
System for Rogue VoIP Phone Detection and Managing VoIP Phone Mobility
Author(s) -
Ilyas Khudhair Yalwi Dubi,
Ghiath Mageb Waheeb,
Saif Ahmed Jabbar,
Hasimi Sallehudin,
Nurhizam Safie Mohd Satar,
Farashazillah Yahya,
Nur Azaliah Abu Bakar
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.b2080.078219
Subject(s) - voice over ip , gadget , computer science , computer security , hacker , phone , telecommunications , mobile communications over ip , the internet , telephony , protocol (science) , internet privacy , computer network , world wide web , mobile telephony , medicine , linguistics , philosophy , mobile radio , alternative medicine , algorithm , pathology , public land mobile network
The quickly propelling Voice over Internet Protocol (VoIP) innovation, is picking up customer fascination in the business today. Its uses, including IP communication frameworks, includes the transmission of voice as information bundles which after achieving the getting side, reassembles and deciphers according to necessity. This encourages open just as private IP frameworks. The real drawback, keeping numerous organizations off from utilizing VoIP advances is related to the security of this framework. This paper examines a strategy and the following framework that get to arrange data for approved system gadgets. The entrance insights and data empower to follow gadget development all through the system. In addition, it offers to recognize unapproved gadgets making false endeavors to get to the system, presenting to be an approved access gadget.