Font Size: a A A

Research On Vulnerability Analysis And Protection Of Internet Phone Penetration

Posted on:2021-09-14Degree:MasterType:Thesis
Country:ChinaCandidate:Q GuoFull Text:PDF
GTID:2518306290494724Subject:Professional in cyberspace security
Abstract/Summary:PDF Full Text Request
As a convenient and effective communication method,internet telephone has obvious advantages over traditional dial-up phones.It has lower cost and better user experience.It only needs to bear the cost of traffic when communicating.In order to achieve network communication,only one download is needed Corresponding communication software can be used without going to the business hall to handle related business.The emergence of new technologies has also brought new security requirements.How to protect communication parties from interference from external factors when using network traffic for communication has become a top priority in the direction of internet telephone security.In the related research on the security of Internet telephony,researchers have studied a lot of attacks that damage usability and confidentiality.Typical ones are Do S(Denial of Service)attacks and MITM(Man In The Middle),People have multiple countermeasures against these attacks.and there are few studies on attacks that damage privacy and are not easily detected,and lack corresponding defense measures and confrontation experience.When the Internet phone communicates with each other,its data packets often pass through the server before being sent to the other party's terminal.In this paper,through the study of the content of the data packet passing through the server,it is found that the server will allow unauthorized data packets to pass under certain conditions.This article refers to it as the server being illegally penetrated.With this data packet,the attacker can It can transmit information or send illegal data packets to the receiver without being noticed.For example,business spies inside the enterprise can steal corporate secrets in this way.This type of attack poses a greater security threat to user privacy,and the quality of voice calls is therefore affected to a certain extent.In order to have a more comprehensive understanding of the harmfulness of this attack,this article analyzes the entire attack process with the help of routers based on the openwrt system.The specific method is to first use the netfilter mechanism to capture the data packets in the communication flow passing through the server,and then use a script program to analyze the meaningful data and record the corresponding data packet offset,and then capture a data After the package,fill in the corresponding value on its characteristic bit to form a complete test data package and send it to the receiver.If the receiver cannot receive it,the sender also needs to adjust the check value check range to achieve success The purpose of server penetration.The experimental results show that the receiver can receive this test data packet with customized content,which also shows that in this way,the attacker can illegally penetrate the server.The vulnerability of each communication software server when facing this attack method is different.This article analyzes the server vulnerability from three perspectives from the perspective of the number of data packets,the protection strength of the server,and the penetration results.Generally speaking,this kind of attack has strong concealment.If we take the way of replacing the original packets,we can't find the trace of attack from the packet flow and real-time communication performance.But this kind of attack can not be prevented.Adding security protection measures from the level of communication protocol is the best defense way,which can effectively eliminate the related security risks.Specific measures,such as increasing the session value with time effect,or encrypting the communication packets.In addition,some protection measures such as adding verification algorithm,using firewall to filter traffic,using traffic monitoring software to monitor traffic in real time can also provide some protection against this attack.
Keywords/Search Tags:penetrate attack, Server security, openwrt, router, online telephone
PDF Full Text Request
Related items