voip project in java

A known example related to the Skype, security breach can now easily tracked the infrastructure provided (Source: Leyden, J “Say Hello to the Skype Trojan”. published on Oct 18, 2005).

Problem Description: The detection and rectification of the security breach in the windows Skype users have been completed.

Chances of an incorrect file transfers can exist if the Skype URL malfunctions due to break in required parameters, either by the system’s vulnerability or by an attack on the original source code of the web page. This could also occur due to the end user error. Impact on the Skype software before 2.5 can be effective based on the attack that could be fatal. Hence it’s always preferred that the Skype is directly installed from the Skype URL which will help ensuring there are regular updates and monitoring (p.456-498). In case of a windows xp or professional operating system, certification is signed and authenticated by “VeriSign class 3 codes Signing 2009 CA”.

Along with the installation of the software, the end user will also receive a bulletin for security purposes, helps in removing a possible breach. Given below are arrays of base vectors that have a correct reflection, pre-assigned by VeriSign:

Access Vector (AV) Remote
Access Complexity (AC) Low
Authentication(Au) Not Applicable
Confidentiality Impact (C) Partial
Integrity(I) None
Availability Impact(A) None
Impact Bias(B) Confidentiality
   

VOIP Project Report

P2P AND ITS SECURITY IMPLEMENTATIONS IN VOIP NETWORK:

There have been several instances where hackers have been penalized by the law on account of VOIP theft. As per the law, the P2P services have a high ratio. 

There have been instances where organizations have faced theft loss. Security issues in P2P networks have been dominantly significant, and the methodology used to secure these systems will be the focus of the report.

He says that Skype has been the only safest, secure dependable means to deliver P2P VoIP services which functions with a 256 K AES infrastructure.

This is called the public key infrastructure. It is favorable and right to examine the code of signing an authority for the P2P networking client as the report is based on Skype. A market leading authority in protection provision is VeriSign.

A very large number of clients today utilize VeriSign, while the network is indomitable barrier. VeriSign is the monopoly in maintaining the World Wide Web’s root zone file and they process all changes to it, meaning vouching, binding public access to users.

This is performed by carrying out software at a centralized zone, systematizing software at distributed locations.

The public access or keys are then embedded in electronic algorithms that are used to encrypt and decrypt messages transferring from one location to another (Allen, P. 2006).

The end user will be able to electronically make signatures on their messages or emails by using a private key, while the receiver of the email is also given the VeriSign software in order to verify the signature of the original host.

Voice Over Internet Protocol PPT Seminar

VOIP SECURITY ISSUES:

Voice Over Internet Protocol VOIP has no security issues in earlier days. Now that VOIP is gaining void acceptance and becoming one of the main stream communication technologies. Now a day’s security issues have become a major issue. This type of system is called POTS (plain old telephone system).

Identity and Service Theft:

                 Security issues can be solved by using Phreaking (Kind of Hacking) technique. This gathers the information from a service provider. As SIP (Session initiation protocol) encryption technique is not so common that controls the authentication of VOIP. So, the clients trusted data are subjected to theft.

Eavesdropping is a most common technique used by hackers to steal the data. In this technique the intruder acquires phone numbers, names and passwords allowing them to service theft.

Stealing credentials is used to make calls without paying for it and also get business data by using the identity theft.

An intruder can change the packages and plans or make calls using the authenticated users account. The intruder can also access the personal information like voicemails, call forwarding numbers and also can change the user profile.

VOIP Phishing is another technique were a third party person calling you on a fake id (eg: friend) and requesting you for the credentials and often critical information. It is also known as Vishing.

DIFFERENT THREAT IN VOIP:

  • DOS
  • SPIT
  • CALL TAMPERING
  • MAN-IN-THE-MIDDLE ATTACK

Dos:

          Denial of service is an attack on network of systems. It attacks by consuming band width of the network or simply overloading a network.

In VOIP the attacks can be carried out with call signaling messages which degrades the services which ultimately results in premature call drops and halts the call dropping.

Reverse attack can get remote access to the administrative functionalities of a system.

Spit:

          It is also known as spamming over Internet Telephony. Actually spamming means sending mails to people against their will. It is not so common in VOIP yet.

Every account in VOIP has a unique IP address using this spammer’s send their voice mails. As a result voice mails will be blocked. The spams may contain viruses or worms along with them.

Call tampering:

          It is a type of attack where a tampering of phone call progress is involved. Example the quality of a call can be spoiled by injecting noise packets in the communication data stream. Intruder can also delay the delivery of packets.so that communication can become spotty.

Man-in-the-middle attacks:

          In this type of attack the intruder intersect the call signals of SIP messages and masquerades as the calling party to the called party.

Download Voice Over Internet Protocol PPT Seminar

Voice Over Internet Protocol Final Year Project

The digital revolution forced the people to find means for digital communication this led to the emergence of Internet Protocol (IP) based data networks which differ in many ways. The introduction of voice over internet protocol (VOIP) has made it possible to use the IP networks for all the telephonic calls.

Evolution

In the late 2003 or the early 2004 the VOIP services over broadband services was introduced. However the technology found its place only in the year 2009, when many corporate services started using VOIP for long distance communication and as we are human and it is in our nature that we don’t get satisfied with anything so we can expect more development in the technology and hence the future for VOIP is very bright. The need for the growth of the technology could also be due to the increase in the number of users subscribing. As the eMarketer’s estimate shows, the number of residential VoIP subscribers is expected to grow rapidly from 37.8 million paid subscribers in 2006 to 152.6 million in 2011. This also buids pressure on the providers for providing quality service to the user so services are finding different ways not only to attract new users but also to satisfy existing users.

 Aim of the project:

This Voice Over Internet Protocol Final Year Project is to investigate security involvement in VOIP. The procedures are for a secure, safe and reliable. VoIP is to propose the security methods. Based on the safety measure requirements 13 securities have been shortlisted and the thesis has furthered alongside to account any key data that required development. Routinely showing up measure is the security parameter, quality of service values, like latency, voice echoes and packet loss. To arrive at the accurate choice measures over the above parameters the thesis has been elaborated in aspects of Project Design and simulation. Researcher has put into use proprietary software which includes Visual Route, Minitab and VoIP Calculator.

Research Objectives:

As noted in the disadvantages, it is important to focus more on security and quality issues with reference to the VOIP technology to streamline to data pertinence for using a deployment project. The project aims at fulfilling the objective on a step by step approach of each objective:

          a) Over viewing/examining of VoIP technology.

          b) Recognizing common security threats, previously failed procedures.

          c) Review based on existing VoIP encryption methods and their efficiency.

          d) Recognizing problems with VoIP protocols.

          e) Designing a method.

          f) Lastly to simulating the design into a project.

Project on Controlling IP Spoofing through Interdomain Packet Filters

Border Gateway Protocol (BGP):

The Border Gateway Protocol decides the best destination, and emerges with the database table(IP routing), datagram packets are only moved forward based the IP table, BGP table does not based on routes.

IEEE Project on Controlling IP Spoofing through Interdomain Packet FiltersAs each node is a distinct notation, the BGP will determine only a single best path. For deciding ther best path the BGP uses tie-breaking algorithm, this process is continued until the best metrics are concluded to forward the data to the destination. The below are conditions are considered while checking the conditions:

  • Always the first is treated as the best path, if any path exist after the first path then they are compared to the firstly path and selects the best path between them.
  • To check whether the route is valid or not valid
  • With the help of IGP (Interior Gateway Protocol) the route must be synchronized.
  • The route must be appeared in the table (routing table).
  • The next node must be a reachable destination.

The below menu will be used to determine the best path:

  • The highest weight paths are to be preferred.
  • Next, the highest local preference paths are to given importance.

Download Java Final Year Project on Controlling IP Spoofing through Interdomain Packet Filters

Constructing IDPFs using BGP

In this thesis, we have suggested and studied IDPF architecture as an efficient countermeasure for the IP spoofing based DDoS attacks. IDPFs depend on BGP update messages interchanged on the Internet to conclude the validity of source address of a packet send by a neighbor.

We have demonstrated that IDPFs can easily be deployed on the present BGP based Internet routing architecture. We learned the conditions under which the IDPF framework can properly work without discarding any legitimate packets. IDPFs in an important manner limit the spoofing capability of attackers. In addition, they also assist to pinpoint the true origin of an attack packet to be within a small number of candidate networks, thus simplifying the reactive IP traceback process.

Constructing IDPFs using BGPThe attached Constructing IDPFs using BGP Project Contains the below:

TABLE OF CONTENT

ABSTRACT

ACKNOWLEDGMENT

TABLE OF CONTENT

LIST OF FIGURES

LIST OF TABLES

LIST OF ACRONYMS

Chapter 1: Introduction to the Project

1.1 History of the Project

1.2 Proposed System

1.3 Aims and Objectives of the Project

1.4 TCP and IP Protocol

1.5 How Spoofing works

      1.5.1 Uses of Spoofing

      1.5.2   Spoofing purpose

              1.6 Conclusion

Chapter 2: Types of Spoofing

                2.1 DDOS Attacks

                2.2 Non-Blind Spoofing

                2.3 Blind Spoofing

                2.4 Man in the middle attack

               2.5 Conclusion
Constructing IDPFs using BGP1

Chapter 3: Security Requirements

                 3.1 Network security requirements

                 3.2 System security requirements

                  3.3 Information Security requirements

                 3.4 Conclusion

Chapter 4: Threats on data

                 4.1 Hackers

                4.2 Vulnerability

                4.3 Viruses

                4.4 Trojan horse programs

                 4.5 Attacks

                  4.6 Conclusion

Chapter 5: Security Policies

                 5.1 What are policies?

                 5.2 Firewalls

                 5.3 Encryption

                 5.4 Intrusion Detection

                 5.5 Conclusion

Chapter 6: Review on BGP Protocol

                  6.1 Background

                  6.2 BGP Operations

                       6.2.1 Interautonomous system routing

                       6.2.2 Intra-autonomous system routing

                       6.2.3 Pass-through autonomous system

                  6.3 BGP Routing

                  6.4 BGP Message Types

                       6.4.1 Open message

                       6.4.2 Update message

                       6.4.3 Notification message

                       6.4.4 Keep-alive message

                   6.5 Conclusion

Chapter 7: BGP and AS interconnections

                  7.1 Policies and Route Selection

                   7.2 AS Relationships and Routing Policies

                   7.3 Conclusion

Chapter 8: IDPF Architecture

                   8.1 IDPF Overview

                   8.2 Constructing IDPFs

                        8.2.1 Correctness of IDPF

                         8.2.2 Routing policy complications

                   8.3 Practical Deployment of IDPF

                   8.4 Conclusion

 Chapter 9: Design and Implementation

                  9.1 Technologies Used

                      9.1.1 Javax.swing

                      9.1.2 Java.io package

                       9.1.3 Java.net package

                      9.1.4 Java.sql package

                        9.1.5 Java.awt package

                  9.2 Tools Used

                    9.2.1 Jframe Builder Tool

                9.3 Code Snippet

                9.4 Screen shots

Chapter 10: Conclusion and Future work of the Project

References to  the Project

Download CONSTRUCTING INTER-DOMAIN PACKET FILTERS BASED ON BGP UPDATES TO CONTROL IP SPOOFING Java Final Year Project with source code.

Location-Based Spatial Query Processing in Wireless Broadcast Environments

The Location-Based Spatial Query Processing in Wireless Broadcast Environments project executes in jdk 1.6
Steps to Execute:

  • double click on c_server bat file in source code folder
  • double click on mh1 bat file in source code folder
  • double click on mh2 bat file in source code folder
  • double click on mh3 bat file in source code folder
  • follow the rules present in the attached vedio

Hardware Requirements:

PROCESSOR        :    PENTIUM IV 2.6 GHz
RAM         :  1 GB DD RAM
HARD DISK         :  80 GB

Software Requirements:

JDK 1.5
Java Swing
SQL Server
HTML
Java Script
SQL Server

Brief Info:

          Location-Based Spatial Query Processing in Wireless Broadcast Environments           The web pages are just the test-encoding of what the application intends to present to the users. Every web site has get a unique address called Uniform Resource Location (URL) or the Internet Protocol (IP) address. The URL is an address that the web uses to find the specific information on the Internet. The URL can locate something which is local to the system or anywhere remote on the Internet. An example of web site address could be https://1000projects.org where http:// represents the protocol path and www.1000PROJECTS.ORG represents the domain organization. Similarly we do have .GOV for government, .EDU for educational institutions etc.

HTTP is a protocol that moves the html documents over the Internet.

                     HTML is a format for storing the documents and the web site. Every web site has got a bunch of html documents. This html is not a programming language. All the documents that you view on the www are created using the html. The www uses a set of protocols like http that gives the Internet users to access to a vast amount of information on the Internet .

Download Location-Based Spatial Query Processing in Wireless Broadcast Environments Final Year Java Project

Download Location based spatial query processing in wireless broadcast environments project 2008 base paper, project report and source code in java.

Monitoring Online Tests through Data Visualization Project

In the Monitoring Online Tests through Data Visualization Project, We would like to devise new visual representations and perform further experiments, possibly in combination with classical data mining algorithms. Moreover, since the approach leads itself to the application to other application fields such as e-commerce, in the future, I would like to evaluate its use in these contexts. Finally, I wish to explore more deeply the problem of cheating detection, which we just treat in broad terms here, since we believe that an approach based on logging and visualization can be promising and effective to this aim.

Monitoring Online Tests through Data Visualization IEEE ProjectSteps to run the Project:

1)Import  project.

2)Run database Script.

3)Run application in myeclipse server.

4)It will automatically shows login page.

5)You have to choose examination.

6)Answering the questions by using options.

7)Click on logout.

Download Monitoring Online Tests through Data Visualization Java Final Year Project Documentation with Source Code

Route Stability in MANETs under the Random Direction Mobility Model

The attached Route Stability in MANETs under the Random Direction Mobility Model Final Year ASP.Net Project Contains the below table of contents:

  • Scope of the project:
  • Literature review:
  • Modules:
  • Module Description:
  • System Architecture:
  • Dataflow diagram:
  • UML Diagrams:
  • Use case diagram:

Random Direction Router

Brief Info:

                      A WWW is global hypertext system that uses the Internet system as its transmission medium. It contains all the hypertext media, which are connected by links all these are wrapped up in a web. A collection of documents inter linked by hyperlinks is called a web.Client

An Internet is a network of closely connected computers all over the world where each computer acts a web site.

An Intranet is a network of connected computers with in a domain.

A Web site is a computer system that runs a web server and has been for publishing documents. Some of the computers which act as the store house of information is called a web site. It is a collection of web pages connected together with hyperlinks so that each is associated with the others. Some web site may have a single document while consist of hundred of pages.

Server

                      A home page is a document that serves as an initial point of entry to web site of related documents. It contains introductory information, hyperlinks to resources and navigation buttons to help users find their way among the various documents.

Hardware Requirements:

  • Processor                : P IV 2.4 GHz.
  • Hard Disk           : 80 GB.
  • RAM Speed                     : 2 GB.

Software Requirements:

  • OS         : – XP
  • Front End                     : – ASP.Net 2.0, HTML, Java Script
  • Programming Language         :- Visual C# .Net

Download Route Stability in MANETs under the Random Direction Mobility Model

Telecom Business Management Systems .Net Project

 As we have already seen that the need cannot be emphasized further the development of this system is only timely and helpful to any Telecom corporate company, the system defined in the above script is up to date and caters to all kinds of request faced by the telecom industries.

Based on the various parameters and properties files everything from the look and feel to the functionalities can be customized.

Thus this project is developed from the beginning with reuse in mind and implicitly uses several design patterns.

The architecture of this project is such that it suits the diverse and distributed nature of the telecom industries and applications.

telecom-business-management-systems-net-projectThe features provided by the (Telecom Business Information System) are in no means comprehensive but by all means full filling and all important functionalities of any live telecom service provider.

 The inclusion of further functionalities as days go by can be easily done because the project has been developed in a layered architecture.

Plug-in modules would easily add new features which change with the times and being performance oriented the project will not face any issues. 

It is also extensible and scalable as all telecom apps should be thus it can be said that it will meet surges of huge customer requests that may come up in the near future.

Download Telecom Business Management Systems .Net Project