication channel to achieve the establishment, maintenance and release. RTCP media streaming real-time transmission control protocol, RTP is a real-time transport protocol media streams. Secure transmission of streaming media would be given to use H.245 channel coding algorithms and keys. Communication relationship between H.323 endpoints general implementation of the three control process: RAS, call control (call signaling) and the connection control (H.245).

H.323 to achieve safe operations, we must first ensure that the terminal or MCU and Gatekeeper RAS message transmission between the security to complete the secure registration, to ensure that only legitimate users can use the H.323 services and resources accordingly License, such as international, long distance service authorization. RAS on the basis of ensuring the safety, you can establish a secure call connection channel (H.225.0) and call control (H.245) channels, in this based on the RTP protocol for the use of real-time media stream communications encryption algorithm and key agreement complete media stream communications confidential.

Second, the specific security solutions H.323 Network Security There are two main security mechanisms: the network layer / transport layer secure channel (such as SECtarget = _blankclass = qqx_gjz> IPSec, SSL, TLS), to achieve H.323 security; by on the H.323 protocol cluster involved in signaling increased security mechanism itself, the security capacity of the channel to achieve a variety of consultation and security. Specific H.323 network security can be based on the actual network environment, and the integrated use of these two kinds of security mechanisms. As a secure channel security is common security, only the external protection for H.323, and H.323 protocol cluster does not have much relationship, so this article focuses on the second mechanism: on the H.323 Protocol Stack involved in signaling their increased security.

Shown in Figure 1, H.323 security research mainly includes the following sections: Terminal registered safety, safety of call connection, call control security, confidentiality and the media stream key management security.

1. Terminal registered safety Registered security is mainly embodied in the terminal authentication and integrity, not including the gatekeeper and endpoint information between the secret. Terminal registered security mainly in the following 3 methods:

(1) symmetric encryption password + authentication algorithm (2) password + hash (Hash) authentication algorithm (3) certificate + digital signature authentication algorithm Above three authentication methods, can achieve one-way authentication (Terminal to Gatekeeper), or two-way authentication. Each authentication method is based on both timestamp of the second handshake protocol can also use the challenge / response of the three-way handshake protocol. For the time stamp mechanism between the terminal and gatekeeper must have an acceptable time base. Time the number of acceptable deviations considered by the local concrete implementation. Challenge / response protocol using a randomly generated number as the unpredictable challenges of those questions from the certification. Each authentication method, which requires the terminal and the gatekeeper identifier is knowable. Time stamp authentication mechanism must adjust the time fine particle size, to prevent message replay attacks.

2. Call connection security Call

The e-commerce company in China offers quality products such as Tool Chest , China Roller Cabinet, and more. For more , please visit Tool Cart today!

Related Articles - Tool Chest, China Roller Cabinet,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


STEPHEN BYE

Stephen Bye is a fiction writer. His most recent novels are a 5-book “The Developer” series which be...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
MICHAEL BRESCIANI

Rev Bresciani is the author of two Christian books. One book is an important and concisely written b...more
LEVAL AINAH

I am an internet marketer and also an educator. My goal is to help others who are looking to improve...more
PAUL PHILIPS

For more articles, blog messages & videos and a free e-book download go to www.NewParadigm.ws your p...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2025, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license