System for Rogue VoIP Phone Detection and Managing VoIP Phone Mobility
The quickly propelling Voice over Internet Protocol (VoIP) innovation, is picking up customer fascination in the business today. Its uses, including IP communication frameworks, includes the transmission of voice as information bundles which after achieving the getting side, reassembles and decipher...
Gespeichert in:
Veröffentlicht in: | International journal of recent technology and engineering 2019-07, Vol.8 (2), p.2459-2474 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2474 |
---|---|
container_issue | 2 |
container_start_page | 2459 |
container_title | International journal of recent technology and engineering |
container_volume | 8 |
creator | Dubi, Ilyas Khudhair Waheeb, Ghiath Mageb Jabbar, Saif Ahmed Sallehuddin, Hasimi Satar, Nurhizam Safie Mohd Yahya, Farashazillah Bakar, Nur Azaliah Abu |
description | The quickly propelling Voice over Internet Protocol (VoIP) innovation, is picking up customer fascination in the business today. Its uses, including IP communication frameworks, includes the transmission of voice as information bundles which after achieving the getting side, reassembles and deciphers according to necessity. This encourages open just as private IP frameworks. The real drawback, keeping numerous organizations off from utilizing VoIP advances is related to the security of this framework. This paper examines a strategy and the following framework that get to arrange data for approved system gadgets. The entrance insights and data empower to follow gadget development all through the system. In addition, it offers to recognize unapproved gadgets making false endeavors to get to the system, presenting to be an approved access gadget. |
doi_str_mv | 10.35940/ijrte.B2080.078219 |
format | Article |
fullrecord | <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_35940_ijrte_B2080_078219</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_35940_ijrte_B2080_078219</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1599-5d3e39e92fda198d76101b404f2af7846763439c5d230f11ffc8a0c67e76a9603</originalsourceid><addsrcrecordid>eNpN0LtOwzAYBWALgURV-gQsfoGE35f4MkKhUKkVFbfVch07uGpjZIehb4-UMnQ6Zzg6w4fQLYGaNZrDXdzlwdcPFBTUIBUl-gJNKJWyYkqqy7N-jWal7ACAMEE4ExO0eD-WwR9wSBm_pe7X46-03ODNd-o9fvSDd0NMPbZ9i9e2t13su_PFOm3jPg7HG3QV7L742X9O0efi6WP-Uq1en5fz-1XlSKN11bTMM-01Da0lWrVSECBbDjxQG6TiQgrGmXZNSxkEQkJwyoIT0kthtQA2Rez063IqJftgfnI82Hw0BMyoYUYNM2qYkwb7A3qkUn4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>System for Rogue VoIP Phone Detection and Managing VoIP Phone Mobility</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Dubi, Ilyas Khudhair ; Waheeb, Ghiath Mageb ; Jabbar, Saif Ahmed ; Sallehuddin, Hasimi ; Satar, Nurhizam Safie Mohd ; Yahya, Farashazillah ; Bakar, Nur Azaliah Abu</creator><creatorcontrib>Dubi, Ilyas Khudhair ; Waheeb, Ghiath Mageb ; Jabbar, Saif Ahmed ; Sallehuddin, Hasimi ; Satar, Nurhizam Safie Mohd ; Yahya, Farashazillah ; Bakar, Nur Azaliah Abu ; Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia ; Faculty of Information Science & Technology, Universiti Kebangsaan Malaysia ; Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Selangor, Malaysia ; Faculty of Computing & Informatics, Universiti Malaysia Sabah, Malaysia</creatorcontrib><description>The quickly propelling Voice over Internet Protocol (VoIP) innovation, is picking up customer fascination in the business today. Its uses, including IP communication frameworks, includes the transmission of voice as information bundles which after achieving the getting side, reassembles and deciphers according to necessity. This encourages open just as private IP frameworks. The real drawback, keeping numerous organizations off from utilizing VoIP advances is related to the security of this framework. This paper examines a strategy and the following framework that get to arrange data for approved system gadgets. The entrance insights and data empower to follow gadget development all through the system. In addition, it offers to recognize unapproved gadgets making false endeavors to get to the system, presenting to be an approved access gadget.</description><identifier>ISSN: 2277-3878</identifier><identifier>EISSN: 2277-3878</identifier><identifier>DOI: 10.35940/ijrte.B2080.078219</identifier><language>eng</language><ispartof>International journal of recent technology and engineering, 2019-07, Vol.8 (2), p.2459-2474</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Dubi, Ilyas Khudhair</creatorcontrib><creatorcontrib>Waheeb, Ghiath Mageb</creatorcontrib><creatorcontrib>Jabbar, Saif Ahmed</creatorcontrib><creatorcontrib>Sallehuddin, Hasimi</creatorcontrib><creatorcontrib>Satar, Nurhizam Safie Mohd</creatorcontrib><creatorcontrib>Yahya, Farashazillah</creatorcontrib><creatorcontrib>Bakar, Nur Azaliah Abu</creatorcontrib><creatorcontrib>Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia</creatorcontrib><creatorcontrib>Faculty of Information Science & Technology, Universiti Kebangsaan Malaysia</creatorcontrib><creatorcontrib>Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Selangor, Malaysia</creatorcontrib><creatorcontrib>Faculty of Computing & Informatics, Universiti Malaysia Sabah, Malaysia</creatorcontrib><title>System for Rogue VoIP Phone Detection and Managing VoIP Phone Mobility</title><title>International journal of recent technology and engineering</title><description>The quickly propelling Voice over Internet Protocol (VoIP) innovation, is picking up customer fascination in the business today. Its uses, including IP communication frameworks, includes the transmission of voice as information bundles which after achieving the getting side, reassembles and deciphers according to necessity. This encourages open just as private IP frameworks. The real drawback, keeping numerous organizations off from utilizing VoIP advances is related to the security of this framework. This paper examines a strategy and the following framework that get to arrange data for approved system gadgets. The entrance insights and data empower to follow gadget development all through the system. In addition, it offers to recognize unapproved gadgets making false endeavors to get to the system, presenting to be an approved access gadget.</description><issn>2277-3878</issn><issn>2277-3878</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNpN0LtOwzAYBWALgURV-gQsfoGE35f4MkKhUKkVFbfVch07uGpjZIehb4-UMnQ6Zzg6w4fQLYGaNZrDXdzlwdcPFBTUIBUl-gJNKJWyYkqqy7N-jWal7ACAMEE4ExO0eD-WwR9wSBm_pe7X46-03ODNd-o9fvSDd0NMPbZ9i9e2t13su_PFOm3jPg7HG3QV7L742X9O0efi6WP-Uq1en5fz-1XlSKN11bTMM-01Da0lWrVSECBbDjxQG6TiQgrGmXZNSxkEQkJwyoIT0kthtQA2Rez063IqJftgfnI82Hw0BMyoYUYNM2qYkwb7A3qkUn4</recordid><startdate>20190730</startdate><enddate>20190730</enddate><creator>Dubi, Ilyas Khudhair</creator><creator>Waheeb, Ghiath Mageb</creator><creator>Jabbar, Saif Ahmed</creator><creator>Sallehuddin, Hasimi</creator><creator>Satar, Nurhizam Safie Mohd</creator><creator>Yahya, Farashazillah</creator><creator>Bakar, Nur Azaliah Abu</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20190730</creationdate><title>System for Rogue VoIP Phone Detection and Managing VoIP Phone Mobility</title><author>Dubi, Ilyas Khudhair ; Waheeb, Ghiath Mageb ; Jabbar, Saif Ahmed ; Sallehuddin, Hasimi ; Satar, Nurhizam Safie Mohd ; Yahya, Farashazillah ; Bakar, Nur Azaliah Abu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1599-5d3e39e92fda198d76101b404f2af7846763439c5d230f11ffc8a0c67e76a9603</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Dubi, Ilyas Khudhair</creatorcontrib><creatorcontrib>Waheeb, Ghiath Mageb</creatorcontrib><creatorcontrib>Jabbar, Saif Ahmed</creatorcontrib><creatorcontrib>Sallehuddin, Hasimi</creatorcontrib><creatorcontrib>Satar, Nurhizam Safie Mohd</creatorcontrib><creatorcontrib>Yahya, Farashazillah</creatorcontrib><creatorcontrib>Bakar, Nur Azaliah Abu</creatorcontrib><creatorcontrib>Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia</creatorcontrib><creatorcontrib>Faculty of Information Science & Technology, Universiti Kebangsaan Malaysia</creatorcontrib><creatorcontrib>Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Selangor, Malaysia</creatorcontrib><creatorcontrib>Faculty of Computing & Informatics, Universiti Malaysia Sabah, Malaysia</creatorcontrib><collection>CrossRef</collection><jtitle>International journal of recent technology and engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dubi, Ilyas Khudhair</au><au>Waheeb, Ghiath Mageb</au><au>Jabbar, Saif Ahmed</au><au>Sallehuddin, Hasimi</au><au>Satar, Nurhizam Safie Mohd</au><au>Yahya, Farashazillah</au><au>Bakar, Nur Azaliah Abu</au><aucorp>Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia</aucorp><aucorp>Faculty of Information Science & Technology, Universiti Kebangsaan Malaysia</aucorp><aucorp>Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Selangor, Malaysia</aucorp><aucorp>Faculty of Computing & Informatics, Universiti Malaysia Sabah, Malaysia</aucorp><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>System for Rogue VoIP Phone Detection and Managing VoIP Phone Mobility</atitle><jtitle>International journal of recent technology and engineering</jtitle><date>2019-07-30</date><risdate>2019</risdate><volume>8</volume><issue>2</issue><spage>2459</spage><epage>2474</epage><pages>2459-2474</pages><issn>2277-3878</issn><eissn>2277-3878</eissn><abstract>The quickly propelling Voice over Internet Protocol (VoIP) innovation, is picking up customer fascination in the business today. Its uses, including IP communication frameworks, includes the transmission of voice as information bundles which after achieving the getting side, reassembles and deciphers according to necessity. This encourages open just as private IP frameworks. The real drawback, keeping numerous organizations off from utilizing VoIP advances is related to the security of this framework. This paper examines a strategy and the following framework that get to arrange data for approved system gadgets. The entrance insights and data empower to follow gadget development all through the system. In addition, it offers to recognize unapproved gadgets making false endeavors to get to the system, presenting to be an approved access gadget.</abstract><doi>10.35940/ijrte.B2080.078219</doi><tpages>16</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2277-3878 |
ispartof | International journal of recent technology and engineering, 2019-07, Vol.8 (2), p.2459-2474 |
issn | 2277-3878 2277-3878 |
language | eng |
recordid | cdi_crossref_primary_10_35940_ijrte_B2080_078219 |
source | EZB-FREE-00999 freely available EZB journals |
title | System for Rogue VoIP Phone Detection and Managing VoIP Phone Mobility |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T02%3A47%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=System%20for%20Rogue%20VoIP%20Phone%20Detection%20and%20Managing%20VoIP%20Phone%20Mobility&rft.jtitle=International%20journal%20of%20recent%20technology%20and%20engineering&rft.au=Dubi,%20Ilyas%20Khudhair&rft.aucorp=Razak%20Faculty%20of%20Technology%20and%20Informatics,%20Universiti%20Teknologi%20Malaysia&rft.date=2019-07-30&rft.volume=8&rft.issue=2&rft.spage=2459&rft.epage=2474&rft.pages=2459-2474&rft.issn=2277-3878&rft.eissn=2277-3878&rft_id=info:doi/10.35940/ijrte.B2080.078219&rft_dat=%3Ccrossref%3E10_35940_ijrte_B2080_078219%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |