Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7),...

202
Evaluation of users’ perspective on VoIP’s security vulnerabilities A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science (Computer and Information Science) By Alireza Heravi Supervisors: Professor Jill Slay Dr

Transcript of Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7),...

Page 1: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Evaluation of users’ perspective on VoIP’s security vulnerabilities

A thesis submitted in partial fulfillment of the requirements for the degree of

Master of Science (Computer and Information Science)

By

Alireza HeraviSupervisors: Professor Jill Slay

School of Computer and Information ScienceMawson Lakes CampusUniversity of South Australia

July 2011

Dr Sameera Mubarak

Page 2: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

AbstractAbstract

Voice over Internet protocol (VoIP) is a relatively new technology, representing a major new

trend in telecommunications and an alternative to traditional phone systems. The lower cost and

greater flexibility of VoIP are the key drivers that are making it widely acceptable. VoIP refers to

the transmission of voice conversations over IP-based networks. On the sending side, a VoIP

system converts voice, which is an analog signal, into a digital signal, splits it into packets and

transports it over IP networks. Conversely, on the receiving side, the digitized voice data is

reassembled and decoded.

VoIP, like other technologies, introduces both opportunities and security risks. VoIP uses IP

networks and therefore inherits their vulnerabilities. Adding voice traffic to IP networks

complicates security issues and introduces a range of vulnerabilities. A VoIP system may face

either an exclusive attack or an attack to the underlying IP network. To retain a secure VoIP

system, both IP network and the VoIP-specific security issues must be addressed. It cannot be

assumed that VoIP systems will remain secure if they are plugged into a secure IP network. For

this reason VoIP systems require additional security controls.

The significance of security and privacy in VoIP communications are well known, and many

studies mostly from the technical perspective have been published. However to date, no known

research has been conducted to evaluate users’ perspectives on these issues. In light of this

scarcity, this thesis aims to evaluate users’ awareness of VoIP security vulnerabilities, and their

attitudes towards privacy in VoIP communications.

I

Page 3: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

DeclarationDeclaration

I declare that this thesis does not, to the best of my knowledge and belief, incorporate without

acknowledgment any material previously submitted for a degree or diploma in any university, or

contain any materials previously published or written by another person except where due

reference is made in the text.

Alireza Heravi

12 June 2011

II

Page 4: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

AcknowledgmentsAcknowledgments

During working on this thesis, I was being assisted and supported either directly or indirectly.

Either way, each and every one’s contribution has been of immense help. I thank them dearly for

their time and effort.

In particular, I wish to express my gratitude to Professor Jill Slay and Dr Sameera Mubarak, my

thesis supervisors, for their persistence and support. I truly appreciate their input, help and

support.

I also must thank my mother and my sister in law, Dr Siavoush Kahkeshan, for their support and

my dearest friend, behdad, for encouraging me.

III

Page 5: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Table of ContentsTable of Contents

Chapter 1- Introduction...........................................................................................................11-1 Overview....................................................................................................................................2

1-2 Background................................................................................................................................2

1-3 Purpose of this study..................................................................................................................3

1-4 Research question......................................................................................................................3

1-5 Significance of this study............................................................................................................4

1-6 Summary of thesis chapters........................................................................................................5

Chapter 2- Literature Review...................................................................................................62-1 Overview....................................................................................................................................7

2-2 Groundwork of VoIP...................................................................................................................7

2-2-1 Telephony system......................................................................................................................7

2-2-2 The Internet...............................................................................................................................8

2-3 VoIP Architecture.......................................................................................................................9

2-3-1 PSTN versus VoIP........................................................................................................................9

2-3-2 VoIP implementation................................................................................................................10

2-3-2-1 PC-to-PC............................................................................................................................10

2-3-2-2 PC-to-Phone/ Phone-to-PC................................................................................................11

2-3-2-3 Phone to Phone.................................................................................................................13

2-4 VoIP Technology.......................................................................................................................14

2-4-1 Signaling...................................................................................................................................15

2-4-2 Encoding/Decoding..................................................................................................................16

2-4-3 Transport..................................................................................................................................17

2-4-3-1 Bandwidth efficiency.........................................................................................................20

2-4-4 Gateway...................................................................................................................................25

2-5 Security/privacy.......................................................................................................................27

2-5-1 VoIP/PSTN security: a comparison...........................................................................................28

2-5-2 VoIP security.............................................................................................................................28

2-5-2-1 General VoIP security issues..............................................................................................30

IV

Page 6: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

2-5-2-2 VoIP providers’ security issues..........................................................................................30

2-5-2-3 SIP/H.323 security.............................................................................................................32

2-5-2-4 Man-In-The-Middle (MITM) and Denial of Service (DoS)..................................................33

2-5-2-5 Spam over Internet Telephony..........................................................................................34

2-5-2-6 Biometric encryption.........................................................................................................35

2-5-3 Myths about VoIP security.......................................................................................................35

2-5-4 VoIP Threat Taxonomy.............................................................................................................36

Chapter 3- Methodology........................................................................................................403-1 Overview..................................................................................................................................41

3-2 Approach..................................................................................................................................42

3-2-1 Research epistemologies..........................................................................................................42

3-2-1-1 Positivist studies................................................................................................................43

3-2-1-2 Interpretation studies.......................................................................................................44

3-2-1-3 Critical studies...................................................................................................................45

3-2-2 Qualitative or quantitative research.........................................................................................46

3-2-1-1 Qualitative research..........................................................................................................46

3-2-1-2 Quantitative research........................................................................................................47

3-2-1-3 Triangulation.....................................................................................................................48

3-2-1-4 Compare and contrast: quantitative versus qualitative research......................................50

3-2-3 Research reasoning process.....................................................................................................52

3-2-3-1 Deductive reasoning..........................................................................................................52

3-2-3-2 Inductive reasoning...........................................................................................................52

3-2-3-3 Compare and contrast: deductive versus inductive reasoning..........................................53

3-3 Sampling..................................................................................................................................54

3-4-1 General universe, population and sample................................................................................55

3-4-2 Sampling types.........................................................................................................................56

3-4-3 The used sampling type............................................................................................................57

3-4-3-1 Simple Random Sampling..................................................................................................58

3-4-3-2 Purposive sampling...........................................................................................................59

3-4 Data Analysis (Quantitative Data).............................................................................................60

3-4-1 Coding......................................................................................................................................60

V

Page 7: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

3-4-2 Relationship between variables...............................................................................................61

3-5 Research Ethics.........................................................................................................................62

3-6 Questionnaire design................................................................................................................63

3-7 Summary..................................................................................................................................64

Chapter 4- Results and discussion..........................................................................................654-1 Overview..................................................................................................................................66

4-2 The survey results.....................................................................................................................66

4-2-1 Background..............................................................................................................................67

4-2-1-1 Nationality.........................................................................................................................67

4-2-2-2 Average monthly talking time...........................................................................................68

4-2-3-3 Average monthly international call time via phone/mobile..............................................70

4-2-4-4 Using computers to make calls/voice chat........................................................................73

4-2-5-5 Average monthly use of computers to make calls/voice chat...........................................74

4-2-6-6 Preferred way to make international calls........................................................................75

4-2-7-7 Preferred service for international calls via land line/mobile............................................77

4-2-8-8 Preferred software for making calls/voice chat.................................................................79

4-2-2 Awareness/attitude towards VoIP security/privacy.................................................................80

4-2-2-1 Concerned features when making international calls.......................................................80

4-2-2-2 Comparison of security between international/long distance calls and domestic calls....82

4-2-2-3 Privacy concerns when making calls..................................................................................84

4-2-2-4 Traditional telephony security versus VoIP security..........................................................86

4-2-2-5 Concern about VoIP privacy (eavesdropping)...................................................................88

4-2-2-6 Possibility of privacy breaches in VoIP versus traditional telephony.................................90

4-2-2-7 Concern about VoIP security.............................................................................................91

4-2-2-8 Possibility of privacy/security breaches in VoIP................................................................92

4-2-2-9 Discussing security/privacy issues with service providers.................................................93

4-2-2-10 The discussed security/privacy issues with service providers.........................................93

4-3 Discussion of the results and findings.......................................................................................94

4-3-1 Background..............................................................................................................................94

4-3-1-1 Nationality.........................................................................................................................94

4-3-1-2 Average monthly talking time...........................................................................................95

VI

Page 8: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

4-3-1-3 Average monthly international call time...........................................................................96

4-3-1-4 Using computers to make calls/voice chat........................................................................97

4-3-1-5 Average monthly use of computer to make calls/voice chat............................................98

4-3-1-6 Preferred way to make international calls........................................................................99

4-3-1-7 Preferred service for international calls via land line/mobile..........................................100

4-3-1-8 Preferred software for making calls/voice chat...............................................................100

4-3-2 Awareness/attitude towards VoIP security/privacy...............................................................100

4-3-2-1 Concerned features when making international calls.....................................................100

4-3-2-2 Comparison of security between international/long distance calls and domestic calls. .101

4-3-2-3 Privacy concerns when making calls................................................................................102

4-3-2-4 Comparison of VoIP and traditional telephony from privacy/security perspective.........102

4-3-2-5 Concern about VoIP privacy (eavesdropping)/security...................................................103

4-3-2-6 Discussing security/privacy issues with service providers...............................................103

4-4 Limitations..............................................................................................................................104

4-5 Further research.....................................................................................................................104

4-6 Summary................................................................................................................................105

Chapter 5- Conclusion….......................................................................................................106

Appendix A – Participant information sheet........................................................................110Appendix B- Recruitment email...........................................................................................112Appendix C – Questionnaire................................................................................................113

References...........................................................................................................................117

VII

Page 9: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

List of FiguresList of Figures

Chapter 2Chapter 2

Figure 2-1 VoIP implementation: PC-to-PC.......................................................................................................11Figure 2-2 VoIP implementation: PC-to-Phone.................................................................................................12Figure 2-3 VoIP implementation: Phone-to-PC.................................................................................................12Figure 2-4 VoIP implementation: Phone-to-Phone...........................................................................................13Figure 2-5 Pure VoIP implementation: IP Phone-to-IP Phone..........................................................................13Figure 2-6 Multi-site enterprise VoIP implementation.....................................................................................14Figure 2-7 IP header.........................................................................................................................................17Figure 2-8 UDP header.....................................................................................................................................18Figure 2-9 RTP/UDP/IP packet…….…......…Figure 2-10 RTP/UDP/IP packet.......................................................19Figure 2-11 RTP header....................................................................................................................................19Figure 2-12 IPv4/UDP/RTP headers (40 bytes).................................................................................................22Figure 2-13 IPv6/UDP/RTP headers (60 bytes).................................................................................................22Figure 2-14 IPv4/IPv6/UDP/RTP header compression......................................................................................23Figure 2-15 50% payload efficiency..................................................................................................................23Figure 2-16 VoIP/PSTN gateway.......................................................................................................................26

Chapter 3Chapter 3Figure 3-1 Overall research process.................................................................................................................41Figure 3- 2 Deductive research reasoning process Figure 3-3 Inductive research reasoning process................53Figure 3-4 Sampling overlapping entities.........................................................................................................55Figure 3-5 Classification of sampling................................................................................................................57

Chapter 4Chapter 4Figure 4-1 Overall results by country...............................................................................................................67Figure 4-2 Number of Participants by Country.................................................................................................67Figure 4- 3 The main reason for choosing a service for international calls via Land line/mobile.......................78Figure 4- 4 Reason for choosing software for making calls/ voice chat by computer........................................80Figure 4-5 The most concerned feature when making international calls.........................................................80Figure 4- 6 Valid and irrelevant answers..........................................................................................................92Figure 4- 7 Valid, invalid and irrelevant answers..............................................................................................94

VIII

Page 10: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

IX

Page 11: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

List of TablesList of Tables

Chapter 1Chapter 1Table 1- 1 summary of thesis chapters........................................................................................................................... 5

Chapter 2Chapter 2Table 2- 1 Audio Codecs............................................................................................................................................... 16Table 2-2 The three myths about VoIP security............................................................................................................36Table 2-3 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – Misrepresentation treat..........................................37Table 2- 4 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – various treats.........................................................38Table 2-5 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – Interruption of Service treat....................................39Table 2- 6 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – Other Interruption of Service treat.........................39

Chapter 3Chapter 3Table 3-1 The Different axioms between qualitative (naturalist) and quantitative (positivist) research.........................50Table 3-2 Qualitative and quantitative research compared and contrasted (adapted from Glesen and Peshkin (1992)

.............................................................................................................................................................. 51Table 3- 3 Definition of group of individuals in this thesis.............................................................................................55Table 3- 4 Data Analysis............................................................................................................................................... 61

Chapter 3Chapter 3Table 4-1 Average monthly talking time....................................................................................................................... 68Table 4-2 Relationship between talking time and being concern about VoIP privacy (eavesdropping)...........................69Table 4-3 Relationship between talking time and being concern about VoIP security....................................................69Table 4- 4 Average monthly international call time......................................................................................................70Table 4-5 Relationship between international talking time and being concern about privacy when making calls...........71Table 4-6 Relationship between international talking time and being concern about VoIP privacy (eavesdropping)......71Table 4-7 Relationship between international talking time and being concern about VoIP security...............................72Table 4- 8 Usage of computers to make calls/voice chat...............................................................................................73Table 4-9 Relationship between using computer to make calls/voice chat and possibility of privacy breaches..............73Table 4-10 Average monthly use of computer to make calls/voice chat........................................................................74Table 4-11 Preferred way to make international calls...................................................................................................75Table 4-12 Relationship between the preferred way to make international calls and participants’ opinion about

whether traditional telephony is more secure than VoIP................................................................................75Table 4-13 Relationship between the preferred way to make international calls and participants’ concern about

VoIP privacy................................................................................................................................................... 76Table 4-14 Relationship between the preferred way to make international calls and participants’ concern about

VoIP security.................................................................................................................................................. 77Table 4-15 Preferred software for making calls/voice chat...........................................................................................79Table 4-16 Relationship between the most concerned feature when making international and participants’ concern

about VoIP privacy......................................................................................................................................... 81

X

Page 12: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Table 4- 17 Are international/long distance calls less secure than domestic calls?.........................................................82Table 4-18 relationship between participants’ opinion about whether international/long distance calls are less

secure than domestic calls and whether privacy breaches in traditional telephony is more possible or in VoIP............................................................................................................................................................... 83

Table 4- 19 Concern about privacy when making calls/ voice chat (Five-point scale).....................................................84Table 4-20 relationship between participants’ concerns about privacy when making calls and participants’ concerns

about VoIP privacy......................................................................................................................................... 85Table 4-21 relationship between participants’ concerns about privacy when making calls and participants’ concerns

about VoIP security........................................................................................................................................ 86Table 4-22 Is traditional telephony (land line/mobile) more secure than VoIP?............................................................87Table 4-23 relationship between participants’ opinion about whether traditional telephony is more secure than

VoIP and whether privacy breaches in traditional telephony is more possible or in VoIP.................................87Table 4-24 Concern about VoIP privacy (eavesdropping)..............................................................................................88Table 4-25 relationship between participants’ concern about VoIP privacy and VoIP security.......................................89Table 4-26 Privacy breach is more possible in traditional telephony or VoIP?...............................................................90Table 4-27 Concerned about VoIP security (Five-point scale)........................................................................................91Table 4-28 Discussing security/privacy issues with telephone/VoIP service provider....................................................93Table 4-30 The discussed security/privacy issues with service providers.......................................................................93

XI

Page 13: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

AcronymsAcronyms

ARPANET Advanced Research Projects Agency Network

CLASS Custom Local Area Signaling Services

codec coder - decoder

iLBC Internet Low Bitrate Codec

IN Intelligent Network

ITU International Telecommunication Union

ITU-T International Telecommunication Union - Telecommunication Standardization Sector

PCM pulse code modulation

POTS Plain Old Telephone Service

PSTN Public Switched Telephone Network

QoS Quality of Service

RTCP Real Time Control Protocol

RTP Real-time Transport Protocol

SIP Session Initiation Protocol

SS7 Signaling System 7

TCP Transmission Control Protocol

UDP User Datagram Protocol

VDA Voice Activity Detection

VoIP Voice over IP

XII

Page 14: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Chapter 1- IntroductionChapter 1- Introduction

This chapter serves as the introduction to this thesis and reviews the background literature. It is

organized as follows:

Section 1.1 provides an overview of this chapter

Section 1.2 introduces the background of this thesis

Section 1.3 states the purpose of this thesis

Section 1.4 defines the aims of this thesis

Section 1.5 states the research questions which this thesis intends to answer

Section 1.6 describes the significance of this thesis

Section 1.7 summarizes the chapters of this thesis

13 Chapter 1- Introduction |

Page 15: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

1-1 Overview1-1 Overview

The following section discusses the background of this thesis by introducing a general overview

of Voice over Internet Protocol (VoIP) technology and its security and privacy vulnerabilities.

First, the purpose and aims of this study are defined. Next, the major research question that

this thesis intends to answer is stated, followed by a discussion on the significance of this thesis.

Thirdly and finally, a summary of how the following chapters are organized is provided.

1-2 Background1-2 Background

For almost a century, person-to-person communication was dominated by Bell’s legacy, the

traditional telephony system. Due to recent advances in the Internet since the 1990s, the

“Internet Telephony” technology has now enabled person-to-person communication to take

place via computer networks on a global scale.

VoIP is an umbrella term for the technologies that enable voice to be transmitted over packet-

switched IP networks, such as the Internet. VoIP is comprised of a large number of components

including, end user equipment (traditional handsets, softphones or PCs and IP phones), end

user applications (Skype, X-Lite, Net-Meeting, etc.), call managers, gateways, switches, routers

and protocols.

The lower cost and greater flexibility that characterize the main advantages of VoIP over the

public switched telephone network (PSTN) are mostly related to the method that voice is

transmitted. However, this method - the convergence of voice and data in IP networks -

complicates security issues and introduces new vulnerabilities. VoIP systems are vulnerable to

both VoIP-specific attacks and attacks to the underlying IP network. Consequently, VoIP systems

require additional security controls.

14 Chapter 1- Introduction |

Page 16: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

In the literature, VoIP security has been addressed from technical and industrial perspectives.

However, no known research to the best of the researcher’s knowledge has evaluated users’

perspectives on VoIP security and privacy vulnerabilities. To bridge this gap, this study seeks to

evaluate the users’ awareness and attitude towards privacy and security issues in VoIP

communications. The research methodology that was employed to investigate these matters is

quantitative and an on-line questionnaire was designed to collect information.

1-3 Purpose of this study1-3 Purpose of this study

The significance of security issues in VoIP communications are well known, and many papers

have been published to address VoIP’s security vulnerabilities. To date, however, no known

research has been conducted to evaluate users’ perspective on these issues.

This study seeks to evaluate users’ awareness of VoIP security vulnerabilities, and their attitude

towards privacy in VoIP communications. An on-line questionnaire was designed to collect

information in order to investigate this matter. Chapter 3 explains the on-line questionnaire’s

approach and how it was designed, while Chapter 4 presents the results of the study.

1-4 Research question1-4 Research question

This thesis aims:

1- To explore the users’ perspective on security and privacy issues while using VoIP

services to communicate with other people.

2- To study the awareness of VoIP users about security issues and their attitudes towards

security-related vulnerabilities.

The aims of this research are achieved by addressing the following question:

15 Chapter 1- Introduction |

Page 17: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

To what extend are VoIP users aware of VoIP security vulnerabilities and what are their

attitudes towards these issues?

To answer this question, a number of subsidiary questions will be explored in the following

order:

1- What is VoIP security?

2- What are the sources of VoIP’s security vulnerabilities?

3- What is VoIP security and privacy threat taxonomy?

1-5 Significance of this study1-5 Significance of this study

The innovative nature of this study lies in the fact that it is examining security vulnerabilities of

VoIP from users’ perspective. To the best of the researcher’s knowledge, no such similar

academic research has been conducted.

16 Chapter 1- Introduction |

Page 18: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

1-6 Summary of thesis chapters1-6 Summary of thesis chapters

The thesis chapters are summarized in Table 1-1.

Chapters Summary

Chapter 1The innovative nature of this study lies in the fact that it is examining security vulnerabilities of VoIP from users’ perspective. To the best of the researcher’s knowledge, no such similar academic research has been conducted.

Chapter 2A literature review addresses the purpose and aims of this thesis. VoIP architecture and technology, overview of VoIP security and possible vulnerabilities and users’ perspective on VoIP are discussed.

Chapter 3 The research methodology used in this thesis is described in order to answer the research question that has been established.

Chapter 4 The results and discussion about the findings of this study is provided.

Chapter 5 Conclusion of this thesis is provided.

Table 1- 1 Summary of Thesis Chapters

17 Chapter 1- Introduction |

Page 19: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Chapter 2- Literature ReviewChapter 2- Literature Review

This chapter reviews the existing literature concerning the background to the topic of this

thesis. It is organized as follows:

Section 2.1 provides an overview of the literature reviewed

Section 2.2 introduces the elements which contributed to the emergence of VoIP technology

Section 2.3 describes VoIP architecture and compares it to PSTN

Section 2.4 describes VoIP technology

Section 2.5 provides an overview of VoIP security and introduces possible vulnerabilities and threats to VoIP systems

18 Chapter 4- Results and discussion |

Page 20: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

2-1 Overview2-1 Overview

This chapter reviews the studies that are relevant to the purpose and aims of this thesis. The

elements which contributed to the emergence of VoIP technology are introduced, followed by a

detailed description of VoIP architecture and technology. Furthermore, an overview of VoIP

security is presented and possible vulnerabilities and threats to VoIP systems are discussed.

2-2 Groundwork of VoIP2-2 Groundwork of VoIP

Although VoIP systems could be implemented purely based on IP networks, generally they are

interconnected to traditional telephony systems and rely on them for delivering voice traffic. In

fact, the interoperability of traditional and IP telephony systems significantly contributed to the

widespread acceptance of VoIP.

The invention of and advances telephony systems and the Internet have provided the

foundation of VoIP technology. The evolution of telephony systems and the Internet are

discussed in the following sections.

2-2-1 Telephony system2-2-1 Telephony system

‘Mr. Watson, come here, I want to see you’; this phrase was the first ever transmitted speech

over wire and it was sent by Alexander Graham Bell in 1876 (Flood 1976; Brittain 2005). Bell’s

work evolved from a scientific curiosity into an essential communication method that has

influenced people’s lives ever since.

At the early stage, each two-call party devices were connected by a single wire and no dialing

was required. Later, the telephone system improved and instead of having physical cables

between each end-to-end receiver only one cable was needed to connect users to telephone

centers. Operators at telephone centers did the switching between call parties. As further

19 Chapter 4- Results and discussion |

Page 21: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

advances were made in telephony systems, manual switching was replaced by electronic

switches.

The basic telephone system is called the Plain Old Telephone Service (POTS) and in contrast, the

more advanced one which is able to carry both analog and digital traffic is called Public

Switched Telephone Network (PSTN)1. During the past decades PSTN developed from a

relatively non-complex network to a so-called Intelligent Network (IN). IN is based on a

signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local

Area Signaling Services (CLASS) services. Examples of these include “Call blocking” and

“Automatic callback” (Davidson et al. 2006).

2-2-2 The Internet2-2-2 The Internet

On the 29th of October 1969 at 10:30 pm for the first time data was transferred over a packet

switched network. The network consisted of two nodes one located at Stanford Research

Institute (SRI) and the other one at University of California, Los Angeles (UCLA) connecting with

a link at 50kb/s. The researcher’s goal was to type the word “log” at UCLA’s node and SRI’s

node added “in” to it in order to create the word “login”. In practice, however, only “l” and “o”

were transmitted and then the UCLA’s machine crashed (Kleinrock 2008).

Later in that same year (1969) two other nodes - one at University of California at Santa Barbara

and the other one at University of Utah - were added to the two previous nodes and formed

the first four nodes of what became known as ARPANET (Kleinrock 2008; O'Neill 1995).

The above-mentioned research was a part of the Advanced Research Projects Agency Network

(ARPANET) deployment. ARPANET, the ancestor of the Internet, was the first operational

packet-switched network that was conducted by the Advanced Research Projects Agency

1 In some publications the term general switched telephone network (GSTN) is used to refer to the telephony system. However, PSTN is more common.

20 Chapter 4- Results and discussion |

Page 22: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

(ARPA), established in February 1958 by the US Department of Defense (O'Neill 1995). Lukasik

(2010) provides an extensive discussion on why the ARPANET was built.

The invention of the World Wide Web (commonly known as the Web) was a milestone in the

history of the Internet. Its creator, Tim Berners-Lee, defines it “as the universe of global

network-accessible information” (Berners-Lee 1996). The tremendous commercial potential of

the Web attracted businesses and provided opportunities. The emergence of giant Internet-

related businesses such as eBay and Google indicates that a new era has arisen due to web

technologies.

What is called the Internet is in fact a massive infrastructure that exploits a wide range of

technologies and provides global communication channels for millions of people around the

world. VoIP is an example of such a communication channel.

2-3 VoIP Architecture2-3 VoIP Architecture

This section provides an overview of VoIP architecture by comparing it to PSTN, and describes

its implementations. Three main VoIP implementations are discussed: (1) PC-to-PC, (2) PC-to-

Phone/phone-to-PC and (3) Phone-to-Phone. These are high-level overviews of VoIP functional

architecture but they do not represent the physical implementation.

2-3-1 PSTN versus VoIP2-3-1 PSTN versus VoIP

The main difference between PSTN and VoIP is in the method by which they transmit voice

conversations. PSTN is a circuit switched network, while VoIP is a packet switched network.

PSTN uses reliable2 fixed bandwidth with an end-to-end dedicated line (circuit) which is set up

2 Carrier class reliability is a term which refers to the 99.999 % availability of the PSTN. The downtime of PSTN is about 5 minutes in a year.

21 Chapter 4- Results and discussion |

Page 23: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

by circuit switches. In contrast, VoIP splits the voice into packets and sends them independently

through various paths using shared bandwidth (Goode 2002).

PSTN is comprised of switches and network devices that provide fixed line telephone services.

Its Quality of Service (QoS) is high and its network availability is almost 100%, while VoIP’s QoS

is lower and its network availability is not known (Varshney et al. 2002). Additionally, VoIP is

based heavily on the already existing worldwide PSTN networks, even though its active

environment is the Internet. In fact, PSTN and VoIP overlap in terms of physical facilities as

some of VoIP’s traffic originates and terminates via PSTN (Groom & Groom 2004, p. 10). The

differences between PSTN and VoIP are discussed in detail in Schulzrinne and Rosenberg

(1999), Varshney et al.( 2002) and Bross and Meinel (2008).

2-3-2 VoIP implementation2-3-2 VoIP implementation

VoIP can be broadly implemented in three different ways, namely PC-to-PC,

PC-to-Phone/phone-to-PC and Phone-to-Phone. These are discussed in sub-sections 2-3-2-1, 2-

3-2-2 and 2-3-2-3, respectively.

2-3-2-1 PC-to-PC2-3-2-1 PC-to-PC

The first commercial PC-to-PC VoIP application was introduced by VocalTec in 1995 (Corrocher

2003). VocalTec released the “Internet Phone” software which enabled telephone

conversations take place via PCs over the Internet (Groom & Groom 2004, p. 22). Figure 2-1

portrays VoIP PC-to-PC model. In this scenario, voice call is made from a softphone (computer)

to another softphone (computer) through the Internet; PSTN is not involved.

22 Chapter 4- Results and discussion |

Page 24: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

.

Figure 2-1 VoIP implementation: PC-to-PC

X-Lite (Mac/Windows), iChat (Mac), Gno-Phone (Linux), Net-Meeting (Windows) and Skype

(cross platform, supports Mac, Windows and Linux) are examples of VoIP client software. X-Lite

and Gno-Phone are designed to be used with different VoIP providers, including our own VoIP

server, while others have to be used with a certain VoIP provider.

Skype3 is the most prevalent VoIP PC to PC provider (Bonfiglio et al. 2008; Wallingeord 2006, p.

63) and its and its popularity has garnered the attention of the research community. For

instance, Skype protocol is discussed in detail in Baset and Schulzrinne (2006) and Skype traffic

is investigated in Perenyi et al. (2007), Bonfiglio et al. (2009), Branch, Heyde and Armitage

(2009), while Srivatsa et al. (2010) and Ye et al. (2009) address Skype privacy issues.

2-3-2-2 PC-to-Phone/ Phone-to-PC2-3-2-2 PC-to-Phone/ Phone-to-PC

Skype offers free services including PC-to-PC (Skype-to-Skype) voice/video calls, conference

calls and instant messaging. However, Skype also provides fee applied services including PC-to-

PSTN (SkypeOut), which makes it possible for calls to be placed from PCs to landlines/mobiles,

and PSTN-to-PC (SkypeIn). The last system enables calls to be placed from landlines/mobiles to

PCs.

3 www.skype.com

23 Chapter 4- Results and discussion |

Page 25: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

In a similar vein, Yahoo! Messenger provides free PC-to-PC (Yahoo! Messenger-to-Yahoo!

Messenger) calls, but also offers paid services, allowing users to initiate and receive calls

through “Phone Out” and “Phone In” services4.

Google’s introduction of its Google Voice service enabled the company to become a

telecommunication service provider like Skype and Yahoo. Currently, Google Voice offers free

inbound and outbound calls to Canada and the US and paid international calls5.

In the PSTN-to-PC scenario, voice call is made from PSTN telephones to PCs with VoIP software.

In this scenario, voice traffic originates from PSTN and is then transmitted over the Internet (see

Figure 2-3). In contrast, in the PC-to-PSTN scenario, voice call is made from PCs (with

appropriate VoIP software) to PSTN. Here, voice traffic terminates in PSTN after being

transmitted over the Internet (see Figure 2-2).

Figure 2-2 VoIP implementation: PC-to-Phone

Figure 2-3 VoIP implementation: Phone-to-PC

4 http://messenger.yahoo.com/features 5 http://www.google.com/googlevoice/whatsnew.html

24 Chapter 4- Results and discussion |

Page 26: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

The VoIPPSTN gateways allow appropriate conversions between the two networks to take

place.

2-3-2-3 Phone to Phone2-3-2-3 Phone to Phone

In its simplest form, voice call is made from a PSTN telephone to another PSTN telephone. Voice

traffic originates and terminates in PSTN while it traverses through the Internet. This method is

fashionable for individual and residential use. Figure 2-4 illustrates this model.

Figure 2-4 VoIP implementation: Phone-to-Phone

A pure VoIP network solution can be employed for inter-site communication in businesses. In

its simplest form, a call is made from an IP phone to another IP phone completely through the

site’s IP network; PSTN is not involved.

IP phones are directly connected to networks via patch cables or wireless links. They have IP

addresses and they communicate with VoIP servers through IP networks. In enterprises, IP

Private Branch eXchange (PBX) handles inter-site communication. Figure 2-5 illustrates a simple

pure VoIP implementation.

Figure 2-5 Pure VoIP implementation: IP Phone-to-IP Phone

25 Chapter 4- Results and discussion |

Page 27: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

In practice, enterprises, especially those who have multiple sites, are more likely to employ a

variety of telephony network options for placing calls. This includes PSTN, the public Internet

and private Wide Area Network (WAN) connection or Virtual Private Network (VPN). In this

scenario, the IP PBX handles both intra-enterprise VoIP calls and PSTN call routing support. VoIP

gateways provide connectivity between VoIP and PSTN. Figure 2-6 illustrates multi-site

enterprise VoIP connection options.

Figure 2-6 Multi-site enterprise VoIP implementation

2-4 2-4 VoIP TechnologyVoIP Technology

VoIP refers to a class of technologies that enables multimedia (text6/voice/video) traffic to be

transferred over IP networks. The fundamental concept of VoIP is the digitization and

packetization of the human voice. The speech (voice analogue signals) is converted into digital

signals by appropriate coders/decoders and it is then broken into packets and transferred over

Internet Protocol (IP)-based networks like the Internet.

6 Instant messaging (IM), which is a real time text base network communication method, is considered to be a VoIP service. IM is distinguishable from on line text chatting. Via IM only specified known users communicate, while via on line text chatting in addition to known users often anonymous users communicate. In addition to IM, fax is also considered to be a VoIP service.

26 Chapter 4- Results and discussion |

Page 28: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

The procedures involved in placing voice conservation over VoIP can be broadly categorized in

the following four stages: signaling, encoding/decoding, transport, and gateway. These are

described in more detail in the following sub-sections.

2-4-1 Signaling2-4-1 Signaling

In the signaling stage, calls between end nodes are established, maintained, and terminated.

The details of the calls (codec type, packet size, etc.) are negotiated and agreed by the end

nodes.

Signaling protocols carry out these tasks. Session Initiation Protocol7 (SIP) and H.3238 are the

two most common VoIP signaling protocols. The former was specified by the Internet

Engineering Task Force (IETF)9, whereas the latter was developed by ITU-T10.

In-depth description of SIP is provided in Schulzrinne and Rosenberg (1998b),Schulzrinne and

Rosenberg (2000), while H.323 is discussed in detail in Thom (1996) and Hong and Mouchtaris

(2000). Comparisons of SIP and H.323 can be found in Schulzrinne and Rosenberg (1998a),

Glasmann, Kellerer and Muller (2001), Glasmann, Kellerer and Muller (2003), and Basicevic,

Popovic and Kukolj (2008).

7 SIP was first defined in March 1999 by RFC 2543 (http://tools.ietf.org/html/rfc2543), and was then upgraded in June 2002 by RFC 3261 (http://www.ietf.org/rfc/rfc3261.txt). The latter RFC is one of the longest standards (269 pages) defined by Internet

Engineering Task Force (IETF). 8ITU-T recommendation H.323 (version 1) was approved on 8 November 1996 under the World Telecommunication Standardization Conference (WTSC) Resolution No. 1 and its title was ‘Visual telephone systems and equipment for local area networks which provide a non-guaranteed quality of service’. This version was revised and the second version titled ‘Packet-based multimedia communications systems’ (which reflected more its functionality and was consistent with its expanded scope) was approved on 6 February 1998. Over the past decade H.323 has been superseded by more recent versions. The last version of H.323 (ITU-T H.323 v7) was approved on 14 December 2009 with the same title as the second version.9 www.ietf.org 10 ITU-T is described in the foreword section (page iii) of the ‘Recommendation H.323 (12/09)’ (http://www.itu.int/rec/T-REC-H.323-200912-I/en) as:

‘ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the ITU. The ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis.’

27 Chapter 4- Results and discussion |

Page 29: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

2-4-2 Encoding/Decoding2-4-2 Encoding/Decoding

The converting and compressing of analog voice to digital data is accomplished by codecs in the

encoding/decoding stage. The term codec11 is derived from the combination of coder/decoder.

Based on Nyquist theorem, codecs convert analog voice into digital signals. According to

Nyquist theorem, analog voice must be sampled at a minimum of more than twice its frequency

(Broesch 1997). Since generally speech content is less than 4000 Hz (Davidson & Peters 2000),

sampling rate of 8000 times per second is required.

G.711, the most widely used codec in PSTN, employs pulse code modulation (PCM) algorithm

for sampling purposes. PCM uses eight bits per sample and therefore requires (8000 Hz x 8 bit =

64000 bps = 64 kbps) 64 kbps bandwidth. Currently, this amount (64 kbps) is considered to be a

baseline unit in terms of bandwidth requirement in VoIP networks.

Assuming G. 711’s packet interval (gap between transmitted packets) is 10 ms (1/100 th second),

(64000 / 100 = 640) 640 bits (80 bytes) of G.711 data (voice data) is placed in each packet.

Each codec employs a compression algorithm and based on the algorithm utilizes network

bandwidth. Table 2-1 compares some codecs.

Codec Algorithm Usual Rate (kb/s)

G.711 PCM 64G.726 ADPCM 32

G.729a CS-ACELP 8G.723.1 MP-MLQ 6.3G.723.1 ACELP 5.3

iLBC LPC 15.2iLBC LPC 13.33

Table 2- 1 Audio Codecs

11 In some publications the term VOCODER (VoIP Coders) is used to refer to codec. However, codec is more prevalent.

28 Chapter 4- Results and discussion |

Page 30: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Many audio codes are available. The G-series12 (G.xxx) codecs which are defined by

International Telecommunication Union13 -Telecommunication Standardization Sector (ITU-T)14

are fashionable in VoIP networks. iLBC15 (Internet Low Bitrate Codec) which is a free audio

codec is currently used by popular VoIP PC-to-Phone providers, such as Skype and Yahoo!

Messenger (Davidson et al. 2006). Furthermore, G.729 or G.723 codec is commonly used over

WAN links since they offer a high compression rate while preserving reasonable speech quality

(Hanes & Salgueiro 2008, p. 131). Codecs are discussed in detail in Karapantazis and Pavlidou

(2009, pp. 2055-2059).

2-4-3 Transport2-4-3 Transport

After a call is established, actual voice traffic is transmitted between the end nodes. The

Internet Protocol16 (IP) is used to transmit data from sources to destinations in packet-switched

networks. Both sources and destinations are identified by IP addresses. As shown in Figure 2-7,

the IP header contains source and destination address. Best routes between the source and

destination nodes are determined by routing protocols.

Version IHL Type of Service Total LengthIdentification Flags Fragment Offset

Time to Live Protocol Header ChecksumSource Address

Destination AddressOptions Padding

Data (Variable)Figure 2-7 IP header

12 http://www.itu.int/net/itu-t/sigdb/speaudio/Gseries.htm 13 http://www.itu.int/en/pages/default.aspx 14 http://www.itu.int/ITU-T 15 http://www.ilbcfreeware.org 16 IP was defined in 1981 by RFC 791 (http://datatracker.ietf.org/doc/rfc791/) which is based on six earlier versions of IP specification.

29 Chapter 4- Results and discussion |

Page 31: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

IP is employed by local network protocols, such as Transmission Control Protocol (TCP) and

User Datagram Protocol (UDP) to carry datagrams17 (packets). Therefore, UDP and TCP run on

top of IP as the data portion of an IP datagram. Generally, TCP/IP is used when reliability is the

main concern and UDP/IP is employed when speed of data delivery is of interest.

TCP18 guarantees packet delivery by providing acknowledged and flow-controlled service.

Therefore, it is generally the case that TCP is used in the signaling stage to ensure the reliability

of call establishment. However, due to the time sensitive nature of VoIP traffic, it is not feasible

to use TCP to carry the actual voice traffic.

Since VoIP traffic is delay sensitive, controlling latency in VoIP networks is more important than

controlling packet loss. Therefore; UDP19, which does not wait for acknowledgment of the

delivered packets and does not require prior negotiations to establish special transmission

channels, is used to carry voice traffic. UDP is a simple protocol which its header contains only

four fields as depicted in Figure 2-8.

Source Port Destination PortLength Checksum

Figure 2-8 UDP header

However, since UDP does not provide the information that the receiving nodes require to

correctly reassemble the digitized voice packets into a voice signal, Real-time Transport

Protocol (RTP) is employed in conjunction with UDP. Therefore, VoIP traffic is carried with an

RTP/UDP/IP packet header. In other words, the actual voice data is transmitted by RTP packet 17 In the literature, datagram and packet are often considered to be synonymous. However, datagram refers to unreliable packet delivery. For instance, since UDP and IP do not guarantee packet delivery, UDP/IP packets are called datagrams. 18 TCP was defined in 1981 by RFC 793 (http://datatracker.ietf.org/doc/rfc793/) which is based on nine earlier versions of TCP specification. 19 UDP was defined in 1980 by RFC 768 (http://tools.ietf.org/html/rfc768).

30 Chapter 4- Results and discussion |

Page 32: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

IP headerIP Payload

UDP Payload

RTP Payload

Codec Payload(Actual Voice Data)

UDP header

RTP header

IP headerUDP headerRTP header Voice Data

which is carried as data by the UDP datagram, and UDP itself is encapsulated by IP. Figures 2-9

and 2-10 illustrate the simplified layout of RTP/UDP/IP packet.

Figure 2-9 RTP/UDP/IP packet Figure 2-10 RTP/UDP/IP packet

RTP20 provides the necessary information, such as orders of the arriving packets and the

variation of consecutive packets arrival time. The information is provided by the sequence

number and timestamp field of RTP’s header (see Figure 2-11).

V=2 P X CC M PT Sequence NumberTimestamp

Synchronization Source (SSRC) identifierSontributing Source (CSRC) identifiers

………Figure 2-11 RTP header

However, RTP does not guarantee on-time delivery, reliability, Quality of Service (QoS) and

resource reservation, and relies on its associated control protocol, Real Time Control Protocol

(RTCP), for providing these. In fact, RTCP21 extends RTP’s functionality, particularly by

20 Packet structure and basic functions of RTP was first defined in 1996 by RFC 1889 (http://www.ietf.org/rfc/rfc1889.txt) and then it was updated in 2003 by RFC 3550 (http://tools.ietf.org/html/rfc3550).21 RTCP was first defined in 1996 by RFC 1889 (http://www.ietf.org/rfc/rfc1889.txt) and then it was updated in 2003 by RFC 3550 (http://tools.ietf.org/html/rfc3550).

31 Chapter 4- Results and discussion |

Page 33: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

monitoring QoS. This is done by receiving feedback on the quality of the delivered data which is

conveyed by RTCP packets periodically sent by participants in an RTP session.

2-4-3-1 Bandwidth efficiency2-4-3-1 Bandwidth efficiency

With advances in network technologies, more bandwidth is available now than in the past.

However, bandwidth is still considered to be a premium resource, especially in wireless VoIP

networks. Therefore, significant efforts have been made to minimize bandwidth consumption

of network applications. The main techniques used to increase bandwidth efficiency in VoIP

networks are speech compression codecs, Voice Activity Detection (VAD) and header

compression.

2-4-3-1-1 Speech compression codecs2-4-3-1-1 Speech compression codecs

The speech compression codecs technique employs appropriate codecs that require less

bandwidth. The consumed bandwidth per call much depends on the selected codec and

number of voice samples per packet. Davidson et al. (2006 p. 178) describe the correlation

between bandwidth consumption and packet sizes.

Packetization efficiency which refers to the number of voice samples in an IP packet is an

important factor. On the one hand, placing less voice samples in an IP packet is inefficient since

the header overhead will increase. On the other hand, when more voice samples in an IP packet

are placed, the packet becomes larger, which this can lead to packet loss and the increase of

end-to-end delay. The number of voice samples that is sent per packet depends on the

employed codec. For example, G.711 usually takes 80 bytes of Voice data while G.729 takes 20

bytes (Oouch et al. 2002).

Karam and Tobagi (2001) investigated the impact of packet size on bandwidth utilization and

voice delay for G.729A, G.723.1 and G.711 codecs. It was concluded that 30 ms of speech for

32 Chapter 4- Results and discussion |

Page 34: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

both G.729.A and G.723.1 with packet size of 30 bytes and 20 bytes respectively, and 10 ms

speech for G.711 with packet size of 80 bytes, provide a reasonable trade-off between efficient

network utilization and low voice delay. In another study, Oouch et al. (2002) studied the effect

of packet size on voice quality under different network conditions for G.711 and G.729 codecs.

They revealed that voice quality is not affected by the size of the packet when packet loss rates

are very low. However, smaller packets are superior to larger ones in terms of voice quality

when packet loss rates are moderate or high.

2-4-3-1-2 Voice Activity Detection2-4-3-1-2 Voice Activity Detection

Generally, in conversations, one speaks and one listens. In addition, there are breaks and

pauses in normal conversations. This means that about 50 percent of the dedicated bandwidth

for voice traffic transmission is wasted. According to Beritelli et al (cited in Chen et al. 2010), a

typical conversation has a speech to non-speech ratio of forty to sixty.

Voice Activity Detection (VAD) is a technique that enables the wasted bandwidth in VoIP

networks be used for other purposes. This is achieved by detecting the voiced and non-voiced

segments of analog sound signals.

VAD function can be broadly divided into two modules, speech analysis and decision module

(Huang & Lin 2009). The former extracts acoustic parameters from the input sound signal in

order to distinguish speech from non-speech segments, while the latter based on the extracted

parameters and decision rules determines whether the input signal is speech or noise (Chen et

al. 2010). Quality of speech, level of compression and computational complexity of different

VoIP VDA algorithms are compared in Venkatesha Prasad et al. (2002).

33 Chapter 4- Results and discussion |

Page 35: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

20 bytes 12 bytes8 bytes

IPv4 header UDP header RTP headerVoice Data

40 bytes 20 - 60 bytes

Headers Payload

IPv6 header UDP header RTP headerVoice Data

12 bytes8 bytes40 bytes

Headers Payload

20 - 60 bytes60 bytes

2-4-3-1-3 Header compression2-4-3-1-3 Header compression

The voice packets usually have a payload of 20 to 60 bytes, depending on the employed codec

(Karapantazis & Pavlidou 2009) and the IP version 4 (IPv4)/UDP/RTP header is 40 bytes. . It

consists of an IP header of 20 bytes, an UDP header of 8 bytes and a RTP header of 12 bytes,

while for IP version 6 (IPv6) this will be 60 bytes since the IPv6 header is 40 bytes. This means

that bandwidth is used to transfer VoIP packets in which the payload is about the same size or

even smaller than the header. A simplified form of IPv4/UDP/RTP and IPv6/UDP/RTP headers is

illustrated in Figures 2-12 and 2-13.

Figure 2-12 IPv4/UDP/RTP headers (40 bytes)

Figure 2-13 IPv6/UDP/RTP headers (60 bytes)

The header information including the source and destination addresses, type of service,

protocol identifiers, etc. are essential for successful end-to-end transfer of packets over

multiple links. However, in order to improve bandwidth efficiency IP/UDP/RTP headers can be

compressed on a hop-by-hop basis. This means that the header of VoIP packets is compressed

before being transferred on a link and it is decompressed at the other end of the link. According

34 Chapter 4- Results and discussion |

Page 36: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

IPv4/IPv6/UDP/RTP header compression

Voice Data

Headers Payload

20 - 60 bytes2-4 bytes

IPv4/IPv6 header UDP header RTP headerVoice Data

Headers Payload

12 bytes8 bytes20-40 bytes

20 - 60 bytes40 - 60 bytes

20 bytes 12 bytes8 bytes

IPv4 header UDP header RTP headerVoice Data

Headers Payload

40 bytes 40 bytes

to Casner and Jacobson (1999), an IP/UDP/RTP header can be compressed to 2-4 bytes. Header

compression is depicted in Figure 2-14.

Figure 2-14 IPv4/IPv6/UDP/RTP header compression

The obvious advantage of header compression is efficient bandwidth utilization. However,

improving the payload efficiency (the ratio of voice data (payload)/total packet size), which

leads to shorter end-to-end delay, is a significant benefit of employing header compression.

Since the IPv4/UDP/RTP header is 40 bytes, to have 50% payload efficiency we therefore need a

payload of 40 bytes (40 bytes/80 bytes=50% payload efficiency). This is depicted in Figure 2-15.

Figure 2-15 50% payload efficiency

35 Chapter 4- Results and discussion |

Page 37: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Header size (bits)

Codec output rate (kb/s)

Payload sample size (milliseconds)The call bandwidth requirement (kb/s)BW = R + H/S

According to Goode (2000), it takes 5 ms to accumulate 40 bytes at 64kb/s while at 8kb/s it

takes 40 ms to accumulate 40 bytes. Therefore, low payload efficiency, especially in conjunction

with low bit rate codecs, will increase the end-to-end delay. The following equation is proposed

by Goode (2000, p. 1499):

Low BW leads to long packetization delay and more complex codec. To achieve the

requirements for reasonable call bandwidth, reasonable codec complexity and an acceptable

packetization delay, a trade-off must be made (Goode 2000, p. 1499).

Header Compressions is discussed in (Karapantazis & Pavlidou 2009; Casner & Jacobson 1999;

Degermark, Nordgren & Pink 1999; Koren et al. 2003; Engan, Casner & Bormann 1999; Engan,

Casner & Bormann 2003; Liu et al. 2001).

36 Chapter 4- Results and discussion |

Page 38: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Header Compressions methods such as IP Header Compression (IPHC)22, Compressed Real-time

Transport Protocol (CRTP)23, Enhanced CRTP24 and RObust Header Compression (ROHC)25 are

defined in deferent Request for Comments (RFCs)26.

2-4-4 Gateway2-4-4 Gateway

Direct connection between packet switched network (VoIP) and circuit-switched networks

(PSTN) is not feasible, because in addition to voice data, signaling data is also exchanged

between VoIP and PSTN networks. In PSTN, the Signaling System Number 7 (SS7) is used, while

in VoIP, SIP and H.323 are the most common signaling protocols.

22 IP Header Compression (IPHC) is described in RFC 2507- ‘IP Header Compression’ (http://www.faqs.org/rfcs/rfc2508.html) in 1999. IPHC can be applied to multiple IP headers and TCP/UDP headers on a hop-to-hop basis. The mechanism for TCP header compression in RFC 2507 is similar to the proposed technique in 1990 in RFC 1144 – ‘Compressing TCP/IP Headers for Low-Speed Serial Links’ (http://www.faqs.org/rfcs/rfc1144.html).

23 Compressed Real-time Transport Protocol (CRTP) is described in RFC 2508 – ‘Compressing IP/UDP/RTP Headers for Low-Speed Serial Links’ in 1999 (http://www.faqs.org/rfcs/rfc2508.html). By employing CRTP, IP/UDP/RTP headers can be compressed to 2-4 bytes.

24 Enhanced CRTP is described in RFC 3545 – ‘Enhanced Compressed RTP (CRTP) for Links with High Delay, packet Loss and Reordering’ in 2003 (http://www.faqs.org/rfcs/rfc3545.html). This document describes a header compression method for point to point links with packet loss and long delays. It is based on CRTP which is described in RFC 2508 – ‘Compressing IP/UDP/RTP Headers for Low-Speed Serial Links’. CRTP does not work well in networks with packet loss and long delays.

25 RObust Header Compression (ROHC) described in RFC 3095 – ‘RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed’ in 2001 (http://www.faqs.org/rfcs/rfc3095.html). The abstract of this RFC states:

This document specifies a highly robust and efficient header compression scheme for RTP/UDP/IP (Real-Time Transport Protocol, User Datagram Protocol, Internet Protocol), UDP/IP, and ESP/IP (Encapsulating Security Payload) headers.

ROHC header compression is proposed for links with significant error rates and long round-trip times.

26 RFC 2509 – ‘IP Header Compression over PPP’ (http://www.faqs.org/rfcs/rfc2509.html) describes an option for negotiating the use of IPHC & CRTP over the Point-to-Point Protocol. The authors in a more recent version in 2003 in RFC 3544 – ‘IP Header Compression over PPP’ (http://www.faqs.org/rfcs/rfc3544.html) defined extensions to the PPP Control Protocols for improvement in IPHC & CRTP usage over the Point-to-Point Protocol.

37 Chapter 4- Results and discussion |

Page 39: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

During the gateway stage, protocol translation and media transcoding between VoIP and PSTN

are provided. Consequently, PSTN calls can be completed through VoIP networks and vice

versa. In fact, connectivity between the PSTN (circuit switched network) and VoIP (packet

switched network) is navigated through the VoIP/PSTN gateway. This is illustrated in Figure 2-

16.

Figure 2-16 VoIP/PSTN gateway

Building on this theme, VoIP/PSTN gateways transfer voice and fax data, in real-time, between

VoIP and PSTN networks and their functionality can be categorized as signaling gateway and

media gateway. Signaling gateway provides interworking of signaling between VoIP/PSTN

networks, while media gateway compresses, packetizes and delivers voice packets to the VoIP

38 Chapter 4- Results and discussion |

Page 40: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

network; its procedure is the exact opposite of the PSTN network (Karapantazis & Pavlidou

2009).

2-5 Security/privacy2-5 Security/privacy

The Oxford Advanced Learner’s Dictionary27 defines security as ‘the activities involved in

protecting a country, building or person against attack, danger, etc. and it defines privacy as

‘the state of being alone and not watched or disturbed by other people’.

There is a relationship between security and privacy. From the VoIP perspective, a simple

definition is that privacy is having a communication that is free from unauthorized access and

security means maintaining this privacy.

.

VOIPSA28 provides a general definition of security and privacy from the VoIP perspective.

Privacy is defined as:

The Privacy Concept is the privilege of all people to have their communication systems and

content free from unauthorized access, interruption, delay or modification.

And security is defined as:

1) the right to protect privacy, 2) a method of achieving privacy and 3) ways to keep

communication systems and content free from unauthorized access, interruption, delay or

modification.

27 Oxford Advanced Lerner’s dictionary – 7th edition – the software version28 The Voice Over IP Security Alliance (VOIPSA) is an non-profit organization which according to its website (www.voipsa.org/About) their ‘… aims [are] to fill the void of VoIP security related resources through a unique collaboration of VoIP and Information Security vendors, providers, and thought leaders.’ and their ‘… mission is to drive adoption of VoIP by promoting the current state of VoIP security research, VoIP security education and awareness, and free VoIP testing methodologies and tools.’

39 Chapter 4- Results and discussion |

Page 41: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

The core concept of security definition is protecting our assets. However, the Oxford’s

dictionary definition is more based on physical security that can be achieved in closed network

while the VOIPSA’s definition of security and privacy is based on open networks. Due to the fact

that VoIP implements open networks, we refer to VOIPSA’s definition of security and privacy in

this study.

2-5-1 VoIP/PSTN security2-5-1 VoIP/PSTN security: a comparison: a comparison

It is generally assumed that PSTN is more secure than VoIP. Basically, PSTN security is based on

the physical security of the core network equipment and the related components on the

customer's premises. This model known as ‘physical wire security’ seems to be efficient enough

for PSTN since attacks which require physical access usually do not scale in a distributed

environment. However, an eavesdropper can wiretap PSTN by physically accessing telephone

lines which is much easier than to wiretap VoIP systems. Security issues in PSTN are discussed

in (Porter et al. 2006a, pp. 114-118).

On the other hand, the nature of VoIP security is such that it is not based on wire security.

However, by gaining access to traffic on a VoIP network that is not well secured, VoIP packets

could be captured, modified, reassembled or controlled to overturn the security behavior. VoIP

systems may be attacked by non-specialists using free VoIP-sniffers such as Vomit29 and

VoiPong30, but hacking PSTN generally requires specialist knowledge.

2-5-2 VoIP security2-5-2 VoIP security

For data to be transmitted over IP networks, a large number of parameters have to be

configured. Many of these parameters are configured dynamically and since a wide range of

29 Voice Over Misconfigured Internet Telephones (vomit) is a completely free utility (even commercial use of it is permitted)

that converts VoIP conversations (only G.711 encoded) on Cisco IP phones into wave files (http://vomit.xtdnet.nl/). 30 VoIPong is an open source utility which converts VoIP conversations (only G.711 encoded) into wave files (http://www.enderunix.org/voipong/).

40 Chapter 4- Results and discussion |

Page 42: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

configurations is involved, networks suffer from potentially vulnerable points. Generally, VoIP

uses the existing IP networks and therefore inherits their vulnerabilities. Adding voice traffic to

IP networks complicates security issues and introduces a range of vulnerabilities. This is

because VoIP requires VoIP-specific configurable parameters in addition to the existing ones in

the underlying IP networks, such as call processing components. These parameters change

dynamically each time VoIP services are started or restarted.

Providing integrated services (messenger, email and web) in addition to rich media (voice,

video, text and fax) (Patrick 2009) and VoIP-PSTN interconnection, are other factors which

complicate VoIP security.

From a security perspective, VoIP is not just another application attached to the IP network.

Although VoIP packets traverse IP network routes and are distributed between the IP network-

connected machines, the network components including switches, routers, firewalls and

network address translation (NAT), must be VoIP aware, so that they can provide specific VoIP

security features. For example, ordinary firewalls are generally not able to protect VoIP systems

from VoIP specific application layer attacks, such as malformed H.323 or SIP messages, due to

the fact that these firewalls cannot detect such attacks. To address these kinds of flaws, VoIP

security devices/modules and systems, such as Session border controllers (SBCs)31, should be

employed.

VoIP security has been discussed from different perspectives. VoIP general security issues, VoIP

providers’ security issues, SIP/H.323 security, Man-In-The-Middle (MITM) and Denial of Service

(DoS), Spam over Internet Telephony (SPIT) and Biometric encryption are discussed in the

following sub-sections.

31 According to the Gartner Report, ‘IT Market Clock for Enterprise Networking Infrastructure, 2010’, Session border controllers (SBCs) provides ‘… a secure, controlled connection for points between networks that provide interactive, Internet Protocol (IP)-based communications like Session Initiation Protocol (SIP)-based unified communications (UC)’. Furthermore, in another Gartner Report, ‘How to Leverage SIP Trunks, Session Border Control and Session Management for Cost Savings and UC Deployment’ it is stated that ‘ Session border controllers (SBCs) can reduce SIP-based denial of service (DoS) threats that originate from within and outside an organization…’ and ‘… improve[s] enterprise communications security,… , operational efficiency and reliability’.

41 Chapter 4- Results and discussion |

Page 43: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

2-5-2-1 General VoIP security issues2-5-2-1 General VoIP security issues

Studies in this category generally do not contain in-depth technical discussions. They only

provide a broad overview of VoIP security, guidelines, and a classification of vulnerabilities and

possible threats and attacks. Therefore, they are not informative for professionals, but are

valuable literature for new researchers in the field of VoIP security.

General VoIP security issues have been addressed in different papers (Dantu et al. 2009; Epstein

2009, pp. 323-347; Gupta & Shmatikov 2007; Butcher, Xiangyang & Jinhua 2007; Douglas &

Tom 2004). Namely, Kuhn, Walsh and Fries’ (2005) research in this area is notable. This study is

a special report from the US National Institute of Standards and Technology (NIST) which

provides security recommendations for VoIP implementation. In this research, the VoIP’s risks,

threats and vulnerabilities are analyzed along with the encryptions that can be applied. Further,

the effect of securing VoIP on QoS is discussed in depth. Similarly, Walsh and Kuhn’s (2005)

study discusses the overall security aspects of VoIP and avoids technical details. It concentrates

on the need for new technologies to combat security breaches.

2-5-2-2 VoIP providers’ security issues2-5-2-2 VoIP providers’ security issues

The studies in this category evaluate security issues of VoIP providers. Different security

features concerning the popular VoIP providers are analyzed and sometimes are compared.

Skype, due to its widespread usage, has drawn more attention than other VoIP providers.

Skype security has been discussed from different angles. For example, Simon and Slay (2010)

discuss Skype security from the forensic perspective. Their study shows that it is feasible to

exploit the physical memory of the computer on which Skype was running, in order to recover

the digital evidence. Moreover, Zhu and Fu (2010) address Skype passive traffic analysis attacks

and show that privacy of Skype calls can be compromised by launching passive traffic analysis

attacks.

42 Chapter 4- Results and discussion |

Page 44: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

In Sengar et al. (2010) a transparent packet marking scheme is presented for tracing Skype

packets in order to disclose the path and the origins and destination of a Skype call.

Additionally, Wang, Chen and Jajodia (2005) investigate Skype encryption and show that when

a unique watermark is embedded into the encrypted flow, it is feasible to trace calls and launch

a timing attack. An overview of Skype security is addressed in Piccard (2006, pp. 103-121), and

Porter and Gough (2007, pp. 253-262).

Some papers have surveyed security issues of other dominant VoIP providers. For instance, the

study conducted by Zhang et al. (2009a) shows that a remote attacker who knows the IP

address and phone number of a Vonage (residential VoIP provider in the US) client is able to

eavesdrop and hijack calls by launching a DNS spoofing attack. Although Ahmed and Shaon’s

(2009) research mainly concentrates on comparing the QoS in different VoIP providers (Skype,

GTalk, and Gizmo), the compared security criteria amongst them are useful.

43 Chapter 4- Results and discussion |

Page 45: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

2-5-2-3 SIP/H.323 security2-5-2-3 SIP/H.323 security

VoIP comprises different components with a range of protocols where each has its own security

concerns. H.323 and Session Initiation Protocol (SIP) are the two most common signaling

protocols used in VoIP’s signaling stage (Basicevic, Popovic & Kukolj 2008; Glasmann, Kellerer &

Muller 2003; Glasmann, Kellerer & Muller 2001). In some papers VoIP security is discussed from

its signaling protocol’s perspective.

In the literature, SIP security has drawn more attention than H.323 security. This is due to the

adoption of SIP for IP Multimedia Subsystem (IMS)32 in 3G (3GPP) and Next Generation

Networks (NGNs)33 (Geneiatakis et al. 2006). 32 IP multimedia subsystem (IMS) is an architecture which is designed to provide IP multimedia communication services. Telecommunication service providers employ IMS to deliver interactive multimedia service to their customers. IMS encompasses circuit-switched communication networks and packet-switched networks and uses VoIP technology and SIP standard (Porter et al. 2006b, p. 500 ). In other words, IMS combines telecommunication technologies with wireless and wired networks in order to provide the All-IP environment to deliver multimedia services in 3G and more advanced networks such as 3.5G and 4G. IMS is discussed in detail in (Handa 2009, pp. 1-24; Chen et al. 2008 and Martínez Perea 2008, pp. 501-540).

IP multimedia subsystem (IMS) was proposed by Third Generation Partnership Project (3GPP) <http://www.3gpp.org> to provide IP multimedia network for telecom operators. 3GPP is the IMS standardization body. IMS is introduced in 3GPP specifications release 5 (Rel-5) and has been further developed in latter releases (now Rel-11). IMS architecture and main flows are defined in <http://www.3gpp.org/ftp/Specs/html-info/23228.htm> and IMS service requirements are addressed in <http://www.3gpp.org/ftp/Specs/html-info/22228.htm>.

33 The term Next Generation Network (NGN) is generally used to indicate the shift to a more advanced network. These networks have higher broadband speed connections and have migrated from circuit-switched communication networks (PSTN) to packet-switched IP networks, and provide integrated services on a single network (Sarrocco & Ypsilanti 2007). NGN in addition to providing the existing fixed and mobile telephony services provides multimedia (IPTV, etc.) and content delivery (audio/video streaming, etc… ) services, and extends IMS to support additional technologies (Baroncelli et al. 2010). NGN is discussed in Richardson (2007), pp. 207-224, Mohapatra (2009) and Sarrocco and Ypsilanti (2007).

A detailed definition of NGN is provided by ITU-T. According to ITU-T Recommendation Y.2001 (12/2004) p. 2, NGN is defined as:

A packet-based network able to provide telecommunication services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transport related technologies. It enables unfettered access for users to networks and to competing service providers and/or services of their choice. It supports generalized mobility which will allow consistent and ubiquitous provision of services to users.

International Telecommunication Union - Telecommunication Standardization Sector (ITU-T) <http://www.itu.int/net/ITU-T/info/Default.aspx> have produced two fundamental recommendations about NGN, ITU-T Recommendation Y.2001 (12/2004)- General overview of NGN <http://www.itu.int/rec/T-REC-Y.2001/e> and ITU-T Recommendation Y.2011- General principles and general reference model for next generation networks <http://www.itu.int/rec/T-REC-Y.2011/e>.

44 Chapter 4- Results and discussion |

Page 46: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Some studies focus on a specific security issue of SIP/H.323 signaling protocols, while some

studies survey general security vulnerabilities of these protocols. For example, Al-Allouni et al.

(2009) propose two flooding attack metrics, Attack Time and Attack Rate in order to evaluate

SIP flooding attack. Ge et al. (2009) concentrate on timing attack which aims to reveal the

calling history of SIP-based VoIP systems. In contrast, Geneiatakis et al. (2006) provide a

comprehensive survey on SIP’s security and analyze possible threats and attacks. Similarly,

Geneiatakis and Lambrinoudakis (2007) and Geneiatakis et al. (2005) discuss SIP security

vulnerabilities in much detail in order to evaluate security and deploy intrusion detection

systems.

2-5-2-4 Man-In-The-Middle (MITM) and Denial of Service (DoS)2-5-2-4 Man-In-The-Middle (MITM) and Denial of Service (DoS)

Man-In-The-Middle (MITM) and Denial of Service (DoS) are two traditional attack types which

can be applied to either the VoIP or underlying IP network.

MITM, which is also known as session hijacking attacks or bucket-brigade attack, is a type of

attack that requires attackers to have access to network traffic. By sniffing and eavesdropping

on the packets that come across a network, attackers gain access to a legitimate connection

between two parties. According to Rufi (2007, p. 779), a MITM attack might lead to ‘…theft of

information, hijacking of an ongoing session to gain access to private network resources, traffic

analysis to derive information about a network and its users, Denial-of-Service (DoS), corruption

of sent data, and introduction of new information into network sessions.’

The effects of such MITM attacks might be more serious than DoS to VoIP users since they

would in all likelihood not notice the attack. It is generally the case that these attacks’ main

ramification is a major risk to data integrity, such as identity theft and call redirection (Arul,

Shanmugam 2009).

45 Chapter 4- Results and discussion |

Page 47: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Wang et al. (2008) demonstrate that the US leading VoIP providers (Vonage, AT&T and Gizmo)

are vulnerable to MITM attack. In their scenario when a user dials a number the VoIP call is

diverted to the bogus interactive voice response or bogus representative. Since the user has

dialed the correct number, s/he is confident that the interactive voice response or

representative is genuine. Therefore, s/he might be deceived and emit sensitive information

such as a credit card number. In a similar vein, Zhang et al. (2009a) and Zhang et al. (2009b)

discuss MITM attacks on VoIP networks.

DoS attack refers to attacks which attempt to make a computer resource unavailable to its

intended users. Sisalem, Kuthan and Ehlert (2006) state that SIP-based VoIP is vulnerable to DoS

attacks which aim to put a huge load on memory and CPU of VoIP servers. Al-Allouni et al.

(2009) classify VoIP potential DoS attacks into three general classes: Message Flows Attacks,

Flooding Attacks and Malformed Message Attacks. These divisions have been further sub-

classified.

2-5-2-5 Spam over Internet Telephony2-5-2-5 Spam over Internet Telephony

Spam refers to unsolicited bulk messages that are sent through computer networks. A widely

known type of spam is e-mail spam and often the term ‘spam’ has only referred to e-mail spam.

However, spam can be applied to any medium which is being abused by unwanted messages

such as mobile phone messaging spam.

Spam over Internet Telephony (SPIT) is an emerging kind of spam (Mu et al. 2010; Gritzalis &

Mallios 2008; Quittek et al. 2008) that constitutes a potential threat to VoIP. It is more severe

than email spam due to its attack nature, and consequently VoIP systems require a real-time

defense mechanism.

Different methods have been proposed for detecting and preventing SPIT. Quittek et al. (2007)

propose a SPIT prevention system which distinguishes human callers from automatic SPIT

46 Chapter 4- Results and discussion |

Page 48: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

generators based on checking typical human communication patterns. Similarly, Huang, Yu and

Feng’s (2009) SPIT prevention system works based on voice activity analysis.

Yu-Sung et al.’s (2009) model detects spam in VoIP calls by employing clustering, a data mining

technique. Based on the call parameters, calls with similar features are placed in a cluster for

SPIT or legitimate calls. Call features are derived from the signaling and media protocols. For

more accurate clustering, this approach may use users’ feedback to mark calls as non-SPIT or

SPIT.

2-5-2-6 Biometric encryption2-5-2-6 Biometric encryption

Employing biometric encryption for securing VoIP is an area which has not been widely

explored. In the IT security context, biometric refers to the measurement of physiological and

behavioral characteristics for authentication purposes. Fingerprints and voice are instances of

physiological measurements. Arul and Shanmugam (2009) propose a cryptographic system for

securing VoIP which generates the private key from fingerprints. This key is used in the process

of encrypting and decrypting VoIP traffic. Kopsidas, Zisiadis and Tassiulas (2006) propose a

protocol based on biometrics to provide a secure end-to-end VoIP communication. The Voice

Interactive Personalized Security (VoIPSEC) protocol employs a two-level verification scheme

where in the first level voice and in the second level video biometry data are used. Similarly,

Zisiadis, Kopsidas and Tassiulas (2007a) and Zisiadis, Kopsidas and Tassiulas (2007b) discuss

VoIPSEC and the usage of biometry data.

2-5-3 Myths about VoIP security2-5-3 Myths about VoIP security

Myths surrounding VoIP have been discussed in Cherry (2005) and Sundquist and Service

(2006). In both studies the myth about VoIP security has been described alongside other myths.

However, Patrick (2009, pp. 14-15) merely addresses the myths about VoIP security and cast

light on them. These myths are summarized in Table 2-2.

47 Chapter 4- Results and discussion |

Page 49: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Myth Reality

1- Traditional phone systems (PSTN) are more secure than VoIP systems

The biggest concern in relation to this myth is wiretapping. It has to be noted that wiretapping PSTN is much easier than wiretapping VoIP. This is because an eavesdropper can wiretap PSTN by physically accessing telephone lines which are not well secured (like outside buildings). However, an eavesdropper, to be able to sniff voice packets has to locate his sniffing tool on the same broadcasting domain as the VoIP devices. This is very hard for external hackers to do due to the fact that VoIP devices are located in places which are either well secured (network equipment’s in IT centers) or at least have some level of security (IP phones/cables at offices or residences.

2- To protect network and VoIP end users against threats, strict encryption and authentication is sufficient

It is obvious that encryption and authentication is crucial for securing networks; however, some advanced attackers get through by impersonating, and then bypassing the authentication and encryption process.

3- Securing underlying IP networks can secure VoIP networks as well

From the network layer perspective, securing the IP network will partially protect VoIP data. However, from the application layer perspective this does not apply. This is because security devices like firewalls generally are not able to detect VoIP specific application layer attacks, such as malformed H.323 or SIP messages which target the servers. Security devices should be VoIP aware and this can be achieved by employing VoIP security devices/modules. To retain a secure VoIP system, both IP network and VoIP-specific security issues must be addressed.

Table 2-2 The three myths about VoIP security

2-5-4 VoIP Threat Taxonomy2-5-4 VoIP Threat Taxonomy

Vulnerabilities and threats to VoIP systems have been discussed and classified in various studies

(Kuhn, Walsh & Fries 2005; Frost 2006; Porter 2006, pp. 3-25; Stanton 2006; Butcher, Xiangyang

& Jinhua 2007; Dantu et al. 2009; Patrick 2009, pp. 19-44). However, the Voice over IP Security

48 Chapter 4- Results and discussion |

Page 50: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Alliance’s (VOIPSA)34 document, ‘VoIP Security and Privacy Threat Taxonomy’ 35 provides the

most comprehensive classification of security and privacy threats which VoIP’s systems may

face. These threats are categorized as:

Misrepresentation Theft of Services Unwanted Contact Eavesdropping Interception and Modification Service Abuse Intentional Interruption of Service Other Interruptions of Service.

Each threat is further sub-classified. The VOIPSA threat taxonomy is summarized in Table 2-3,

Table 2-4, Table 2-5 and Table 2-6.

VOIPSA’s VoIP Security and Privacy Threat TaxonomyVOIPSA’s VoIP Security and Privacy Threat Taxonomy

Threat class Threat sub-classes Examples

Misrepresentation

Misrepresentation of Identity

false caller ID name or numberfalse voice, name, or organization in a voice/video mailfalse emailfalse presence information

Misrepresentation of Authoritypresentation of a password, key or certificate of anothercircumvention of conditional accessfalse claim of government authority bypassing ordinary authentication

Misrepresentation of Rights

presentation of a password, key or certificate to gain rights not grantedcircumvention of conditional access to gain rights not grantedmodification of access control lists

Misrepresentation of Content

false impersonation of the voice of a callerfalse impersonation of the words of a callermisleading printed words, still images or moving images in videomodifications of spoken, written or visual content

Table 2-3 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – Misrepresentation threat (www.voipsa.org/Activities/taxonomy.php)

34 http://www.voipsa.org35 http://www.voipsa.org/Activities/taxonomy.php

49 Chapter 4- Results and discussion |

Page 51: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

VOIPSA’s VoIP Security and Privacy Threat Taxonomy VOIPSA’s VoIP Security and Privacy Threat Taxonomy

Threat class Threat sub-classes

Theft of Services

Unauthorized deletion or altering of billing recordsUnauthorized bypass of lawful billing systemsUnauthorized billingTaking of service provider property

Unwanted ContactHarassmentExtortionUnwanted Lawful Content

Eavesdropping

Call Pattern TrackingTraffic CaptureNumber HarvestingConversation ReconstructionVoicemail ReconstructionFax ReconstructionVideo ReconstructionText Reconstruction

Interception and Modification

Call Black HolingCall ReroutingFax AlterationConversation AlterationConversation DegradingConversation Impersonation and HijackingFalse Caller Identification

Service Abuse

Call Conference AbusePremium Rate Service (PRS) FraudImproper Bypass or Adjustment to BillingOther Improper Access To Services

Table 2- 4 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – various threats (www.voipsa.org/Activities/taxonomy.php)

The Interruption of Service threat is categorized as Denial of Service and Physical Intrusion. The

Denial of Service is sub-classified into 4 categories: VoIP Specific Denial of Service, Network

Services DoS, Underlying Operating System/Firmware DoS and Distributed Denial of Service.

The VoIP Specific Denial of Service is further sub-classified as shown in Table 2-5.

50 Chapter 4- Results and discussion |

Page 52: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

VOIPSA’s VoIP Security and Privacy Threat TaxonomyVOIPSA’s VoIP Security and Privacy Threat Taxonomy

Threat class Threat sub-classes Threat sub-classes Threat sub-classes Examples

Interruption of Service Denial of Service

VoIP Specific Denial of Service

Request Flooding

User Call FloodingUser Call Flooding Overflowing to Other DevicesEndpoint Request FloodingEndpoint Request Flooding after Call SetupCall Controller FloodingRequest LoopingDirectory Service Flooding

Malformed Requests and Messages

Disabling Endpoints with Invalid RequestsInjecting Invalid Media into Call ProcessorMalformed Protocol Messages

QoS Abuse

Spoofed MessagesFaked Call Teardown MessageFaked Response

Call HijackingRegistration HijackingMedia Session HijackingServer Masquerading

Network Services DoSUnderlying Operating System/Firmware DoSDistributed Denial of Service

Physical IntrusionTable 2-5 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – Interruption of Service threat

(www.voipsa.org/Activities/taxonomy.php)

Physical intrusion threat includes unauthorized physical access to systems/equipment,

cables/wires and networking equipment. Social engineering attacks may occur because of

physical intrusion vulnerability.

VOIPSA’s VoIP Security and Privacy Threat TaxonomyVOIPSA’s VoIP Security and Privacy Threat Taxonomy

Threat class Threat sub-classes

Other Interruptions of ServiceLoss of PowerResource ExhaustionPerformance Latency

Table 2- 6 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – Other Interruption of Service Threat (www.voipsa.org/Activities/taxonomy.php)

51 Chapter 4- Results and discussion |

Page 53: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Chapter 3- MethodologyChapter 3- Methodology

This chapter describes the methodology of this thesis and it is organized as follows:

Section 3.1 provides an overview of this chapter

Section 3.2 introduces the research approach and discusses the concept of research epistemologies, qualitative and quantitative research and research reasoning process.

Section 3.3 describes the sampling method used in this research

Section 3.4 describes the approach of data analysis in this research

Section 3.5 describes the research ethics

Section 3.6 describes the on-line questionnaire design

Section 3.7 summarizes this chapter and introduces Chapter 4

52 Chapter 4- Results and discussion |

Page 54: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

3-1 Overview3-1 Overview

This chapter aims to establish the research methodology used in this thesis in order to answer

the research question.

This study seeks to evaluate the users’ awareness of VoIP security vulnerabilities, and their

attitude towards privacy and security in VoIP communications. An on-line questionnaire was

designed to collect information in order to investigate these matters. The overall research

process is summarized in Figure 3-1.

Figure 3-1 Overall research process

53 Chapter 4- Results and discussion |

Literature study

Finding a gap in the literature

Employing suitable research methodology

Designing a questionnaire

Collecting data

Analyzing data

Result interpretation

Disseminating research outcome

Page 55: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

3-2 Approach3-2 Approach

This thesis is a positivist quantitative research which intends to evaluate users’ perspectives on

VoIP’s security vulnerabilities. The research reasoning process is inductive and is depicted in

Figure 3-3. For quantitative data collection purpose, an anonymous on-line questionnaire was

designed.

3-2-1 Research epistemologies3-2-1 Research epistemologies

Chua (1986) classifies research epistemologies into positivist, interpretive and critical. These

three categories are the philosophical perspective of the underlying research epistemology.

Epistemology refers to the perspectives on knowledge and the ways in which it can be obtained

(Hirschheim 1985; Myers 1997b). Hirschheim (1985) describes epistemology in detail by first

defining what knowledge is and then, addressing how valid knowledge can be acquired. The

essence of research epistemologies is to define different approaches for obtaining knowledge

which is valid. Validity is the most important feature of the obtained knowledge.

It should be noted that research epistemologies do not always contain ‘hard and fast’

differences; their differences can be blurred. It is a matter of debate whether these research

epistemologies can be accommodated within a single research strategy.

Kaplan and Duchon (1988) believe that there is no need to clearly distinguish between positivist

and interpretive studies. Instead, there is a middle road and ‘no one approach to information

systems research can provide the richness that information systems, as a discipline, needs for

further advancement’.

This thesis is a positivist study which is explained in Section 3-2-1-1 along with justifications for

employing this research epistemology. In Sections 3-2-1-2 and 3-2-1-3 interpretive and critical

studies are respectively discussed.

54 Chapter 4- Results and discussion |

Page 56: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

3-2-1-1 Positivist studies3-2-1-1 Positivist studies

The positivist approach has been defined by many scholars over the recent past decades.

Hirschheim (1985), for example, provides a historical perspective on positivist science. He

begins his account from the 17th century to the present day and his description of positivism as

consists of the following five stages:

1. Arrival of positivism

2. Anti-positivism

3. Re-entering of positivism (logical positivism)

4. Contemporary critics

5. Post-positivism.

Orlikowski and Baroudi (1991, p. 5) define positivist studies as:

Positivist studies are premised on the existence of a priori fixed relationships within phenomena which

are typically investigated with structured instrumentation. Such studies serve primarily to test theory, in

an attempt to increase predictive understanding of phenomena.

Shanks (2002) believes that the positivist paradigm is comprised of theories, propositions,

hypotheses and hypothesis testing. In his study, he discusses these issues in detail and provides

guidelines for conducting positivist case study research.

Varey et al. (2002, p. 232) describe the main characteristics of positivist researches as ‘… formal

propositions, quantifiable measures of variables, hypothesis testing and the drawing of

inferences about a phenomenon from a sample to defined population…’

Similarly, Myers (1997b) states that:

Positivists generally assume that reality is objectively given and can be described by measurable

properties which are independent of the observer (researcher) and his or her instruments. Positivist

studies generally attempt to test theory, in an attempt to increase the predictive understanding of

phenomena.

55 Chapter 4- Results and discussion |

Page 57: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Objectivity is an important factor in positivist studies; therefore, conclusions or theories in such

studies are based on measurable properties that are consistent with this study.

The aim of this thesis is to explore users’ perspectives on VoIP’s security vulnerabilities and also

study their awareness and attitudes towards these issues. This is done by analyzing and

interpreting the results of the designed questionnaire. This approach is by nature a positivist

study since hypotheses are tested based on quantifiable measures and the conclusions are

generalized.

3-2-1-2 Interpretation studies3-2-1-2 Interpretation studies

Myers (1997b) defines interpretation as:

Interpretive researchers start out with the assumption that access to reality (given or socially constructed)

is only through social constructions such as language, consciousness and shared meanings.

Myers (1997b) also argues that ‘Interpretive studies generally attempt to understand

phenomena through the meanings that people assign to them…’

In a similar vein Orlikowski & Baroudi (1991, p. 5) describe interpretive studies as:

Interpretive studies assume that people create and associate their own subjective and intersubjective

meanings as they interact with the world around them. Interpretive researchers thus attempt to

understand phenomena through accessing the meanings that participants assign to them.

The main characteristics of interpretive studies are described in Bailey’s (2007, p. 53) book

where social reality is ‘…a dynamic entity, historically situated in time and space, context

specific and shaped by the researcher’s views of the world…’.

56 Chapter 4- Results and discussion |

Page 58: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

In contrast to positivist studies, objectivity and generalization are not considered in interpretive

studies. Instead, a deeper understanding of the phenomena in natural settings from the

participants’ perspective is sought. Principles for conducting and evaluating interpretive studies

in information systems are discussed in Klein and Myers’ (1999) analysis.

3-2-1-3 Critical studies3-2-1-3 Critical studies

Cecez-Kecmanovic (2001, p. 142) defines critical studies as ‘… a process of inquiry that seeks to

achieve emancipatory social change by going beyond the apparent to reveal hidden agendas,

concealed inequalities and tacit manipulation…’. Myers (1997b) states that ‘critical research

focuses on the oppositions, conflicts and contradictions in contemporary society, and seeks to

be emancipatory…’

In their work, Orlikowski and Baroudi (1991, p. 6) describe critical studies as aiming:

… to critique the status quo, through the exposure of what are believed to be deep-seated, structural

contradictions within social systems, and thereby to transform these alienating and restrictive social

conditions.

The term ‘critical’ is an umbrella term under which related but different approaches in the

social science fall. The ‘critical theory’ is the common denominator in these approaches and for

this reason critical research epistemology has its roots in critical theory36 (Howcroft & Trauth

2004, p. 196; Cecez-Kecmanovic 2001, p. 142).

Researchers in critical studies are seen as social critiques who challenge the ideologies, beliefs

and assumptions of the status quo. Both interpretive and critical approaches evolved as a

reaction to positivism (Cecez-Kecmanovic 2001, p. 142). While interpretive studies aim is to

understand societal influences, critical studies try to question them (Howcroft & Trauth 2004, p.

201).

36 The critical theory is discussed in Hammersley’s (1995) book, ‘The politics of social research’.

57 Chapter 4- Results and discussion |

Page 59: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

3-2-2 Qualitative or quantitative research3-2-2 Qualitative or quantitative research

In this section, both qualitative and quantitative methodologies are described and the

fundamental differences between them are discussed. It is argued that the quantitative

research methodology suits this thesis best.

3-2-1-1 Qualitative research3-2-1-1 Qualitative researchThere have been many academic discussions and debates about qualitative research. Some

provide in-depth descriptions of qualitative research while others simply describe it at an

introductory level.

A detailed description of qualitative research is provided by (Strauss & Corbin 1998, pp. 11-12)

as ‘… [qualitative research] can refer to research about persons’ lives, lived experiences,

behaviors, emotions, and feelings as well as about organizational functioning, social

movements, cultural phenomena, and interactions between nations’.

They also state that qualitative research has three major components as:

First, there are the data, which can come from various sources such as interviews, observations,

documents, records, and films. Second, there are the procedures that researchers can use to interpret

and organize the data. … Written and verbal reports make up the third component. These may be

presented as articles in scientific journals, in talks (e.g., conferences), or in books.

Similarly, Denzin and Lincoln (2000, pp. 3-4) define qualitative research as:

Qualitative research is a situated activity that locates the observer in the world. It consists of a set of

interpretive material practices that make the world visible. …qualitative research involves an interpretive,

naturalistic approach to the world. This means that qualitative researchers study things in their natural

settings, attempting to make sense of or interpret phenomena in terms of the meanings people bring to

them. Qualitative research involves the studied use and collection of a variety of empirical materials - case

58 Chapter 4- Results and discussion |

Page 60: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

study, personal experience, introspective, life story, interview, observational, historical, interactional, and

visual texts - that describe routine and problematic moments and meaning in individuals’ lives.

Myers (1997a, p. 241) simply expresses qualitative research as methods which help researchers

to ‘…understand and explain social phenomena’. More recently, Myers (2009) provides

examples of both qualitative methods (‘…action research, case study research and

ethnography’) and qualitative data sources (‘…observation and participant observation

(fieldwork), interviews and questionnaires, documents and texts, and the researcher's

impressions and reactions’).

Qualitative research is concerned with ‘images, feelings, impressions and qualities’ (Bouma

2000, p. 19) and provides viewpoints that takes into account culture, personality and other

nuances related to humans and society (Babbie 2001, p. 37). Findings of qualitative research

are not based on statistical procedures rather they are based on the interpretation of the

researcher.

3-2-1-2 Quantitative research3-2-1-2 Quantitative researchAccording to Johnson and Onwuegbuzie (2004), ‘…the major characteristics of traditional

quantitative research are a focus on deduction, confirmation, theory/hypothesis testing,

explanation, prediction, standardized data collection, and statistical analysis’. They also cite

that:

… quantitative purists believe that …the observer is separate from the entities that are subject to

observation …[and] social science inquiry should be objective … and real causes of social scientific

outcomes can be determined reliably and validly... [quantitative] researchers should eliminate their

biases, remain emotionally detached and uninvolved with the objects of study, and test or empirically

justify their stated hypotheses.

Myers (1997b) believes that ‘quantitative research methods were originally developed in the

natural sciences to study natural phenomena. Examples of quantitative methods now well

59 Chapter 4- Results and discussion |

Page 61: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

accepted in the social sciences, include survey methods, laboratory experiments, formal

methods (e.g. econometrics) and numerical methods such as mathematical modeling’; and

Babbie (2001, p. 37) simply remarks that quantitative research is ‘… where things are

quantifiable, measurable, explained and finite’.

The emphasis in quantitative research is on objective reality which is transformed into testable

hypotheses. Data are collected through experimentations and testing, and results are based on

statistical or other numerical analyses. The major data type is numeric data which is analyzed

employing statistical techniques. Reliability and validity of quantitative researches are discussed

in Bryman (2004, pp. 70-74).

The intention of this thesis is to explore users’ perspectives on VoIP’s security vulnerabilities

and investigate their awareness and attitudes towards them. This is achieved by employing a

survey method which is a traditional approach in quantitative studies. Accordingly, a

questionnaire is designed and the findings are based on quantifiable measures which are then

analyzed and reported as numbers, charts and percentages. As a consequence of the discussion

and definitions of qualitative and quantitative research, it is concluded that quantitative

research is the most suitable method for this study.

3-2-1-3 Triangulation3-2-1-3 TriangulationAlthough most researchers employ either qualitative or quantitative research methods, some

tend to combine them in one study. The combination of research methods in one study is called

triangulation (Myers 1997b) or mixed methodology. Denzin (1978, p. 291) defines triangulation

as ‘the combination of methodologies in the study of the same phenomenon’. An in-depth and

detailed discussion of triangulation can be found in Jick (1979).

The notion of combining qualitative and quantitative research methods is not new and in fact it

has a long tradition (19th century France) in sociological research (Erzberger & Prein 1997).

Triangulation has been a matter of debate over the years and has been the subject of much

discussion by scholars. For instance, Lee (1991) provides an integrated framework for the

60 Chapter 4- Results and discussion |

Page 62: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

interpretive and positivist approaches, and Gable (1994) discusses the benefits of integrating

case study (qualitative) and survey (quantitative) research methods. In this study, case study is

the main research method and the emphasis is on how it can be enriched by survey research.

Similarly, Ragin (1987) in his book, The Comparative Method, and Kaplan and Duchon (1988) in

their paper, provide useful discussions of triangulation.

Mingers (2001) is a scholar who believes that ‘…research results will be richer and more reliable

if different research methods, preferably from different (existing) paradigms, are routinely

combined together’. Mathison (1988) also believes that triangulation is ‘…a strategy for

increasing the validity of evaluation and research findings’. Nevertheless, some researchers

criticize triangulation. For example, (Blaikie 1991) argues that ‘… the use of triangulation has

been plagued with a lack of awareness of the different and incommensurate ontological and

epistemological assumptions associated with various theories and methods’.

Denzin (1978, pp. 294-307) provides an in-depth discussion of triangulation by outlining four

types of triangulation: (1) data triangulation; (2) investigator triangulation; (3) theory

triangulation; and (4) methodological triangulation. Mathison (1988) argues that only 3 types of

triangulation are practical and the theory triangulation ‘…is problematic at best, and likely

impossible in reality’. He refers to Denzin’s note at the end of the chapter and writes that even

Denzin is uncertain about the plausibility of the theory triangulation.

There is no unique and best research approach. Although triangulation (mixed methodology) is

not necessarily the most suitable method, it might be an appropriate one. Triangulation has a

number of advantages. In a triangulated research design the deficiency of a method can be

overcome by using the advantages of another method. For instance, quantitative data

collection approaches can be employed to test hypotheses which are generated by qualitative

methods. Actual studies of the use of triangulation can be found in Markus (1983) and

Amaratunga and Baldry (2001). The strengths and weaknesses of triangulation are summarized

in Johnson and (Onwuegbuzie 2004, p. 21).

61 Chapter 4- Results and discussion |

Page 63: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

3-2-1-4 Compare and contrast: quantitative versus qualitative research3-2-1-4 Compare and contrast: quantitative versus qualitative research

From an epistemological perspective, qualitative and quantitative research lie respectively

within the domain of interpretivist (naturalist) and positivist (empiricist) epistemologies. Lincoln

and Guba (1985, p. 37) list the different axioms between qualitative (naturalist) and

quantitative (positivist) research (Table 3-1).

Quantitative (positivist) Qualitative (naturalist)

The nature of reality Reality is single, tangible and fragmentable.

Realities are multiple, constructed and holistic.

The relationship of

knower to the knownKnower and known are independent, a dualism.

Knower and known are interactive and inseparable.

The possibility of

generalization

Time and context free generalizations (nomothetic statements) are possible.

Only time and context bound working hypotheses (idiographic statements) are possible.

The possibility of causal

linkages

There are real causes,

Temporally precedent to or simultaneous with their effects.

All entities are in a state of mutual simultaneous shaping, so that it is impossible to distinguish causes from effects.

The role of values Inquiry is value-free. Inquiry is value-bound.

Table 3-1 The Different axioms between qualitative (naturalist) and quantitative (positivist) research

Modified from Lincoln and Guba (1985, p. 37)

Qualitative research constructs social reality (cultural meaning) with a focus on interactive

processes and events and utilizes thematic analysis while researchers are involved with the

studied phenomenon. In contrast, quantitative research measures objective facts with a focus

on variables and employs statistical analysis while researchers are detached from the studied

phenomenon (Neuman 2003, p. 16).

Qualitative research is often associated with social sciences and is the “what’s it like?” study

method which emphasizes ‘…the qualities of entities and on processes and meanings that are

62 Chapter 4- Results and discussion |

Page 64: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

not experimentally examined or measured (if measured at all) in terms of quantity, amount,

intensity, or frequency… [and] …seek answers to questions that stress how social experience is

created and given meaning’ (Denzin & Lincoln 2000, p. 10). In contrast, quantitative research is

associated with the sciences which lend themselves well to quantification, such as

mathematics, physics and chemistry. Here the emphasis is on ‘…the measurement and analysis

of causal relationships between variables, not processes’ (Denzin & Lincoln 2000, p. 10).

Glesen and Peshkin (1992) compare and contrast qualitative and quantitative research. Their

summary of the differences is shown in Table 3-2.

Quantitative Research (Positivist Research) Qualitative Research (Interpretivist Research)

Assumptions

-Social facts have an objective reality

-Primacy of method

-Variables can be identified and relationships measured

-Etic (outside's point of view)

-Reality is socially constructed

-Primacy of subject matter

-Variables are complex, interwoven, and difficult to measure

-Emic (insider's point of view)

Purpose

-Generalizability

-Prediction Causal explanations

-Contextualization

-Interpretation

-Understanding actors' perspectives

Approach

-Begins with hypotheses and theories

-Manipulation and control

-Uses formal instruments

-Experimentation

-Deductive

-Component analysis

-Seeks consensus, the norm

-Reduces data to numerical indices

-Abstract language in write-up

-Ends with hypotheses and grounded theory

-Emergence and portrayal

-Researcher as instrument

-Naturalistic

-Inductive

-Searches for patterns

-Seeks pluralism, complexity

-Makes minor use of numerical indices

-Descriptive write-up

Researcher role-Detachment and impartiality

-Objective portrayal

-Personal involvement and partiality

-Empathic understanding

Table 3-2 Qualitative and quantitative research compared and contrasted (adapted from Glesen and Peshkin (1992)

63 Chapter 4- Results and discussion |

Page 65: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

3-2-3 Research reasoning process3-2-3 Research reasoning process

In this section deductive and inductive research reasoning processes are described along with

justifications for employing inductive reasoning in this research.

Goel and Dolan (2004) define reasoning as:

… the cognitive process of drawing inferences from given information. All arguments involve the claim

that one or more propositions (the premises) provide some grounds for accepting another proposition

(the conclusion).

The research reasoning process can be categorized as deductive and inductive reasoning.

3-2-3-1 Deductive reasoning3-2-3-1 Deductive reasoning

Goel and Dolan (2004) believe that deductive reasoning evaluates the validity of deductive

arguments. They describe the validity as ‘… a function of the relationship between premises and

conclusion and involves the claim that the premises provide absolute grounds for accepting the

conclusion’ and provide the following example as a deductive argument which can be validated:

All men are mortal; Socrates is a man; Socrates is mortal

3-2-3-2 Inductive reasoning3-2-3-2 Inductive reasoning

In deductive reasoning validity is evaluated but in inductive reasoning arguments are never

valid. However, the plausibility or reasonableness of inductive arguments can be evaluated.

Below is an example of an inductive argument (Goel & Dolan 2004):

Socrates is a man; Socrates is mortal; all men are mortal

64 Chapter 4- Results and discussion |

Page 66: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Klauer (1996) describes inductive reasoning as ‘…the process whereby regularities or order are

detected and, inversely, whereby apparent regularities, seeming generalizations, are disproved

or falsified’. He points out that inductive reasoning can be considered as a process of detecting

commonalities by stating similarities and differences. However, he emphasizes that ‘…it is not

enough to compare whole objects globally to each other. Instead, they have to be compared

with respect to their attributes or to the relations held in common.’

3-2-3-3 Compare and contrast: 3-2-3-3 Compare and contrast: deductive versus deductive versus inductiveinductive reasoning reasoning

Trochim (2006) provides a simple and easy-to-understand definition of both deductive (top-

down approach) and inductive (bottom-up approach) reasoning. These are depicted in Figures

3-2 and 3-3.

Figure 3- 2 Deductive research reasoning process Figure 3- 3 Inductive research reasoning process

As shown in Figure 3-2, the deductive reasoning process moves from the more general to the

more specific while inductive reasoning works the other way around.

Deductive reasoning begins from a theory and narrows down to a specific hypothesis which is

testable by observations. In contrast to this, inductive reasoning begins with specific

observations in order to detect patterns to be able to propose some tentative hypotheses.

Deductive reasoning processes end with the confirmation or rejection of a theory which is

65 Chapter 4- Results and discussion |

Observation

Pattern

Tentative hypothesis

Theory

Theory

Hypothesis

Observation

Comfirmation

Page 67: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

based on the collected data in the observation stage, while inductive reasoning processes end

with a development of a theory (Trochim 2006).

It should be noted that the inductive reasoning approach is useful for theory building while

deductive reasoning is useful for theory testing. As this study intends to develop theories

concerning users’ perspectives on VoIP’s security vulnerabilities, inductive reasoning seems to

be the appropriate choice. Furthermore, since in this research the theories were developed

based on the detected patterns which were explored by 1) designing a questionnaire 2)

collecting data 3) analyzing data and 4) result interpretation, it was concluded that inductive

reasoning is the best research method of reasoning for this study.

3-3 Sampling3-3 Sampling

In quantitative research the emphasis is on generalization and the aim is to apply the findings

(relationships amongst quantifiable measured parameters) to the general population. When the

interested population37 is small it is easy to survey the entire population. For example, For

example, if the population consists of the Heads of School at the University of South Australia,

we then have to survey only about 20 people in order to survey the complete population.

However, when the population is large (i.e. international students in Australia or Australian

aged 25-55, etc.) in most cases it is not practical or due to time and budget constraints it is not

feasible to survey each and every one of the individuals in the interested population. Therefore,

a sample representative of the population is surveyed which is much faster, cheaper and easier.

Statistical extrapolations can be made from the selected sample to the interested population.

Sampling is a statistical technique that refers to the sample selection approaches. Sampling is

discussed in detail in (Yates 1960, pp. 1-47; Sudman 1976).

37 In terms of sampling, population refers to all the individuals who fall into the category of interest (Hall 1996, p. 107).

66 Chapter 4- Results and discussion |

Page 68: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

3-4-1 General universe, population and sample3-4-1 General universe, population and sample

In the context of sampling there are 3 overlapping different types of group of individuals:

(1) general universe; (2) population (working universe); and (3) sample (Rose 1982, pp. 56-59).

This concept is depicted in Figure 3-4.

Figure 3- 4 Sampling overlapping entities

67 Chapter 4- Results and discussion |

General universe

Population

Sample

Page 69: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Table 3-3 defines these entities (group of individuals) in the context of this study.

EntitiesEntities DefinitionDefinition

General universeGeneral universe All the people who use VoIP as a mean of communication

Population Population (working universe)(working universe)

Students enrolled in the School of Computer and Information Science at the, University of South Australia

SampleSample The respondents to the questionnaire Table 3- 3 Definition of group of individuals in this thesis

3-4-2 Sampling types3-4-2 Sampling types

Different sampling techniques have been discussed in numerous studies (Nardi 2006, pp. 107-

126; Hall 1996, pp. 106-116; De Vaus 1995, pp. 60-79; Henry 1990, pp. 17-32; Weisberg 1977,

pp. 17-26; Warwick 1975, pp. 69-77). The provided classification of sampling in these studies

slightly varies. There is, however, a consensus that sampling is broadly categorized as

probability sampling (or ‘unbiased sampling’ or ‘random sampling’) and non-probability

sampling (or ‘biased sampling’ or ‘nonrandom sampling’).

According to Henry (1990, p. 17):

Probability samples are selected in such a way that every member of the population actually has a

possibility [nonzero probability with the same chance] of being included in the sample. Nonprobability

samples are selected based on the judgment of the researchers [not by chance or known probabilities of

selection] to achieve particular objectives of the research at hand.

Figure 3-5 depics Nardi’s (2006, pp. 107-126) classifications of sampling.

68 Chapter 4- Results and discussion |

Page 70: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Figure 3- 5 Classification of sampling

3-4-3 The used sampling type3-4-3 The used sampling type

In evaluating users’ awareness of VoIP security vulnerabilities, and their attitudes towards

privacy and security in VoIP communications, this thesis uses an on-line questionnaire that was

designed to collect information in order to investigate these matters. The goal was to survey

the entire population; therefore, the ‘Recruitment email’ (refer to Appendix B) was sent to all

students enrolled at the School of Computer and Information Science (CIS), University of South

Australia.

69 Chapter 4- Results and discussion |

Sampling

Probability Sampling

Simple Random Sampling

Stratified Random Sampling

Systematic Random Sampling

Cluster or Multistage Sampling

Non-Probability Sampling

Convenience or accidental Sampling

Purposive or Judgmental

Sampling

Quota Sampling

Snowball Sampling

Page 71: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Surveying the entire population implies that each and every student has to be surveyed and

obviously this was not the case in this research. There were 300 students in CIS but only 107

responded to the on-line questionnaire and this means that only 35.6% of the population

participated – just over a third of the student cohort.

Purposive sampling was employed in this study. In order to describe how this sampling method

was improved, Simple Random Sampling (SRM) is defined and then purposive sampling is

addressed.

3-4-3-1 Simple Random Sampling3-4-3-1 Simple Random Sampling

Simple Random Sampling (SRS) falls under the probability sampling category which implies each

student had an equal chance (probability) of being selected. As mentioned earlier, an email

which advertized the on-line questionnaire (the recruitment email, refer to Appendix B) was

sent to all the students of CIS; consequently, each student had nonzero probability with the

same chance of being selected.

According to Sudman (1976, pp. 49-50), SRS has two main characteristics: ‘…(1) the

probabilities of selection are equal for all elements, and (2) sampling is done in one stage with

elements of the sample selected independently of one another …’. The sampling method used

in this research was done in one stage and students were selected independently of each other;

therefore, both features of SRM were addressed.

Henry (1990, p. 27) in regard to SRS states that:

All members of the study population are either physically present or listed, and the members are selected

at random until a previously specified number of members or units has been selected. … [it is assumed

70 Chapter 4- Results and discussion |

Page 72: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

that the selection is] without replacement38. This means that once a unit is selected in the sampling

process, it is removed from the pool eligible for future selection.

In a true SRS each unit or member of the population should be clearly and unambiguously

identified (Warwick 1975, p. 77) and listed. The complete list of all possible elements in the

population that are uniquely recognizable is called a sample frame. From the sample frame the

samples are chosen by applying a random selection process. For example, a common random

selection process 39 is using a table of random numbers.

It should be pointed out that the above-mentioned procedure could not be used in this

research. This is due to the fact that the complete list of CIS students was not available to the

author.

3-4-3-2 Purposive sampling3-4-3-2 Purposive sampling

According to Guarte and Barrios (2006) ‘Purposive sampling is described as a random selection

of sampling units within the segment of the population with the most information on the

characteristic of interest’. However, in other studies purposive sampling is part of the non-

probability sampling category (Warwick 1975; Weisberg 1977), which is considered to be an

example of biased sampling and non-random sampling.

The studied population (working universe) in this research consists of the students in the School

of Computer and Information Science (CIS) at the University of South Australia. The reason for

38 In simple random sampling there is a theoretical issue on whether once an unit is selected it should be removed from the pool or it should be remained for possible reselection in the sampling process. These approches are called sampling without replacement and sampling with replacement, respectively. In practice sampling without replacement is more prevalent. 39 In a random selection process or a random technique the goal is to apply the random (chance) process to the rage of numbers corresponding to the list (Warwick 1975, p. 77). In this way samples are chosen randomly. In Sudman (1976, p. 50) there is a detailed discussion on the randomness of chance (random) selection processes. And in (Nardi 2006, p. 114) and (De Vaus 1995, pp. 61-64) there are examples of how to use a table of random numbers.

71 Chapter 4- Results and discussion |

Page 73: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

this selection is that it is assumed that the students at CIS are generally familiar with VoIP and

network security concepts.

To avoid introducing bias into the sample selection and increasing the validity of the sampling,

we ensured that the two main characteristics of SRS namely, independence between selected

elements and sampling at once, were included in the sampling process. As mentioned earlier,

an email advertising the on-line questionnaire (the recruitment email, see Appendix B) was sent

to all the students of CIS; consequently, each student had nonzero probability with the same

chance of being selected.

3-4 Data Analysis (Quantitative Data)3-4 Data Analysis (Quantitative Data)

3-4-1 Coding3-4-1 Coding

Preliminary step in quantitative data analysis is coding. In addition to coding, classifying the

responses enables the data to be better analyzed. The responses to the on-line questionnaire

are classified by sequential number orders and then coded. As illustrated in Table 3-4, each

respondent has only one code for each variable. The open questions are listed separately and

grouped into small categories. For coding and analyzing the collected data, SPSS40 (PASW

Statistics 17.0 (release 17.0.2)) and Microsoft Excel 2007 were used.

40 PASW (Predictive Analytics SoftWare) Statistics was the premier vendor for SPSS (Statistical Package for the Social Sciences). After IBM acquired the company, the PASW software became IBM SPSS Statistics. SPSS (http://www.spss.com) is a software that is used to analyze data collected from observations, surveys, etc. This program provides a range of statistical analyses along with graphical presentation of data and currently it is offered in 4 versions, 1-Standard (Fundamental analytical capabilities), 2- Professional (Additional capabilities), 3- Premium (A full range of analytical techniques) and 4- IBM SPSS Statistics for Educators (Faculty Packs and Campus Edition software).

72 Chapter 4- Results and discussion |

Page 74: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

NumberNumber Variable NameVariable Name Type of variableType of variableBackground

1 Nationality nominal (categorical)2 Average monthly talking time nominal (categorical)3 Average monthly international call time via

phone/mobile nominal (categorical)

4 Using computer to make calls/voice chat nominal (categorical)5 Average monthly use of computer to make

calls/voice chat nominal (categorical)

6 Preferred way to make international calls nominal (categorical)7 Preferred service for international calls via land

line/mobile nominal (categorical)

8 Main reason for choosing this service nominal (categorical)Awareness/attitude towards VoIP security/privacy

1 Preferred software for making calls/voice chat nominal (categorical)2 Main reason for choosing this software nominal (categorical)3 Concerned features when making international

calls nominal (categorical)

4 Comparison of security between international/long distance calls and domestic calls nominal (categorical)

5 Privacy concerns when making calls (regardless of the used service) ordinal

6 Traditional telephony security versus VoIP security nominal (categorical)

7 Concern about VoIP privacy (eavesdropping) nominal (categorical)8 Possibility of privacy breaches in VoIP versus

traditional telephony nominal (categorical)

9 Concern about VoIP security ordinal10 Possibility of privacy/security breaches in VoIP Open-ended11 Discussing security/privacy issues with service

providers ordinal

12 The discussed security/privacy issues with service providers Open-ended

Table 3- 4 Data Analysis

3-4-2 Relationship between variables3-4-2 Relationship between variables

According to the SPSS tutorial, the purpose of a cross-tabulation is to show the relationship (or

otherwise) between two variables. Cross-tabulation tables or contingency tables demonstrate

73 Chapter 4- Results and discussion |

Page 75: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

the relationship between nominal41 or ordinal42 variables. The size of the table is determined by

the number of distinct values for each variable, with each cell in the table representing a unique

combination of values. A number of statistical tests are available to determine if the

relationship between variables is statistically significant. In this study, chi-square test - which is

more common and appropriate for almost any kind of data - is used. In a chi-square test the

“Asymp. Sig” value (significance value) indicates whether the two variables are related

(dependent). The lower the value, the more likely it is that the two variables are related. In this

study, we selected a significance level of 0.05, and consequently an “Asymp. Sig” value less than

0.05 implies that the two variables are related.

3-5 Research Ethics3-5 Research Ethics

Because human subjects were involved, ethics approval was obtained from the Human

Research Ethics Committee of the University of South Australia prior to the start of this

research. Furthermore, since the participants came from the university’s School of Computer

and Information Science, written approval to recruit participants was obtained from the Head

of the school.

The participant information sheet (refer to Appendix A) explaining the purpose and scope of the

study was distributed to potential participants. It informed them of their level of commitment

and also gave them confidence to participate in this research.

41 As illustrated in Table 3-4 the questionnaire contains 16 questions that use nominal (categorical) scales. These questions produce categorical (nominal) data that have no numerical value and fit into categories such as country. Four (4 out of 16) of the categorical questions (questions 3, 5, 14 and 18 refer to Appendix C) are dichotomous (data take on one of two values such as yes or no).

42 As illustrated in Table 3-4 the questionnaire contains 2 questions (questions 12 and 16 refer to Appendix C) that use ordinal scales. These questions produce ordinal data that shows order exists among the categories. This indicates that one observation is more important or of greater values than others. These questions are also referred as scales questions.

74 Chapter 4- Results and discussion |

Page 76: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Since submitting the completed on-line questionnaire is an act of consent, seeking consent

from participants was not necessary. The questionnaire was anonymous and did not contain

any personal questions. Therefore, participants' identity remained confidential. Furthermore, in

the participant information sheet, it was stated that completing the questionnaire is optional.

3-6 Questionnaire design3-6 Questionnaire design

The on-line questionnaire is anonymous and Google Docs was used to design it. The answers to

the questions are stored at Google’s server in Google Docs spreadsheet format and it is

accessible by logging into the corresponding Gmail account.

The questionnaire contains closed and open questions. Closed questions are asked when the

potential answers are known or a scale is used. Otherwise, open questions are asked.

In designing the questionnaire, the following points were considered:

Use simple words

Avoid vague language

Provide easy-to-understand instructions

Design an appealing and easy-to-follow layout

Use short and easy-to-understand questions

Avoid hypothetical questions

Use leading and unambiguous questions

Avoid asking two questions within a single question

Provide enough room to answer questions

75 Chapter 4- Results and discussion |

Page 77: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

3-7 Summary3-7 Summary

For this thesis quantitative research methodology was employed and in order to evaluate users’

perspective on VoIP’s security vulnerabilities, an anonymous on-line questionnaire, using

Google Docs, was designed. Chapter 4 describes the results and findings.

76 Chapter 4- Results and discussion |

Page 78: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Chapter 4- Results and discussionChapter 4- Results and discussion

This chapter presents the results and provides a discussion about the knowledge developed in this research. It is organized as follows:

Section 4.1 provides an overview of this chapter

Section 4.2 describes the overview and analysis of the questions concerning the on-

line questionnaire.

Section 4.3 provides a discussion about the results and findings of this research

Section 4.4 describes the limitations of this study

Section 4.5 introduces some possibilities for further research

Section 4.6 summarizes this chapter

77 Chapter 4- Results and discussion |

Page 79: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

4-1 Overview4-1 Overview

This chapter summarizes the results and findings regarding the on-line questionnaire (refer to

Appendix C and Chapter 3). In addition, this chapter provides a discussion of the results and

findings, and outlines the limitations in this study. Further avenues for further research are

suggested.

The on-line questionnaire was designed to collect information in order to evaluate the users’

awareness of VoIP security vulnerabilities, and their attitudes towards privacy and security in

VoIP communications. The ‘Recruitment email’ (refer to Appendix B) was sent to all students at

the University of South Australia’s School of Computer and Information Science (CIS), to

encourage them to answer the questionnaire. Out of 30043 recruitment email sent, 107 valid

responses were received. To analyze the collected data, SPSS (PASW Statistics 17.0 (release

17.0.2)) and Microsoft Excel 2007 were used.

4-2 The survey results4-2 The survey results

The results of the on-line questionnaire are presented in this section, while the discussions of

the investigated issues are provided in the next chapter. The results are categorized into two

main categories: firstly, background; and secondly, awareness of/attitude to VoIP

security/privacy. In the first category, general information such as nationality, average monthly

talking time and etc… are investigated. The second category intends to explore the participants’

awareness and attitudes towards VoIP security and privacy. Furthermore, the relationships

between the two categories are examined in order to investigate whether any relationship

exists between users’ call habits and awareness/ attitude towards VoIP security and privacy.

It should be emphasized that in this study privacy is considered as eavesdropping while VoIP

security is considered to be other violating actions such as toll fraud. However, the occurrence

43 This is the approximate (not precise) number of students who received the recruitment email.

78 Chapter 4- Results and discussion |

Page 80: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

of privacy breaches indicates that the system is not well secure. In that sense, privacy breaches

in the VoIP system are synonymous to security vulnerabilities.

4-2-1 Background4-2-1 Background

4-2-1-1 Nationality4-2-1-1 Nationality

As depicted in Figures 4-1 and 4-2, the majority (60%) of participants in this study (64 out of

107) are Australian, while 40% are from 18 different countries (43 out of 107).

Figure 4-1 Overall results by country

In second place was Iran with 10 respondents and this country was followed by Afghanistan (8),

China (5) and India (4). Either 1 or 2 respondents come from other countries. Figure 4-2

illustrates the number of participants according to country.

Figure 4-2 Number of Participants by Country

79 Chapter 4- Results and discussion |

Afgh

anistan

Au

stralia

Canad

a

Chin

a

Fiji

Ind

ia

Iran

Italy

Japan

South

Korea

Malaysia

Mald

ives

Ru

ssia

South

Africa

Taiw

an

Trin

idad

and

Tob

ago

Un

ited K

ingd

om

Vietn

am

010203040506070

8

64

1 5 1 410

1 1 1 2 1 1 2 1 1 1 2

Number of Participants by country

Others40%

Australia 60%

Results by Country

Others

Australia

Page 81: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

4-2-2-2 Average monthly talking time4-2-2-2 Average monthly talking time

As shown in Table 4-1, more respondents either spend more than 7 hours (37.4%) or 1 to 4

hours (34.6%) per month talking on the phone/mobile.

Average monthly talking time Frequency Percent

1 hour – 4 hours 37 34.6

4 hours – 7 hours 15 14.0

Less than 1 hour 15 14.0

More than 7 hours 40 37.4

TotalTotal 107107 100.0100.0

Table 4-1 Average monthly talking time

The time spent talking was asked in order to investigate whether any relationship exists

between talking time and awareness and attitude towards security/privacy issues in VoIP. The

relationship between the average monthly talking time and participants’ concern about VoIP

security and privacy (eavesdropping) was found to be significant. This is illustrated in Tables 4-2

and 4-3.

80 Chapter 4- Results and discussion |

Page 82: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .005

Concern about VoIP privacy (eavesdropping)

TotalNo Yes

Average monthly talking time: 1 hour – 4 hours Count 25 10 35

% 71.4% 28.6% 100.0%

4 hours – 7 hours Count 9 6 15

% 60.0% 40.0% 100.0%

Less than 1 hour Count 10 4 14

% 71.4% 28.6% 100.0%

More than 7 hours Count 13 26 39

% 33.3% 66.7% 100.0%

Total Count 57 46 103

% 55.3% 44.7% 100.0%

Table 4-2 Relationship between talking time and being concern about VoIP privacy (eavesdropping)

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .036

Concern about VoIP Security(1=Not concerned, 5=Very concerned)

Total1 2 3 4 5

Average monthly talking time: 1 hour – 4 hours Count 13 4 9 6 1 33

% 39.4% 12.1% 27.3% 18.2% 3.0% 100.0%

4 hours – 7 hours Count 2 5 0 4 2 13

% 15.4% 38.5% .0% 30.8% 15.4% 100.0%

Less than 1 hour Count 4 3 2 5 1 15

% 26.7% 20.0% 13.3% 33.3% 6.7% 100.0%

More than 7 hours Count 6 2 12 11 6 37

% 16.2% 5.4% 32.4% 29.7% 16.2% 100.0%

Total Count 25 14 23 26 10 98

% 25.5% 14.3% 23.5% 26.5% 10.2% 100.0%

Table 4-3 Relationship between talking time and being concern about VoIP security

Table 4-2 indicates that those who spend more time on the phone/mobile are more concerned

about privacy (eavesdropping) when using VoIP. 56.5% (26 out of 46) of the respondents who

use phone/mobile more than 7 hours per month are concerned about VoIP privacy, while only

8.7% (4 out of 46) of the respondents who use phone/mobile less than 1 hour per month have

the same concern.

81 Chapter 4- Results and discussion |

Page 83: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Table 4-3 indicates that the majority of respondents who use phone/mobile more than 7 hours

per month are more concerned about VoIP security. Only 21.6% (8 out of 37) of the

respondents who use phone/mobile more than 7 hours per month selected either Scale 1 or 2

(not or little concerned), while 45.9% (17 out of 37) selected either Scale 4 or 5 (very

concerned).

4-2-3-3 Average monthly international call time via phone/mobile4-2-3-3 Average monthly international call time via phone/mobile

As shown in Table 4-4, more respondents (34.6%) do not use phone/mobile for making

international calls. However, 29% spend less than 1 hour and 22.4% spend 1 to 3 hours each

month on making international calls using phone/mobile. Only 14% dedicate more than 3 hours

of their phone/mobile conversation time to international calls.

Average monthly international call time Frequency Percent

1 hour – 3 hours 24 22.4

Less than 1 hour 31 29.0

More than 3 hours 15 14.0

N/A 37 34.6

TotalTotal 107107 100.0100.0

Table 4- 4 Average monthly international call time

The average monthly international call time (via phone/mobile) was asked in order to

investigate whether any relationship exists between international talking time and awareness

and attitude towards security/privacy issues in VoIP.

It turns out that the relationship between average monthly international talking time (via

phone/mobile) and participants’ concerns about privacy (regardless of the used service),

particularly about VoIP privacy and VoIP security, was found to be significant. This is illustrated

in Tables 4-5, 4-6 and 4-7.

82 Chapter 4- Results and discussion |

Page 84: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .001

Privacy concerns when making calls (1=Not concerned, 5=Very concerned)

Total1 2 3 4 5

Average monthly international call time:

1 hour – 3 hours Count 3 3 8 6 3 23

% 13.0% 13.0% 34.8% 26.1% 13.0% 100.0%

Less than 1 hour Count 6 8 5 10 1 30

% 20.0% 26.7% 16.7% 33.3% 3.3% 100.0%

More than 3 hours Count 1 1 0 8 5 15

% 6.7% 6.7% .0% 53.3% 33.3% 100.0%

N/A Count 11 14 3 6 2 36

% 30.6% 38.9% 8.3% 16.7% 5.6% 100.0%

Total Count 21 26 16 30 11 104

% 20.2% 25.0% 15.4% 28.8% 10.6% 100.0%

Table 4-5 Relationship between international talking time and being concern about privacy when making calls

Table 4-5 indicates that the majority of respondents who make international calls by

phone/mobile are concerned about privacy (eavesdropping). 80.4% (33 out of 41) of the

respondents who are very concerned about privacy (selected either 5 or 4 on the scale of 1 to

5) use phone/mobile to make international calls. The same trend applies to those who selected

3 on the 1 to 5 scale.

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .002

Concern about VoIP privacy (eavesdropping)

TotalNo Yes

Average monthly

international call time:

1 hour – 3 hours Count 8 16 24

% 33.3% 66.7% 100.0%

Less than 1 hour Count 17 12 29

% 58.6% 41.4% 100.0%

More than 3 hours Count 5 10 15

% 33.3% 66.7% 100.0%

N/A Count 27 8 35

% 77.1% 22.9% 100.0%

Total Count 57 46 103

% 55.3% 44.7% 100.0%

83 Chapter 4- Results and discussion |

Page 85: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Table 4-6 Relationship between international talking time and being concern about VoIP privacy (eavesdropping)

Table 4-6 indicates that most respondents who use VoIP to make international calls by their

phone/mobile are concerned about privacy (eavesdropping). The table shows that 82.6% (38

out of 46) of the respondents who use VoIP to make international calls on their phone/mobile

are concerned about privacy (eavesdropping), and in contrast, 52.6% (30 out of 57) are not.

Table 4-7 indicates that the majority of respondents who use phone/mobile more than 1

hour/month for making international calls are more concerned about VoIP security. Only 18.4%

(7 out of 38) who use phone/mobile more than 1 hour/month for making international calls

selected either Scale 1 or 2 (not or little concerned), while 47.3% (18 out of 38) selected either

Scale 4 or 5 (very concerned) and 34.2% (13 out of 38) selected Scale 3.

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .006

Concern about VoIP security (1=Not concerned, 5=Very concerned)

Total1 2 3 4 5

Average monthly

international call time:

1 hour – 3 hours Count 4 1 9 4 5 23

% 17.4% 4.3% 39.1% 17.4% 21.7% 100.0%

Less than 1 hour Count 11 2 6 8 1 28

% 39.3% 7.1% 21.4% 28.6% 3.6% 100.0%

More than 3 hours Count 1 1 4 6 3 15

% 6.7% 6.7% 26.7% 40.0% 20.0% 100.0%

N/A Count 9 10 4 8 1 32

% 28.1% 31.3% 12.5% 25.0% 3.1% 100.0%

Total Count 25 14 23 26 10 98

% 25.5% 14.3% 23.5% 26.5% 10.2% 100.0%

Table 4-7 Relationship between international talking time and being concern about VoIP security

84 Chapter 4- Results and discussion |

Page 86: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

4-2-4-4 Using computers to make calls/voice chat4-2-4-4 Using computers to make calls/voice chat

As shown in Table 4-8 most respondents (68.2%, 73 out of 107) use computers to make

calls/voice chat.

Using computer to make calls/voice chat Frequency Percent

No 34 31.8

Yes 73 68.2

TotalTotal 107107 100.0100.0

Table 4- 8 Usage of computers to make calls/voice chat

The question concerning usage of computers to make calls/voice chat was asked in order to

investigate whether any relationship exists between talking time and awareness and attitude

towards security/privacy issues in VoIP. The relationship between using computers to make

calls/voice chat and the possibility of privacy breaches emerged as being significant. This is

illustrated in Table 4-9.

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .041

Possibility of privacy breaches in traditional telephony versus VoIP

Using computer to make calls/voice chat

TotalNo Yes

Don’t know Count 17 18 35

% 48.6% 51.4% 100.0%(Possibility of privacy breaches in traditional telephony is not more than possibility of privacy breaches in VoIP)

No Count 6 21 27

% 22.2% 77.8% 100.0%

Same Count 5 10 15

% 33.3% 66.7% 100.0%(Possibility of privacy breaches in traditional telephony is more than possibility of privacy breaches in VoIP)

Yes Count 5 23 28

% 17.9% 82.1% 100.0%

Total Count 33 72 105

% 31.4% 68.6% 100.0%

Table 4-9 Relationship between using computer to make calls/voice chat and possibility of privacy breaches

85 Chapter 4- Results and discussion |

Page 87: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Table 4-9 indicates that approximately the same number of participants, regardless of the use

of computers to make calls/voice chat, think either traditional telephony is more secure than

VoIP or vice versa. 18.1% (6 out of 33) of the respondents who do not use computers to make

calls/voice chat believe that privacy breaches are more likely to occur in VoIP while 15.1% (5

out of 33) think the opposite. 29.1% (21 out of 72) of the respondents who use computers to

make calls/voice chat believe that breaches of privacy are more possible in VoIP while 31.9%

(23 out of 72) think the opposite is the case.

4-2-5-5 Average monthly use of computers to make calls/voice chat4-2-5-5 Average monthly use of computers to make calls/voice chat

Table 4-10 shows that 27.1% of the respondents (29 out of 107) do not use computers to make

calls/voice chat while 72.9% (78 out of 107) do so. 25.2% (27 out of 107) spend 1 hour–3 hours,

24.3% (25 out of 107) spend less than 1 hour and 24.3% (26 out of 107) spend more than 3

hours per month on computers making calls/voice chat

Average monthly use of computer to make calls/voice chat Frequency Percent

1 hour – 3 hours 27 25.2

Less than 1 hour 25 23.4

More than 3 hours 26 24.3

N/A 29 27.1

TotalTotal 107107 100.0100.0

Table 4-10 Average monthly use of computer to make calls/voice chat

It has to be pointed out that no relationship was found between average monthly use of

computer to make calls/voice chat and awareness and attitude towards security/privacy issues

in VoIP.

86 Chapter 4- Results and discussion |

Page 88: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

4-2-6-6 Preferred way to make international calls4-2-6-6 Preferred way to make international calls

Table 4-11 indicates that 50.5% of the respondents (54 out of 107) prefer to use computers to

make international calls while 46.7% (50 out of 107) prefer to use landline/mobile.

Preferred way to make international calls Frequency Percent

Computer 54 50.5

Land line/mobile 50 46.7

TotalTotal 104104 97.297.2Missing 3 2.8Total 107 100.0

Table 4-11 Preferred way to make international calls

This question was asked in order to investigate whether the participants prefer to use

computers or landline/mobile to make international calls and whether this preference is related

to VoIP privacy/security issues.

The relationship between the preferred methods to make international calls (via computer or

landline/mobile) and participants’ opinions about whether traditional telephony is more secure

than VoIP, and also participants’ concern about VoIP privacy and VoIP security, was found to be

significant. This is illustrated in Tables 4-12, 4-13 and 4-14.

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .022

Traditional telephony security versus VoIP security

Preferred way to make international calls

TotalComputer Land line/mobile

Don’t know Count 12 9 21

% 57.1% 42.9% 100.0%(Traditional telephony is not more secure than VoIP)

No Count 20 8 29

% 69.0% 27.6% 100.0%

Same Count 6 6 12

% 50.0% 50.0% 100.0%(Traditional telephony is more secure than VoIP)

Yes Count 14 27 43

% 32.6% 62.8% 100.0%

Total Count 54 50 107

% 50.5% 46.7% 100.0%

Table 4-12 Relationship between the preferred way to make international calls and participants’ opinion about whether traditional telephony is more secure than VoIP

87 Chapter 4- Results and discussion |

Page 89: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Table 4-12 indicates that the majority of participants who prefer to use computers for

international calls do not think that traditional telephony (landline/mobile) is more secure than

VoIP. In contrast most participants who prefer traditional telephony (landline/mobile) over

computer for making international calls think the opposite. 37% (20 out of 54) of the

respondents preferring computers over landline/mobile for international calls believe that

traditional telephony is not more secure than VoIP, and 54% (27 out of 50) of the respondents

choosing landline/mobile think that traditional telephony is more secure than VoIP.

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .003

Concern about VoIP privacy (eavesdropping)

TotalNo Yes

Preferred way to make

international calls

Computer Count 36 16 52

% 69.2% 30.8% 100.0%

Land line/mobile Count 19 29 48

% 39.6% 60.4% 100.0%

Total Count 55 45 100

% 55.0% 45.0% 100.0%

Table 4-13 Relationship between the preferred way to make international calls and participants’ concern about VoIP privacy

Table 4-13 indicates that the participants who prefer to use computers for international calls

are less concerned about VoIP privacy issues and in contrast, those who prefer landline/mobile

are more concerned. This seems to be contradictory due to the fact that when we use

computers for international calls we are actually using VoIP, while in the case of

landline/mobile, VoIP might be used. 65.4% (36 out of 55) of the respondents who prefer

computers over landline/mobile for international calls are not concerned about privacy

(eavesdropping) in VoIP. It emerged that 64.4% (29 out of 45) who prefer landline/mobile are

concerned.

88 Chapter 4- Results and discussion |

Page 90: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .001

Concern about VoIP security (1=Not concerned, 5=Very concerned)

Total1 2 3 4 5

Preferred way to make

international calls

Computer Count 21 7 11 11 1 51

% 41.2% 13.7% 21.6% 21.6% 2.0% 100.0%

Land line/mobile Count 4 7 12 14 9 46

% 8.7% 15.2% 26.1% 30.4% 19.6% 100.0%

Total Count 25 14 23 25 10 97

% 25.8% 14.4% 23.7% 25.8% 10.3% 100.0%

Table 4-14 Relationship between the preferred way to make international calls and participants’ concern about VoIP security

The relationship between the preferred way to make international calls and participants’

concerns about VoIP privacy and VoIP security are consistent. Both relationships indicate that

the respondents who prefer computers over landline/mobile for international calls are less

concerned about VoIP privacy and vice versa. Table 4-14 indicates that the majority of the

participants who like to use computers for international calls selected either Scale 1 or 2 (not or

little concerned). Conversely, the majority of the participants who prefer to use line/mobile for

international calls selected either Scale 4 or 5 (very concerned).

54.9% (28 out of 51) of the respondents who prefer computers selected either Scale 1 or 2 from

a five-point scale (not or little concerned about privacy when making international calls using

VoIP ). However, 21.5% (11 out of 51) selected Scale 3, and 50% (23 out of 46) who prefer land

line/mobile selected either Scale 4 or 5 from a five-point scale (very concerned about privacy

when making international calls using VoIP). Furthermore, 26% (12 out of 46) selected Scale 3

which also indicates their concern about privacy when using VoIP services.

4-2-7-7 Preferred service for international calls via land line/mobile4-2-7-7 Preferred service for international calls via land line/mobile

Skype is the most commonly used service followed by landline/mobile (traditional services) and

Discount International call services. As illustrated in Figure 4-3, “Lower cost” by 59% (59 out of

100) followed by “Convenience” by 27% (27 out of 100) and “Quality” by 12% (12 out of 100)

89 Chapter 4- Results and discussion |

Page 91: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

are the main reasons for choosing a service (or services) for making international calls via

landline/mobile.

The preferred service for international calls via landline/mobile was asked in order to

investigate which service (or services) participants prefer and whether this preference is related

to VoIP privacy/security issues.

The relationship between the preferred service for international calls via landline/mobile and

participants’ concern about VoIP privacy and whether they had discussed security/privacy

issues with their service provider was found to be significant.

The relationship between the preferred service for international calls via landline/mobile and

participants’ concerns about VoIP privacy indicates that the majority of the respondents who

are not concerned about VoIP privacy (eavesdropping) use Skype. This compares markedly to

those who are concerned about this issue. Furthermore, the relationship reveals that 70.9% (22

out of 31) of the participants who are not concerned about VoIP privacy use Skype, while only

25.8% (8 out of 31) who are concerned about VoIP privacy use Skype. Furthermore, 48.2% (14

out of 29) of the respondents, whether being concerned about VoIP privacy or not, use

landline/mobile (traditional services) for making international calls.

90 Chapter 4- Results and discussion |

Figure 4- 3 The main reason for choosing a service for international calls via Land line/mobile

27; 27%

2; 2%

59; 59%

12; 12%

Convenience Friend/family suggestionLower cost Quality

Page 92: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

The relationship between the preferred service for international calls via landline/mobile and

whether they had discussed security/privacy issues with their service provider indicates that

the majority of respondents who have never discussed security/privacy issues with their

telephone/VoIP service provider use either landline/mobile (traditional services) or Skype for

making international calls. The relationship also reveals that 100% (29 out of 29) and 90.3% (28

out of 31) of the participants who have not discussed security/privacy issues with their service

provider use landline/mobile (traditional services) and Skype, respectively.

4-2-8-8 Preferred software for making calls/voice chat4-2-8-8 Preferred software for making calls/voice chat

Table 4-15 shows that Skype is the most common used software (65.8%, 52 out of 79) followed

by Yahoo! Messenger (11.3%, 9 out of 79) and MSN (0.03%, 3 out of 79). The table also shows

that 73.8% (79 out of 107) use software and 21.5% (23 out of 107) do not use software to make

calla/voice chat.

Preferred software for making calls/voice chat Frequency Percent

MSN 3 2.8

N/A 23 21.5

Skype 52 48.5

Yahoo! Messenger 9 8.4

Others 15 14.0

TotalTotal 102102 95.395.3Missing 5 4.7Total 107 100.0

Table 4-15 Preferred software for making calls/voice chat

In another summation of the evidence, Figure 4-4 shows that “Convenience” (51%, 40 out of

78) is the main reason for choosing the software for making calls/ voice chat, followed by

91 Chapter 4- Results and discussion |

Page 93: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

“Quality” (28%, 22 out of 78), “Friend/family suggestion” (18%, 14 out of 78) and “Security”

(3%, 2 out of 78).

It should be pointed out that no relationship was found to exist concerning preferred software

for making calls/voice chat and awareness and attitude towards security/privacy issues in VoIP.

4-2-2 Awareness/attitude towards VoIP security/privacy4-2-2 Awareness/attitude towards VoIP security/privacy

4-2-2-1 Concerned features when making international calls4-2-2-1 Concerned features when making international calls

Figure 4-5 illustrates that the participants are mostly concerned about lower cost (56%, 57 out

of 102) followed by quality (30%, 31 out of 102), convenience (9%, 9 out of 102) and security

(3%, 3 out of 102). It has to be pointed out that two participants answered higher cost and

video as their concerned feature.

92 Chapter 4- Results and discussion |

Figure 4- 4 Reason for choosing software for making calls/ voice chat by computer

40, 51%14, 18%

22, 28%

2, 3%

Convenience Friend/family suggestionQuality Security

Page 94: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Figure 4-5 The most concerned feature when making international calls

The question about concerned feature when making international calls was asked so that the

feature that participants were most concerned about cold be investigated. It is a question that

also referred to VoIP privacy/security issues. As depicted in Figure 4-5, participants are most

concerned about lower cost and less concerned with security.

A significant relationship was found for the most concerned feature when making international

calls and the participants’ concerns about VoIP privacy. This is illustrated in Table 4-16.

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .008

Concern about VoIP privacy (eavesdropping)

TotalNo Yes

The most concerned feature

when making international

calls

Convenience Count 2 6 8

% 25.0% 75.0% 100.0%

higher cost Count 0 1 1

% .0% 100.0% 100.0%

Lower cost Count 39 17 56

% 69.6% 30.4% 100.0%

Quality Count 13 18 31

% 41.9% 58.1% 100.0%

Security Count 0 3 3

% .0% 100.0% 100.0%

video Count 1 0 1

% 100.0% .0% 100.0%

93 Chapter 4- Results and discussion |

9; 9%

57; 56%

31; 30%

3; 3% 2; 2%

ConvenienceLower costQualitySecurityOthers

Page 95: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Total Count 55 45 100

% 55.0% 45.0% 100.0%

Table 4-16 Relationship between the most concerned feature when making international and participants’ concern about VoIP privacy

Table 4-16 indicates that the majority of the respondents who are most concerned about

“Lower cost” when making international calls are not concerned about VoIP privacy

(eavesdropping), while most respondents who are most concerned about “Convenience,

Quality and Security” when making international calls are concerned about VoIP privacy

(eavesdropping). The table also reveals that 70.9% (39 out of 55) of the participants who

selected “Lower cost” also answered “No” (not concerned about VoIP privacy). Furthermore,

75% (6 out of 8) of the participants who selected “Convenience”, 58% (18 out of 31) who

selected “Quality” and 100% (3 out of 3) who selected “Security” also answered “Yes”

(concerned about VoIP privacy).

4-2-2-2 Comparison of security between international/long distance calls and 4-2-2-2 Comparison of security between international/long distance calls and domestic callsdomestic calls

Table 4-17 shows more respondents (35.5%, 38 out of 107) did not know whether

international/long distance calls are less secure than domestic calls. 27.1% (29 out 107)

believed that international/long distance calls are less secure than domestic calls while 21.5%

(23 out 107) thought the opposite and 14% (15 out 107) believed that both are the same in

terms of security.

94 Chapter 4- Results and discussion |

Page 96: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Comparison of security between international/long distance calls and domestic calls Frequency Percent

Don’t know 38 35.5(International/long distance calls are not more secure than domestic calls)

No 23 21.5

Same 15 14.0(International/long distance calls are more secure than domestic calls)

Yes 29 27.1

TotalTotal 105105 98.198.1Missing 2 1.9Total 107 100.0

Table 4- 17 Are international/long distance calls less secure than domestic calls?

This question was asked in order to investigate participants’ opinions about whether

international/long distance calls are less secure than domestic calls. This question also intends

to find any relationship between the participants’ opinions and VoIP privacy/security issues.

The relationship between participants’ opinions about whether international/long distance calls

are less secure than domestic calls and whether privacy breaches in traditional telephony are

more likely than in VoIP was found to be significant. This is illustrated in Table 4-18.

In fact, Table 4-18 indicates that about half of the respondents (44.8%, 13 out of 29) who think

international/long distance calls are less secure than domestic calls (regardless of the used

service) also believe that privacy breaches are less possible in traditional telephony

(landline/mobile) than in VoIP. Furthermore, almost the same number of participants who were

not sure whether international/long distance calls are less secure than domestic calls thinks the

opposite about the possibility of privacy breach in VoIP and traditional telephony.

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .013

Comparison of security between international/long distance calls and domestic calls

Possibility of privacy breaches in VoIP versus traditional telephony

TotalDon’t know No* Same Yes**

95 Chapter 4- Results and discussion |

Page 97: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Don’t know Count 18 9 3 8 38

% 47.4% 23.7% 7.9% 21.1% 100.0%(International/long distance calls are not more secure than domestic calls)

No Count 8 4 3 8 23

% 34.8% 17.4% 13.0% 34.8% 100.0%

Same Count 4 1 6 4 15

% 26.7% 6.7% 40.0% 26.7% 100.0%(International/long distance calls are more secure than domestic calls)

Yes Count 5 13 3 8 29

% 17.2% 44.8% 10.3% 27.6% 100.0%

Total Count 35 27 15 28 105

% 33.3% 25.7% 14.3% 26.7% 100.0%

Table 4-18 relationship between participants’ opinion about whether international/long distance calls are less secure than domestic calls and whether privacy breaches in traditional telephony is more possible or in VoIP

* Possibility of privacy breaches in traditional telephony is not more than possibility of privacy breaches in VoIP

** Possibility of privacy breaches in traditional telephony is more than possibility of privacy breaches in VoIP

4-2-2-3 Privacy concerns 4-2-2-3 Privacy concerns when making callswhen making calls

Table 4-19 shows that 28% (30 out of 107) of the participants selected Scale 4, 24.3% (26 out of

107) selected Scale 2, 19.6% (21 out of 107) selected Scale 1, 15% (16 out of 107) selected Scale

3 and 10.3% (11 out of 107) selected Scale 5.

Privacy concerns when making calls (Five point scale) Frequency Percent

1 (Not concerned) 21 19.6

2 26 24.3

3 16 15.0

4 30 28.0

5 (Very concerned) 11 10.3

TotalTotal 104104 97.297.2Missing 3 2.8Total 107 100.0

Table 4- 19 Concern about privacy when making calls/ voice chat (Five-point scale)

This question was asked in order to investigate that regardless of the used service, how

concerned are participants about privacy (eavesdropping) when making calls/ voice chat. The

96 Chapter 4- Results and discussion |

Page 98: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

answers reveal that the majority of the participants are not concerned or are little concerned

about privacy (eavesdropping) when making calls/ voice chat.

Specifically, 43.9% (47 out of 107) selected either Scale 1 or 2, highlighting that participants are

not concerned or are little concerned about privacy (eavesdropping) when making calls/ voice

chat, while 38.3% (41 out of 107) selected either Scale 4 or 5, indicating they are seriously

concerned about privacy. Furthermore, 15% (16 out of 107), by selecting Scale 3, indicated that

they are neutral.

This question also intends to find any relationship between the participants’ concerns about

privacy (eavesdropping) when making calls/ voice chat and other VoIP privacy/security issues.

The relationship between participants’ concerns about privacy when making calls (regardless of

the used service) and participants’ concerns about VoIP privacy and security was found to be

significant. This is illustrated in Tables 4-20 and 4-21.

Table 4-20 indicates that the majority of the participants who are concerned about VoIP privacy

are also concerned about privacy when making calls either via traditional telephony or VoIP.

The reverse trend applies for those who are not concerned about VoIP privacy. This group

selected either Scale 1 or 2 (not or little concerned) indicating regardless of the used service

they are not concerned about privacy when making calls.

97 Chapter 4- Results and discussion |

Page 99: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .000

Privacy concerns when making calls (1=Not concerned, 5=Very concerned)

Total1 2 3 4 5

Concern about VoIP privacy

(eavesdropping)

No Count 20 23 5 8 1 57

% 35.1% 40.4% 8.8% 14.0% 1.8% 100.0%

Yes Count 1 3 11 21 9 45

% 2.2% 6.7% 24.4% 46.7% 20.0% 100.0%

Total Count 21 26 16 29 10 102

% 20.6% 25.5% 15.7% 28.4% 9.8% 100.0%

Table 4-20 relationship between participants’ concerns about privacy when making calls and participants’ concerns about VoIP privacy

The table reveals that 75.4% (43 out of 57) of the respondents who selected either Scale 1 or 2

from a five-point scale (not or little concerned about privacy when making calls/voice chat) also

answered “No” (not concerned about privacy when using VoIP). However, 15.7% (9 out of 57)

selected either Scale 4 or 5, which is not consistent with their “No” answer.

Furthermore, 66.6% (30 out of 45) of the respondents selecting either Scale 4 or 5 from a five-

point scale (very concerned about privacy when making calls/voice chat) also answered “Yes”

(concerned about privacy when using VoIP). Furthermore, 24.4% (11 out of 45) chose Scale 3,

which also indicates their concern about privacy when using VoIP services.

Table 4-21 indicates that the participants’ concerns about privacy when making calls (regardless

of the used service) and participants’ concerns about VoIP privacy are consistent. In both

questions the majority (60.8%, 57 out of 97) of the respondents selected the same scale which

points out that most of them are concerned at the same level about security/privacy regardless

of the used service. The table reveals that 15.4% (15 out of 97) in both questions selected Scale

1, 11.3% (11 out of 97) Scale 2, 10.3% (10 out of 97) Scale 3, 15.4% (15 out of 97) Scale 4 and

8.2% (8 out of 97) Scale 5.

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .000

98 Chapter 4- Results and discussion |

Page 100: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Privacy concerns when making calls (1=Not concerned, 5= Very concerned)

Total1 2 3 4 5

Concern about VoIP

about security

1 (Not concerned) Count 15 6 1 3 0 25

% 60.0% 24.0% 4.0% 12.0% .0% 100.0%

2 Count 1 11 1 1 0 14

% 7.1% 78.6% 7.1% 7.1% .0% 100.0%

3 Count 1 4 10 8 0 23

% 4.3% 17.4% 43.5% 34.8% .0% 100.0%

4 Count 1 3 3 15 3 25

% 4.0% 12.0% 12.0% 60.0% 12.0% 100.0%

5 (Very concerned) Count 0 0 0 2 8 10

% .0% .0% .0% 20.0% 80.0% 100.0%

Total Count 18 24 15 29 11 97

% 18.6% 24.7% 15.5% 29.9% 11.3% 100.0%

Table 4-21 relationship between participants’ concerns about privacy when making calls and participants’ concerns about VoIP security

4-2-2-4 Traditional telephony security versus VoIP security4-2-2-4 Traditional telephony security versus VoIP security

Table 4-22 shows that the majority of the respondents (40.2%, 43 out of 107) believe that

traditional telephony (landline/mobile) is more secure than VoIP while 27.1% (29 out 107) think

the opposite, and 11.2% (12 out 107) believe that both are the same in terms of security. 19.6%

(21 out 107) did not know whether traditional telephony (landline/mobile) is more secure than

VoIP.

Traditional telephony security versus VoIP security Frequency Percent

Don’t know 21 19.6(Traditional telephony is not more secure than VoIP)

No 29 27.1

Same 12 11.2(Traditional telephony is more secure than VoIP)

Yes 43 40.2

TotalTotal 105105 98.198.1Missing 2 1.9Total 107 100.0

Table 4-22 Is traditional telephony (land line/mobile) more secure than VoIP?

99 Chapter 4- Results and discussion |

Page 101: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

This question was asked in order to investigate the participants’ opinions about whether

traditional telephony (landline/mobile) is more secure than VoIP. The answers to this question

reveal that participants believe that traditional telephony (landline/mobile) is more secure than

VoIP.

The relationship between participants’ views about whether traditional telephony

(landline/mobile) is more secure than VoIP and whether privacy breaches in traditional

telephony is more possible or in VoIP was found to be significant. This is illustrated in Table 4-

23.

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .002

Possibility of privacy breaches in VoIP versus traditional telephony

Traditional telephony security versus VoIP security

TotalDon’t know No* Same Yes**

Don’t know Count 12 7 2 14 35

% 34.3% 20.0% 5.7% 40.0% 100.0%(Possibility of privacy breaches in traditional telephony is not more than possibility of privacy breaches in VoIP)

No Count 3 6 2 16 27

% 11.1% 22.2% 7.4% 59.3% 100.0%

Same Count 2 3 6 4 15

% 13.3% 20.0% 40.0% 26.7% 100.0%(Possibility of privacy breaches in traditional telephony is more than possibility of privacy breaches in VoIP)

Yes Count 4 13 2 9 28

% 14.3% 46.4% 7.1% 32.1% 100.0%

Total Count 21 29 12 43 105

% 20.0% 27.6% 11.4% 41.0% 100.0%

Table 4-23 relationship between participants’ opinion about whether traditional telephony is more secure than VoIP and whether privacy breaches in traditional telephony is more possible or in VoIP

* Traditional telephony is not more secure than VoIP

** Traditional telephony is more secure than VoIP

Basically, these two questions are similar and target the same notion. The questionnaire was

carefully designed in such a way that the researcher could cross-check the answers.

Table 4-23 demonstrates that most of those who did not know whether traditional telephony

(landline/mobile) is more secure than VoIP also did not know whether privacy breaches are

100 Chapter 4- Results and discussion |

Page 102: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

more possible when using traditional telephony (landline/mobile) or when using VoIP. The

same trend applies to the participants who answered “Same” in both questions. The table

reveals that only 31.4% (33 out of 105) of the respondents gave identical answers to both

questions and 68.5% (72 out of 105) of the answers are not consistent.

4-2-2-5 Concern about VoIP privacy (eavesdropping)4-2-2-5 Concern about VoIP privacy (eavesdropping)

As shown in Table 4-24, about over half of the participants (53.3%, 57 out of 107) answered

that they are not concerned about privacy (eavesdropping) when using VoIP while 43% (46 out

of 107) answered the opposite.

Concern about VoIP privacy (eavesdropping) Frequency Percent

No 57 53.3

Yes 46 43.0

TotalTotal 103103 96.396.3Missing 4 3.7Total 107 100.0

Table 4-24 Concern about VoIP privacy (eavesdropping)

This question was asked in order to investigate whether the participants are concerned about

privacy (eavesdropping) when make calls using VoIP. The answers to this question reveal that

more of the participants are not concerned about privacy (eavesdropping) when using VoIP.

A significant relationship was found to exist between participants’ concern about privacy

(eavesdropping) when making calls using VoIP and their concern about VoIP security. This is

illustrated in Table 4-25.

Table 4-25 indicates that the participants’ concern about VoIP privacy (eavesdropping) and VoIP

security is consistent. The majority of the participants who are concerned about VoIP privacy

(eavesdropping) also selected either Scale 4 or 5 (very concerned). This shows they are also

101 Chapter 4- Results and discussion |

Page 103: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

concerned about VoIP security. The same trend applies to those who answered “No” (not

concerned about VoIP privacy) by selecting either Scale 1 or 2 (not or little concerned).

Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .000

Concern about VoIP Security(1=Not concerned, 5=Very concerned)

Total1 2 3 4 5

Concern about VoIP privacy

(eavesdropping)

No Count 23 13 11 6 0 53

% 43.4% 24.5% 20.8% 11.3% .0% 100.0%

Yes Count 2 1 12 20 9 44

% 4.5% 2.3% 27.3% 45.5% 20.5% 100.0%

Total Count 25 14 23 26 9 97

% 25.8% 14.4% 23.7% 26.8% 9.3% 100.0%

Table 4-25 relationship between participants’ concern about VoIP privacy and VoIP security

The table reveals that 67.9% (36 out of 53) of the respondents who are not concerned about

privacy when using VoIP also selected either Scale 1 or 2 from a five-point scale. This indicates

they are not at all or are little concerned about VoIP privacy when making international calls.

However, only 20.7% (11 out of 53) selected Scale 3 which is not consistent with their “No”

answer. This table also reveals that 65.9% (29 out of 44) of the respondents who are concerned

about VoIP privacy also chose either Scale 4 or 5 from a five-point scale. It suggests that they

are very concerned about VoIP privacy when making international calls. Furthermore, 27.2%

(12 out of 44) selected Scale 3 which also indicates their concern about privacy when using VoIP

services.

4-2-2-6 Possibility of privacy breaches in VoIP versus traditional telephony4-2-2-6 Possibility of privacy breaches in VoIP versus traditional telephony

Table 4-26 shows that more of respondents (32.7%, 35 out of 107) did not know whether

privacy breaches are more possible when using traditional telephony (landline/mobile) or when

using VoIP. Nearly one-quarter of participants (26.2%, 28 out 107) believed that traditional

102 Chapter 4- Results and discussion |

Page 104: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

telephony (landline/mobile) is less secure than VoIP while 25.2% (27 out 107) thought the

opposite, and 14% (15 out 107) believed that both are the same in terms of privacy.

This question was asked in order to investigate the participants’ opinions about whether

privacy breaches are more likely to occur when using traditional telephony (landline/mobile) or

when using VoIP. The answers to this question reveal that most of the participants do not know

whether privacy breaches are more likely to occur when using VoIP or when using traditional

telephony (landline/mobile.

Possibility of privacy breaches in VoIP versus traditional telephony Frequency Percent

Don’t know 35 32.7(Possibility of privacy breaches in traditional telephony is not more than possibility of privacy breaches in VoIP)

No 27 25.2

Same 15 14.0(Possibility of privacy breaches in traditional telephony is more than possibility of privacy breaches in VoIP)

Yes 28 26.2

TotalTotal 105105 98.198.1Missing 2 1.9Total 107 100.0

Table 4-26 Privacy breach is more possible in traditional telephony or VoIP?

4-2-2-7 Concern about VoIP security4-2-2-7 Concern about VoIP security

Table 4-27 shows that 24.3% (26 out of 107) of the participants selected Scale 4, 23.4% (25 out

of 107) selected Scale 1, 21.5% (23 out of 107) selected Scale 3, 13.1% (14 out of 107) selected

Scale 2 and 9.3% (10 out of 107) selected Scale 5.

103 Chapter 4- Results and discussion |

Page 105: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Concern about VoIP security (Five point scale) Frequency Percent

1 (Not concerned) 25 23.4

2 14 13.1

3 23 21.5

4 26 24.3

5 (Very concerned) 10 9.3

Total 98 91.6

Missing System 9 8.4

Total 107 100.0

Table 4-27 Concerned about VoIP security (Five-point scale)

This question was asked in order to investigate how concerned the participants are about

security issues when making international calls using VoIP.

It emerged that 36.6% (39 out of 107) selected either Scale 1 or 2, revealing that participants

are not concerned or are little concerned about security issues when using VoIP. Furthermore,

33.3% (36 out of 107) selected either Scale 4 or 5, indicating they are seriously concerned about

security. Finally, 21.5% (23 out of 107) chose Scale 3 and this meant that they are neutral about

the issue.

104 Chapter 4- Results and discussion |

Page 106: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

4-2-2-8 Possibility of privacy/security breaches in VoIP4-2-2-8 Possibility of privacy/security breaches in VoIP

Figure 4-6 illustrates that 82% (55 out of 67) of the answers was valid and 18% (12 out of 67) irrelevant. There were no invalid answers.

This question was asked in order to investigate participants’ opinions about the possibility of

privacy and security breaches when using VoIP. Below is a summary of participants’ opinions:

VoIP is less secure than regular landline/mobile services due to the nature of the

technology.

Since VoIP providers offer low-cost services, it is not expected that they offer the best

facilities and privacy.

Security/privacy is not a major concern due to the fact that the content of the

conversations is not security sensitive (calling family, etc.).

Do not talk about anything sensitive/important using VoIP/landline/mobile if you do not

want it to be known.

Conversations are monitored and analyzed by government agencies to protect national

security.

105 Chapter 4- Results and discussion |

Figure 4- 6 Valid and irrelevant answers

55; 82%

12; 18%

Valid answerIrrelevant answer

Page 107: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

4-2-2-9 Discussing security/privacy issues with service providers4-2-2-9 Discussing security/privacy issues with service providersTable 4-28 shows that the majority of the participants (88.8%, 95 out of 107) had never

discussed security/privacy issues with their telephone/VoIP service provider, while only 8% (8

out of 103) did so.

Discussing security/privacy issues with service providers Frequency Percent

No 95 88.8

Yes 8 7.5

TotalTotal 103103 96.396.3Missing 4 3.7Total 107 100.0

Table 4-28 Discussing security/privacy issues with telephone/VoIP service provider

This question was asked in order to investigate whether the participants had ever discussed

security/privacy issues with their telephone/VoIP service provider. The answers to this question

reveal that most participants had never done this.

4-2-2-10 The discussed security/privacy issues with service providers4-2-2-10 The discussed security/privacy issues with service providers

As illustrated in Figure 4-7, only 1 answer to this question was valid and relevant. Two answers

were invalid (one was a comment about the questionnaire and the other one was the character

“-”) and 11 were irrelevant. Since no trend could be ascertained because the percentage of

valid answers was so meager, no meaningful summarization can be provided. However, Table

4-30 presents the only valid answer.

The discussed security/privacy issues with service providersI asked them how secure is their service? and they replied that our encryption method your call be safe and secure

Table 4-29 The discussed security/privacy issues with service providers

106 Chapter 4- Results and discussion |

Page 108: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Figure 4- 7 Valid, invalid and irrelevant answers

4-3 Discussion of the results and findings4-3 Discussion of the results and findings

The discussion of the results and findings is presented into two sections, “Background” and

“Awareness/attitude towards VoIP security/privacy”. The Background section provides

discussion about the background characteristics of participants in regard to making calls/voice

chat and their nationality. The second section discusses participants’ awareness and attitudes

towards VoIP security and privacy issues, which are the aims of this research.

4-3-1 Background4-3-1 Background

4-3-1-1 Nationality4-3-1-1 Nationality

There were no relationships between nationality and awareness/attitude towards

security/privacy issues in VoIP. This is due to the fact that most of the countries (13 out of 18)

had either 1 or 2 participants. Most of the respondents (60%, 64 out of 107) are Australian,

while the rest of the participants (40%, 43 out of 107) are from 17 other countries. Obviously

107 Chapter 4- Results and discussion |

2; 12%

14; 82%

1; 6%

Invalid answerIrrelevant answerValid answer

Page 109: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

the sample size is too small to conclude that there is a relationship between nationality and

awareness/attitude towards security/privacy issues in VoIP.

4-3-1-2 Average monthly talking time4-3-1-2 Average monthly talking time

The analyses of the findings highlight the following in relation to average monthly talking time:

- Participants who spend more time on phone/mobile dedicate more of their conversation time

to international calls. In all, 93.3% (14 out of 15) of the respondents who use phone/mobile

more than 7 hours per month dedicate more than 3 hours to international calls, while 45.2%

(14 out of 31) who use phone/mobile 1 to 4 hours per month dedicate less than 1 hour per

month to international calls.

- The majority of the respondents who use phone/mobile more than 1 hour per month also use

computers to make calls/voice chat. Furthermore, the majority of the respondents who use

phone/mobile less than 1 hour per month do not use computers to make calls/voice chat.

Analyses indicate that 75.6% (28 out of 37) of the respondents who use phone/mobile 1 to 4

hours per month, 53.3% (8 out of 15) of those who use phone/mobile 4 to 7 hours per month

and 77.5% (31 out of 40) of those who use phone/mobile more than 7 hours per month use

computers to make calls/voice chat. Analysis further shows that 60% (9 out of 15) of the

respondents who use phone/mobile less than 1 hour per month do not use a computer to make

calls/voice chat.

- The majority of those who speak more on phone/mobile also spend more time on computers

making calls/voice chat. Findings show that 65% (26 out of 40) of the respondents who use

phone/mobile more than 7 hours per month spend more than 1 hour per month on computers

for making calls/voice chat, and 60% (9 out of 15) of those who use phone/mobile less than 1

hour per month do not use a computer to make calls/voice chat.

108 Chapter 4- Results and discussion |

Page 110: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

In regard to users’ awareness and attitude towards VoIP privacy and security, the average

monthly talking time is related to the participants’ concern about VoIP privacy and security

issues. Those who speak more are more concerned. However, it has to be pointed out that

although the results highlight that the participants who spend more than 7 hours/month on the

phone/mobile are more concerned about VoIP privacy (eavesdropping) and VoIP security, there

is no technical reason to support this belief. If a VoIP system is vulnerable to privacy/security

breaches, the duration of the communication will not affect the system’s level of security and

consequently will not affect the users. For instance, in Zhu and Fu’s (2011) study, the duration

of Skype calls is not a metric in their proposed traffic analysis attacks on Skype calls. This

indicates that if one uses Skype more often, he or she is not more vulnerable to such attacks.

Similarly, in Benini and Sicari’s (2008) research the risk assessment method they proposed

when assessing the risks of intercepting VoIP calls is not related to the duration of calls.

4-3-1-3 Average monthly international call time4-3-1-3 Average monthly international call time

The analyses of the findings highlight the following with reference to average monthly

international call time:

- The time dedicated to international calls when using phone/mobile follows the same pattern

as the time spent on computers for calls/voice chat. Those who spend more (or less) time on

phone/mobile for international calls spend more (or less) time on computers for calls/voice

chat. Less than half (44.0% -11 out of 25) of the respondents who use phone/mobile for less

than 1 hour/month for international calls also spend less than 1 hour/month on computers for

calls/voice chat. The same trend applies to the other categories, 1 hour – 3 hours, more than 3

hours and N/A.

-The respondents who make international calls by phone/mobile use discount international call

services (or international telephone cards) and most respondents who do not make

international calls by phone/mobile use Skype. This is consistent with the findings regarding the

109 Chapter 4- Results and discussion |

Page 111: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

preferred software for making calls/voice chat. Almost all the VoIP free applications in addition

to offering voice and video calls and chats, provide file transfer and instant messaging features.

From this perspective Skype does not offer a unique service. The popularity of Skype is due to

the fact that it is one of the first that targeted the PC-to-PC call market. In addition, the quality

of services offered by Skype is reasonable and the (SkypeOut which enables calls to be placed

from PCs to landlines/mobiles), and PSTN-to-PC (SkypeIn - which enables calls to be placed

from landlines/mobiles to PCs) means that Skype offers a complete solution for making calls.

Skype is so widespread that it is in fact synonymous with PC-to-PC and low cost international

calls.

In regard to users’ awareness and attitudes towards VoIP privacy and security, the average

monthly international call time is similar to the average monthly talking time. Both are related

with the participants’ concern about VoIP privacy and security, and those who speak more are

naturally more concerned. However, as discussed in section 5-2-1-2, from a technical point of

view the duration of the communication has no effect on the system’s security. Therefore the

users who speak more will not be affected.

4-3-1-4 Using computers to make calls/voice chat4-3-1-4 Using computers to make calls/voice chat

The analyses of the findings highlight the followings in relation to the use of computers to make calls/voice chat:

- The majority of the respondents who use computers to make calls/voice chat spend either 1

hour – 3 hours or more than 3 hours each month doing this. Analyses reveal that 72.6% (53 out

of 73) of the respondents who use computers to make calls/voice chat spend either 1 hour – 3

hours or more than 3 hours, while 37.7% (20 out of 73) spend less than 1 hour every month on

a computer for this purpose.

-The majority of the respondents who use a computer to make calls/voice chat prefer to use it

for making international calls and those who do not use prefer using landline/mobile. Analyses

110 Chapter 4- Results and discussion |

Page 112: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

reveal that 66.6% (48 out of 72) of the respondents who use computers to make calls/voice

chat prefer computers while 33.3% (24 out of 72) prefer landline/mobile to make international

calls.

- The majority of the respondents who use a computer to make calls/voice chat use Skype. 71%

(49 out of 69) of the respondents who use computer to make calls/voice chat use Skype, 0.08%

(6 out of 69) use Yahoo! Messenger, 0.04% (3 out of 69) use MSN and either 0.01% (1 out of 69)

or 0.02% (2 out of 69) use various less common applications.

In regard to users’ awareness and attitude towards VoIP privacy and security, using computers

to make calls/voice chat is related to the participants’ opinions about the possibility of privacy

breaches in VoIP and traditional telephony. The majority of the participants who use computers

for making calls/voice chat believe that privacy breaches are less possible in VoIP than in

traditional telephony. This attitude may refer to the network knowledge that computer users

have. It has been pointed out in Porter et al. (2006a, pp. 114-118) that eavesdropping VoIP is

harder in comparison to eavesdropping PSTN. This is due to the fact that PSTN security is

considered to be physical wire security while for wiretapping VoIP attackers must have access

to the communication channel of VoIP parties. This is due to the distributed environment of IP

networks being more difficult to penetrate.

4-3-1-5 Average monthly use of computer to make calls/voice chat4-3-1-5 Average monthly use of computer to make calls/voice chat

The analyses of the findings highlight the following in regard to the average monthly use of

computers to make calls/voice chat:

- The majority of the respondents - regardless of the time they spend on a computer for making

calls/voice chat - use Skype. This is consistent with the previous analysis (using computers to

make calls/voice chat) where the majority of the respondents who use computers to make

calls/voice chat do use Skype. Analyses reveal that 55.5% (15 out of 27) of the respondents who

111 Chapter 4- Results and discussion |

Page 113: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

spend 1 to 3 hours/month, 65.3% (17 out of 26) of those who spend more than 3 hours/month,

and 52% (13 out of 25) of those who spend less than 1 hour/month on computers to make

calls/voice chat use Skype.

4-3-1-6 Preferred way to make international calls4-3-1-6 Preferred way to make international calls

The analyses of the findings highlight the followings in relation to the preferred way to make

international calls:

- The majority of the respondents regardless of their preference for using either computers or

landline/mobile for making international calls use Skype. Analyses reveal that 55.5% (30 out of

54) of the respondents who prefer to use computers for international calls and 42% (21 out of

50) of those who prefer landline/mobile over computer use Skype. This indicates that Skype is

the most common service for making international calls either via computer or landline/mobile.

- It is obvious that the reason for choosing a service by those who are most concerned about

“lower cost” when making international calls, is the lower cost that the service offers. However,

the same trend does not apply to those who chose a service for other reasons such as

convenience, friend/family suggestion, quality and security. Analyses reveal that 42.4% (42 out

of 99) of the respondents who are most concerned about lower cost when making international

calls want a service that is cheaper. Therefore, the feature that the respondents are most

concerned about when making international calls matches the reason that they choose a

service for making such calls. This is not the case for those who chose a service for convenience

(74%, 20 out of 27) and lower cost (27.5%, 16 out of 58) when making international calls since

the reason for selecting a service differs from the concerned feature. This may indicate that the

respondents did not accurately answer the questions.

112 Chapter 4- Results and discussion |

Page 114: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

4-3-1-7 Preferred service for international calls via land line/mobile4-3-1-7 Preferred service for international calls via land line/mobile

The analyses of the findings highlight the following concerning the preferred service for making

international calls via landline/mobile:

Skype is the most commonly used service followed by landline/mobile (traditional services) and

Discount International call services. The common factor with “Skype” and “Discount

International call services” is the lower cost that these services offer. In contrast,

“landline/mobile (traditional services)” is more convenient and offers higher quality of service.

However, it can be argued that Skype could be used on landline/mobile; therefore, the

convenience and lower cost factors are addressed.

4-3-1-8 Preferred software for making calls/voice chat4-3-1-8 Preferred software for making calls/voice chat

The analyses of the findings highlight the following in relation to the preferred software for

making calls/voice chat:

Convenience followed by quality, friend/family suggestion and security is the main reason for

choosing computer software for making calls/ voice chat. In all, 49.3% (39 out of 79) of the

respondents choose software for convenience, 25.3% (20 out of 79) for quality, 16.4% (13 out

of 79) for friend/family suggestion and only 0.02% (2 out of 79) for security. This clearly

highlighted the fact that respondents are least concerned about security features of the

software they use.

4-3-2 Awareness/attitude towards VoIP security/privacy4-3-2 Awareness/attitude towards VoIP security/privacy

4-3-2-1 Concerned features when making international calls4-3-2-1 Concerned features when making international calls

The analyses of the findings highlight the following in relation to the participants’ most

concerned feature when making international calls:

113 Chapter 4- Results and discussion |

Page 115: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

- Participants are most concerned about lower cost followed by quality, convenience and

security. Therefore, they are least concerned about security and this is probably due to the fact

that generally people who make international calls talk to their relatives/friends and the

content of their conversations is not confidential. Confidential and sensitive conversations go

through end-to-end secure lines, which is common in enterprises and government-sensitive

sectors.

- The majority of the respondents who are most concerned about “Convenience, Quality and

Security” when making international calls are concerned about VoIP privacy (eavesdropping). In

contrast, most of those (68.4%, 39 out of 57) who are most concerned about “Lower cost” are

not concerned about VoIP privacy. This demonstrates that when most participants are paying

less for their calls they are not concerned about the privacy of their conversations. This is

consistent with the participants’ opinions about the possibility of privacy and security breaches

in VoIP. Answers reveal that most of the participants did not expect VoIP providers to offer the

best facilities and privacy since they offer low-cost services.

4-3-2-2 Comparison of security between international/long distance calls and 4-3-2-2 Comparison of security between international/long distance calls and domestic callsdomestic calls

The analyses of the findings highlight the following in relation to the participants’ opinion about

whether international/long distance calls are more secure or domestic calls:

- More of the respondents (35.5%, 38 out of 107) do not know whether international/long

distance calls are less secure than domestic calls. Only 27.1% (29 out 107) believe that

international/long distance calls are less secure than domestic calls. Additionally, 44.8% (13 out

of 29) of the respondents who believe international/long distance calls are less secure than

domestic calls (regardless of the used service) also believe that PSTN is more secure than VoIP.

This is due to the fact that VoIP is much more likely to be used for international than domestic

calls.

114 Chapter 4- Results and discussion |

Page 116: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

4-3-2-3 Privacy concerns 4-3-2-3 Privacy concerns when making callswhen making calls

The analyses of the findings highlight the following in relation to the participants’ opinions

about privacy (eavesdropping) when making calls/ voice chat:

- In all, 43.9% (47 out of 107) of the participants are not concerned or are little concerned about

privacy (eavesdropping) when making calls/ voice chat. In contrast, 38.3% (41 out of 107) of the

participants are seriously concerned about privacy, and 15% (16 out of 107) remained neutral

on this issue.

- The majority of the participants who are concerned about VoIP privacy and VoIP security are

also concerned about privacy when making calls via traditional telephony and vice versa. This

indicates that participants’ concern about privacy/security when making calls is not related to

the service they use. In other words, these participants are concerned about privacy/security

when making calls either by traditional telephony or VoIP.

4-34-3-2-4 -2-4 ComparisonComparison of VoIP and traditional telephony from privacy/security perspective of VoIP and traditional telephony from privacy/security perspective

The analyses of the findings highlight the following when comparing VoIP and traditional

telephony from the privacy/security perspective:

- The majority of the participants believe that traditional telephony (landline/mobile) is more

secure than VoIP. However, they do not know that the likelihood of privacy breaches in VoIP is

more or the likelihood of privacy breaches in traditional telephony (landline/mobile) is more.

This is in line with Patrick’s (2009, pp. 14-15) study where myths about VoIP security were

addressed. He argues that although it is generally assumed that the traditional phone system

(PSTN) is more secure than VoIP, this is not necessarily true. It has to be noted that PSTN

security is based on physical security. Therefore, an eavesdropper can wiretap PSTN by

115 Chapter 4- Results and discussion |

Page 117: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

physically accessing telephone lines which is much easier to do than to wiretapping VoIP

systems.

4-3-2-5 Concern about VoIP privacy (eavesdropping)/security4-3-2-5 Concern about VoIP privacy (eavesdropping)/security

The analyses of the findings highlight the followings in relation to participants’ concern about

VoIP privacy (eavesdropping) and VoIP security:

- The majority of the participants neither are concerned about VoIP privacy (eavesdropping) nor

about VoIP security.

- Participants’ concern about VoIP privacy and security is consistent. The majority of those

(65.9%, 29 out of 44) who are concerned about VoIP privacy (eavesdropping) are also

concerned about VoIP security, and the majority of participants (67.9%, 36 out of 53) who are

not concerned about VoIP privacy are also not concerned about VoIP security.

It has to be pointed out that in the on-line questionnaire privacy is considered to be

eavesdropping and VoIP security is considered as other violating actions such as toll fraud.

4-3-2-6 Discussing security/4-3-2-6 Discussing security/privacyprivacy issues with service providers issues with service providers

The analyses of the findings highlight the following in relation to the discussing security and/or

privacy issues with service providers:

- Most of the participants (88.8%, 95 out of 107) never discussed security/privacy issues with

their service provider.

This is in line with participants’ most concerned feature when making calls/voice chat. For

international calls via PSTN participants are most concerned about lower cost (59%, 59 out of

116 Chapter 4- Results and discussion |

Page 118: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

100) and least concerned about security (2%, 2 out of 100). For calls/voice chat via computers

participants are most concerned about convenience (51%, 40 out of 78) and least concerned

about security (3%, 2 out of 78). This indicates that participants either using PSTN or VoIP are

least concerned about security.

4-4 Limitations4-4 Limitations

One limitation of this study is the total number of the surveyed population. Although a sample

of 107 participants is reasonable out of a population of about 300 students at the CIS, more

significant findings might be revealed from a larger sample. This is particularly important since

when applying the chi-square test in order to determine if the relationship between variables is

significant, the value of the expected count should be more than 5. When the sample is not

large, some cells in the cross-tabulated tables may have an expected value of less than 5, which

makes the chi-square test unreliable. To avoid this, researchers either combine categories or

increase the sample size. In this study, the researcher could neither combine categories (due to

the nature of the questions) nor increase the sample size (due to time limitation and the long

process of obtaining ethics approval).

Another limitation of this study is that the researcher did not have access to the complete list of

the CIS student population. Consequently, it was not possible to apply truly the Simple Random

Sampling (SRS) method, which is the preferred sampling technique in quantitative studies.

4-5 Further research4-5 Further research

Due to time constraints in conducting this study and the difficulties experienced in obtaining

research ethics approval, the surveyed population was limited to the students at the School of

Computer and Information Science, University of South Australia. Further research on this topic

117 Chapter 4- Results and discussion |

Page 119: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

would entail a larger sample population, comprising the general population and students from

other universities.

Although this study attempted to investigate whether there is a relationship between

nationality and awareness/attitude towards security/privacy issues in VoIP, this was not the

major focus of this research. To enrich this study with cross-cultural perspectives, surveys

should be conducted in overseas universities. Finally, some suggestions could be offered to

both VoIP service providers and VoIP users with regard to security/privacy issues.

4-6 Summary4-6 Summary

The results and findings of the on-line questionnaire are summarized and analyzed using SPSS

and Microsoft Excel 2007. The overview and analysis of on-line questionnaire are presented. In

addition, the relationship between variables were examined (using the chi-square test) and

when a relationship was found to be significant and meaningful, it was explained in more detail.

Furthermore, a discussion of the knowledge developed in this thesis is presented along with the

limitations of this study and suggestion of some possibilities for further research.

118 Chapter 4- Results and discussion |

Page 120: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Chapter 5- ConclusionChapter 5- Conclusion

The conclusion of this thesis is presented in this chapter

119 Chapter 4- Results and discussion |

Page 121: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

The purpose of this thesis was to evaluate the users’ awareness of VoIP security vulnerabilities,

and their attitudes towards privacy in VoIP communications.

VoIP technology is widely established and it represents a major trend in telecommunications

where an increasing number of stakeholders are involved. The lower cost and greater flexibility

of VoIP over traditional phone systems are the key drivers of its wide acceptance in both

businesses and individual uses. However, VoIP, like other technologies, while offering

opportunities, introduces security risks as well. Since VoIP uses IP networks to transfer

voice/video/data traffic, it complicates networking security, and it is vulnerable to both VoIP

specific attacks and attacks to the underlying IP network.

VoIP security has been widely studied from the technical and industrial perspectives. No known

research to the best of the researcher’s knowledge has evaluated users’ perspectives on VoIP

security and privacy vulnerabilities. This study evaluated the users’ awareness and attitudes

towards privacy and security issues in VoIP communications. For this reason, an on-line

questionnaire was designed to collect information, and to analyze the collected data

quantitative-statistical techniques were employed.

The findings of this study revealed that the majority of participants are neither concerned

about VoIP privacy (eavesdropping) or VoIP security. They also do not expect to have the best

facilities and privacy features when using VoIP since VoIP providers generally offer low-cost

services. Also, the findings indicate that participants are most concerned about lower cost and

least concerned about security when making international calls. However, most respondents

who make international calls (either using VoIP or traditional telephony, and either by phone or

via computer) are at some level concerned about privacy (eavesdropping). The same trend

applies to domestic and interstate calls as well.

120 Chapter 4- Results and discussion |

Page 122: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

For other participants where security/privacy is not a major concern, it is believed that the

content of their conversations does not contain sensitive information (calling family, etc.).

However, these participants are concerned about security/privacy issues if they are having a

business/private conversation.

Most of the participants believe that traditional telephony (landline/mobile) is more secure

than VoIP. However, they are not aware that whether the likelihood of privacy breaches in VoIP

is more or the likelihood of privacy breaches in traditional telephony (landline/mobile) is more.

This is does not apply to the majority of the participants who use computers for making

calls/voice chat since they believe that privacy breaches are less possible in VoIP than in

traditional telephony.

It is commonly believed that, regardless of the used service (VoIP/landline/mobile), privacy

breaches are very possible and therefore one should not talk about anything sensitive or

important. There is also a widespread belief that conversations are monitored and analyzed by

governments for reasons of national security.

There is a relationship between conversation duration and awareness and attitude towards

security/privacy issues in VoIP. Those who spend more time talking either by phone or via

computers, are more concerned about security/privacy. However, the respondents who prefer

computers over landline/mobile for international calls are less concerned about VoIP privacy

and vice versa.

Convenience is the main reason for choosing specific software for making calls/voice chat by

computers, although the respondents are least concerned about the security features of the

software they use. In this regard, Skype is the most common service that participants use. There

is no relationship between the time they spend on a computer for making calls/voice chat and

the choice of Skype as software. However, those who speak more on phone/mobile also spend

121 Chapter 4- Results and discussion |

Page 123: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

more time on computers for making calls/voice chat. Furthermore, most of the respondents

who use computers to make calls/voice chat use Skype.

122 Chapter 4- Results and discussion |

Page 124: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Appendix AAppendix A – Participant information sheetParticipant information sheet

University of South AustraliaDivision of Information Technology, Engineering and the Environment

School of Computer and Information Science

Participant information sheetParticipant information sheet

Name: Alireza HeraviQualification: Bachelors’ degree in computer engineering -softwareContact: 0451053463Research title: “Evaluation of users’ perspective on VoIP security vulnerabilities”

Invitation to participateInvitation to participateYou are all invited to participate in this research study by answering an on-line anonymous questionnaire which will take less than 10 minutes. Participation is voluntary and highly appreciated. Following provides detailed information about the research.

Purpose of this studyPurpose of this studyVoIP refers to making calls through computers/ International telephone card/ Skye/ Cheep International call service providers and etc...

The significance of security issues in voice over IP (VoIP) communications is well known and many papers have been published to address VoIP’s security vulnerabilities. However so far, no known research have been conducted to evaluate users’ perspective on these issues.

This study seeks to evaluate the users’ awareness of VoIP security vulnerabilities, and their attitude towards privacy in VoIP communications. An on-line anonymous questionnaire is designed to collect information in order to investigate this matter.

Collected informationCollected information - The questionnaire is anonymous and no personal information is asked.

123 Appendix A |Participant information sheet

Page 125: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

- All records containing personal information will remain confidential and no information which could lead to identification of any individual will be released.

- The questionnaire only contains questions regarding users’ opinion about VoIP security (e.g. Skype, voice chat, etc...).

- Since the on-line questionnaire is designed by using Google Docs, the information will be stored at Google’s server.

- Since the information is stored on Google’s server, it can be assumed that the information is secure and is only accessible by the researcher.

- This study is a short-term research projects for assessment purposes only and the information will be stored for 12 months as a computer file (Google Docs spreadsheet).

What the participant will be expected to do:What the participant will be expected to do:It is expected that participants only answer the on-line anonymous questionnaire.

Possible risks:Possible risks:- Since the questionnaire is anonymous, there is no possible risk for participants.

- Participants are free to withdraw from the research project at any stage without affecting their status now or in the future.

Final research findingsFinal research findingsParticipants who wish to be provided with the final research findings please contact the researcher Email: heray004@[email protected]

The summary of the research findings will be emailed to participants who are keen to have it.

This project has been approved by the University of South Australia's Human Research Ethics Committee. If you have any ethical concerns about the project or questions about your rights as a participant please contact the Executive Officer of this Committee, Tel: +61 8 8302 3118; Email: [email protected]'

124 Appendix A |Participant information sheet

Page 126: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

125 Appendix A |Participant information sheet

Page 127: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Appendix B- Recruitment emailAppendix B- Recruitment email

Dear All

My name is Alireza Heravi and I’m doing LMCP (Master of Science (Computer and Information Science) program at UniSA, Division of Information Technology, Engineering and the Environment, School of Computer and Information Science.

A partial fulfillment of the requirements for LMCP is submitting a thesis. My thesis title is “Evaluation of users’ perspective on VoIP’s security vulnerabilities”

VoIP refers to making calls through computers/ International telephone card/ Skye/ Cheep International call service providers and etc...

For this purpose I designed an on-line anonymous questionnaire. The questionnaire aims to explore the users’ perspective on security and privacy issues while using VoIP services to communicate.

- Filling the questionnaire will take less than 10 minutes- No personal information is asked.

The online anonymous questionnaire is accessible through the following address:

https://spreadsheets.google.com/viewform?formkey=dHlieHNkX1hQZHZYQVAzd3hCUGVnRHc6MQ

Your participation is highly appreciated

Thank youAlireza Heravi

126 Appendix B |Recruitment email

Page 128: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Appendix CAppendix C – QuestionnaireQuestionnaire

127 References |

Page 129: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

128 References |

Page 130: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

129 References |

Page 131: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

130 References |

Page 132: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

ReferencesReferences

Ahmed, AS & Shaon, RH 2009, 'Evaluation of popular VoIP services', paper presented at the Adaptive Science & Technology, 2009. ICAST 2009. 2nd International Conference on.

Al-Allouni, H, Rohiem, AE, Hashem, M, El-moghazy, A & Ahmed, AEA 2009, 'VoIP Denial of service attacks classification and implementation', paper presented at the Radio Science Conference, 2009. NRSC 2009. National.

Alsmairat, I, Shankaran, R, Orgun, M & Dutkiewicz, E 2009, 'Securing Session Initiation Protocol in Voice over IP Domain', paper presented at the Dependable, Autonomic and Secure Computing, 2009. DASC '09. Eighth IEEE International Conference on.

Amaratunga, D, Baldry, D 2001, ‘Case study methodology as a means of theory building: Performance measurement in facilities management organisations’, Work Study, Vol. 50, no. 3, pp. 95-105.

Arul, P & Shanmugam, A 2009, ‘Generate a key for AES using biometric for VoIP network security’ Journal of Theoretical and Applied Information Technology, vol 15, no. 2, viewed 7 June 2010, < http://www.jatit.org/volumes/research-papers/Vol5No2/2Vol5No2.pdf>.

Babbie, E 2001, The practice of learning social research, 9th edn, Wadsworth Thomson Learning, Belmont, California, USA

Bailey, KD 2007, Methods of Social Research, 4 edn, The Free Press, New York.

Baset, SA & Schulzrinne, HG 2006, 'An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol', paper presented at the INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings.

131 References |

Page 133: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Baroncelli, F, Martini, B, Martini, V & Castoldi, P 2010, 'Extending next generation network (NGN) architecture for connection-oriented transport', Computer Communications, vol. In Press, Corrected Proof.

Basicevic, I, Popovic, M & Kukolj, D 2008, 'Comparison of SIP and H.323 Protocols', paper presented at the Digital Telecommunications, 2008. ICDT '08. The Third International Conference on, June 29 2008-July 5 2008.

Baumann, R, Cavin, S & Schmid, S 2006, Voice over IP - security and SPIT, Swiss Army, FU Br 41, KryptDet Report, University of Berne, viewed 15 April 2010, < http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.63.6329&rep=rep1&type=pdf>.

Benini, M & Sicari, S 2008, 'Assessing the risk of intercepting VoIP calls', Computer Networks, vol. 52, no. 12, pp. 2432-2446.

Berners-Lee, T 1996, 'WWW: past, present, and future', Computer, vol. 29, no. 10, pp. 69-77.

Bonfiglio, D, Mellia, M, Meo, M, Ritacca, N & Rossi, D 2008, 'Tracking Down Skype Traffic', paper presented at the INFOCOM 2008. The 27th Conference on Computer Communications, IEEE.

Blaikie, NWH 1991 ‘A critique of the use of triangulation in social research’, Quality and Quantity, Vol. 25, no. 2, pp. 115-136.

Bonfiglio, D, Mellia, M, Meo, M & Rossi, D 2009, 'Detailed Analysis of Skype Traffic', Multimedia, IEEE Transactions on, vol. 11, no. 1, pp. 117-127.

Bouma, G 2000, The research process, 4th edn, Oxford University Press, Melbourne, Vic.

Branch, PA, Heyde, A & Armitage, GJ 2009, Rapid identification of Skype traffic flows, ACM, Williamsburg, VA, USA, pp. 91-96.

Brittain, JE 2005, 'Electrical Engineering Hall of Fame: Alexander Graham Bell', Proceedings of the IEEE, vol. 93, no. 2, pp. 467-470.

132 References |

Page 134: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Broesch, JD 1997, 'Signal Acquisition', in Digital Signal Processing Demystified, Newnes, Burlington, pp. 49-58.

Bross, JFM & Meinel, C 2008, 'Can VoIP Live up to the QoS Standards of Traditional Wireline Telephony?', paper presented at the Telecommunications, 2008. AICT '08. Fourth Advanced International Conference on, 8-13 June 2008.

Bryman, A 2004, Social research methods, 2ed edn, Oxford University Press.

Butcher, D, Xiangyang, L & Jinhua, G 2007, '15-Security Challenge and Defense in VoIP Infrastructures', Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol. 37, no. 6, pp. 1152-1162.

Casner, S & Jacobson, V1999, ‘Compressing IP/UDP/RTP headers for low-speed serial links’, IETF RFC 2508, viewed 22 February 2011, < http://www.faqs.org/rfcs/rfc2508.html >.

Cecez-Kecmanovic, D 2001, ‘Doing Critical IS Research: the Question of Methodology’ in QualitativeResearch in Information Systems: Issues and Trends, eds EM Trauth, Idea Group Publishing, Hershey PA, US.

Chen, C-Y, Wu, T-Y, Huang, Y-M & Chao, H-C 2008, 'An efficient end-to-end security mechanism for IP multimedia subsystem', Computer Communications, vol. 31, no. 18, pp. 4259-4268.

Chen, S-H, Guido, RC, Truong, T-K & Chang, Y 2010, 'Improved voice activity detection algorithm using wavelet and support vector machine', Computer Speech & Language, vol. 24, no. 3, pp. 531-543.

Cherry, S 2005, 'Seven myths about voice over IP', Spectrum, IEEE, vol. 42, no. 3, pp. 52-57.

Chua, WF 1986, 'Radical Developments in Accounting Thought', The Accounting Review, vol. 61, no. 4, pp. 601-632.

133 References |

Page 135: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Corrocher, N 2003, 'The diffusion of Internet telephony among consumers and firms: Current issues and future prospects', Technological Forecasting and Social Change, vol. 70, no. 6, pp. 525-544.

Dantu, R, Fahmy, S, Schulzrinne, H & Cangussu, J 2009, 'Issues and challenges in securing VoIP', Computers & Security, vol. , vol. 28, no. 8, pp. 743-753.

Davidson, J & Peters, J 2000, Voice over IP Fundamentals, Cisco Press, Indianapolis, USA.

Davidson, J, Peters, J, Bhatia, M, Kalidindi, S & Mukherjee, S 2006, Voice over IP Fundamentals, Second Edition, 2 edn, Cisco Press, Indianapolis, USA.

Degermark, M, Nordgren, B &Pink, S 1999, ‘IP Header Compression’, IETF RFC 2507, viewed 20 February 2011, < http://www.faqs.org/rfcs/rfc2507.html >.

Denzin, NK 1978, The research act: A theoretical introduction to sociological methods, 2nd edn, McGraw-Hill, New York.

Denzin, NK, Lincoln, YS 2000, ‘Introduction’, in Handbook of Qualitative Research, 2nd edn, eds NK Denzin & YS Lincoln, Sage Publications, Thousand Oaks, California, pp. 1–30.

De Vaus, DA 1995, Surveys in social research, 4th ed. edn, Allen & Unwin, North Sydney.

Douglas, CS & Tom, L 2004, 'VoIP Security: Not an Afterthought', ACM Queue, vol. 2, no. 6.

Engan, M, Casner, S & Bormann, C 1999, ‘IP Header Compression over PPP’, IETF RFC 2509, viewed 23 February 2011, < http://www.faqs.org/rfcs/rfc2509.html >.

Engan, M, Casner, S & Bormann, C 2003, ‘IP Header Compression over PPP’, IETF RFC 3544, viewed 23 February 2011, < http://www.faqs.org/rfcs/rfc3544.html >.

Epstein, J 2009, 'Securing Voice', in Scalable VoIP Mobility, Newnes, Boston, pp. 323-347.

134 References |

Page 136: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Erzberger, C, Prein, G 1997, ‘Triangulation: Validity and empirically-based hypothesis construction’, Quality and Quantity, Vol. 31, no. 2, pp. 141-154.

Flood, JE 1976, 'Alexander Graham Bell and the invention of the telephone', Electrical Engineers, Proceedings of the Institution of, vol. 123, no. 12, pp. 1387-1388.

Frost, N 2006, 'VoIP threats - getting louder', Network Security, vol. 2006, no. 3, pp. 16-18.

Gable, GG 1994, 'Integrating case study and survey research methods: an example in information systems', Eur J Inf Syst, vol. 3, no. 2, pp. 112-126.

Ge, Z, Fischer-Huebner, S, Martucci, LA & Ehlert, S 2009, 'Revealing the Calling History of SIP VoIP Systems by Timing Attacks', paper presented at the Availability, Reliability and Security, 2009. ARES '09. International Conference on.

Geneiatakis, D, Kambourakis, G, Dagiuklas, T, Lambrinoudakis, c & Gritzalis, S 2005, SIP Security Mechanisms: A state-of-the-art review, Department of Information and Communication Systems Engineering, University of the Aegean, viewed on 10 April 2010, <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.105.7241&rep=rep1&type=pdf >.

Geneiatakis, D, Dagiuklas, T, Kambourakis, G, Lambrinoudakis, C, Gritzalis, S, Ehlert, KS & Sisalem, D 2006, 'Survey of security vulnerabilities in session initiation protocol', Communications Surveys & Tutorials, IEEE, vol. 8, no. 3, pp. 68-81.

Geneiatakis, D & Lambrinoudakis, C 2007, 'An ontology description for SIP security flaws', Computer Communications, vol. 30, no. 6, pp. 1367-1374.

Glasmann, J, Kellerer, W & Muller, H 2001, 'Service development and deployment in H.323 and SIP', paper presented at the Computers and Communications, 2001. Proceedings. Sixth IEEE Symposium on, 2001.

Glasmann, J, Kellerer, W & Muller, H 2003, 'Service architectures in H.323 and SIP: A comparison', Communications Surveys & Tutorials, IEEE, vol. 5, no. 2, pp. 32-47.

135 References |

Page 137: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Glesne, C, Peshkin, A 1992, Becoming a qualitative researcher: An introduction, Longman, New York.

Goel, V & Dolan, RJ 2004, 'Differential involvement of left prefrontal cortexin inductive and deductive reasoning', Cognition, vol. 93, no. 3, pp. B109-B121.

Goode, B 2002, 'Voice over Internet protocol (VoIP)', Proceedings of the IEEE, vol. 90, no. 9, pp. 1495-1517.

Gritzalis, D & Mallios, Y 2008, 'A SIP-oriented SPIT Management Framework', Computers & Security, vol. 27, no. 5-6, pp. 136-153.

Groom, FM & Groom, KM 2004, The Basics of Voice over Internet Protocol, International Engineering Consortium, Chicago.

Guarte, J & Barrios, E 2006, 'Estimation Under Purposive Sampling', Communications in Statistics: Simulation & Computation, vol. 35, no. 2, pp. 277-284.

Gupta, P & Shmatikov, V 2007, 'Security Analysis of Voice-over-IP Protocols', paper presented at the Computer Security Foundations Symposium, 2007. CSF '07. 20th IEEE.

Hall, DJ 1996, Practical social research: project work in the community, MacMillan, Houndmills, Basingstoke, Hampshire.

Hammersley, M 1995, The politics of social research, Sage Publications, London.

Handa, A 2009, 'Introduction to IMS', in System Engineering For IMS Networks, Newnes, Burlington, pp. 1-24.

Hanes, D & Salgueiro, G 2008, Fax, Modem, and Text for IP Telephony, Cisco Press, Indianapolis, USA.

Henry, GT 1990, Practical sampling, Sage Publications, Newbury Park.

136 References |

Page 138: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Hirschheim, RA 1985, ‘Information Systems Epistemology: An Historical Perspective, London School of Economics, viewed 7 January 2011, <http://areadocenti.eco.unicas.it/virili/TerracinaRW/Kit/HirschheimISEpistemology.pdf>.

Hong, L & Mouchtaris, P 2000, 'Voice over IP signaling: H.323 and beyond', Communications Magazine, IEEE, vol. 38, no. 10, pp. 142-148.

Howcroft, D, Trauth, EM 2004, ‘The Choice of Critical Information Systems Research’ in Information Systems Research: Relevant Theory and Informed Practice, B Kaplan, DP Truex, D Wastell, AT Wood-Harper & JI DeGross, Kluwer Academic Publishers Boston, US.

Huang, H & Lin, F 2009, 'A speech feature extraction method using complexity measure for voice activity detection in WGN', Speech Communication, vol. 51, no. 9, pp. 714-723.

Huang, H, Yu, H-T & Feng, X-L 2009, 'A SPIT Detection Method Using Voice Activity Analysis', paper presented at the Multimedia Information Networking and Security, 2009. MINES '09. International Conference on, 18-20 Nov. 2009.

Jick, TD 1979, 'Mixing Qualitative and Quantitative Methods: Triangulation in Action', Administrative Science Quarterly, vol. 24, no. 4, pp. 602-611.

Johnson, RB & Onwuegbuzie, AJ 2004, 'Mixed Methods Research: A Research Paradigm Whose Time Has Come', Educational Researcher, vol. 33, no. 7, pp. 14-26.

Kaplan, B & Duchon, D 1988, 'Combining Qualitative and Quantitative Methods in Information Systems Research: A Case Study', MIS Quarterly, vol. 12, no. 4, pp. 571-586.

Karam, MJ & Tobagi, FA 2001, 'Analysis of the delay and jitter of voice traffic over the Internet', paper presented at the INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, 2001.

Karapantazis, S & Pavlidou, F-N 2009, 'VoIP: A comprehensive survey on a promising technology', Computer Networks, vol. 53, no. 12, pp. 2050-2090.

137 References |

Page 139: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Klauer, KJ 1996, 'Teaching inductive reasoning: some theory and three experimental studies', Learning and Instruction, vol. 6, no. 1, pp. 37-57.

Klein, HK, Myers, MD 1999, ‘A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems’, MIS Quarterly, vol. 23, no. 1, pp. 67-94.

Kleinrock, L 2008, 'History of the Internet and its flexible future', Wireless Communications, IEEE, vol. 15, no. 1, pp. 8-18.

Kopsidas, S, Zisiadis, D & Tassiulas, L 2006, 'Voice Interactive Personalized Security (VoIPSEC) protocol: Fortify Internet telephony by providing end-to-end security through inbound key exchange and biometric verification', paper presented at the Hot Topics in Web Systems and Technologies, 2006. HOTWEB '06. 1st IEEE Workshop on, 13-14 Nov. 2006.

Koren, T, Casner, S, Geevarghese, J, Thompson, B & Ruddy, P 2003, ‘Enhanced Compressed RTP (CRTP) for Links with High Delay, packet Loss and Reordering’, IETF RFC 3545, viewed 20 February 2011, < http://www.faqs.org/rfcs/rfc3545.html >.

Kuhn, DR, Walsh, JT & Fries, S 2005, Security Considerations for Voice Over IP Systems, National Institute of Standards and Technology, U.S. Department of Commerce, viewed on 10 April 2010, <http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf>.

Lee, AS 1989, 'A Scientific Methodology for MIS Case Studies', MIS Quarterly, vol. 13, no. 1, pp. 33-50.

Lee, AS 1991, 'Integrating Positivist and Interpretive Approaches to Organizational Research', Organization Science, vol. 2, no. 4, pp. 342-365.

Lincoln, YS, Guba, EG 1985, Naturalistic Inquiry, Sage Publications, Newbury Park, California.

Liu, Z, Martensson, A, Miyazaki, A, Svanbro, K, Wiebke, T, Yoshimura, T & Zheng, H 2001, ‘RObust Header Compression (ROHC): Framework and Four Profiles: RTP, UDP, ESP, and Uncompressed’, IETF RFC 3095, viewed 23 February 2011, < http://www.faqs.org/rfcs/rfc3095.html >.

138 References |

Page 140: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Lukasik, S 2010, 'Why The ARPANET Was Built', Annals of the History of Computing, IEEE, vol. PP, no. 99, pp. 1-1.

Markus, ML 1983, 'Power, Politics, and MIS Implementation', Communications of the ACM, vol. 26, no. 6, pp. 430-444.

Martínez Perea, R 2008, 'The IMS', in Internet Multimedia Communications Using SIP, Morgan Kaufmann, Burlington, pp. 501-540.

Mathison, S 1988, 'Why Triangulate?', Educational Researcher, vol. 17, no. 2, pp. 13-17.

Mingers, J 2001, 'Combining IS Research Methods: Towards a Pluralist Methodology', Information Systems Research, vol. 12, no. 3, pp. 240-259.

Mohapatra, SK 2009, 'Integrated planning for Next Generation Networks', paper presented at the Integrated Network Management-Workshops, 2009. IM '09. IFIP/IEEE International Symposium on, 1-5 June 2009.

Mu, x, ller, J & Massoth, M 2010, 'Defense against Direct Spam over Internet Telephony by Caller Pre-validation', paper presented at the Telecommunications (AICT), 2010 Sixth Advanced International Conference on, 9-15 May 2010.

Myers, MD 1997a, 'Qualitative Research in Information Systems', MIS Quarterly, vol. 21, no. 2, pp. 241-242.

Myers, MD 1997b, 'Qualitative Research in Information Systems', MIS Quarterly, viewed 7 January 2011, <http://www.qual.auckland.ac.nz/>.

Myers, MD 2009, Qualitative Research in Business & Management, Sage Publications, London.

Neuman, WL 2003, Social research methods: Qualitative and quantitative approaches, 5th edn, Allyn and Bacon, Boston.

139 References |

Page 141: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

O'Neill, JE 1995, 'The role of ARPA in the development of the ARPANET, 1961-1972', Annals of the History of Computing, IEEE, vol. 17, no. 4, pp. 76-81.

Oouch, H, Takenaga, T, Sugawara, H & Masugi, M 2002, 'Study on appropriate voice data length of IP packets for VoIP network adjustment', paper presented at the Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE, 17-21 Nov. 2002.

Orlikowski, WJ & Baroudi, JJ 1991, 'Studying Information Technology in Organizations: Research Approaches and Assumptions', Information Systems Research, vol. 2, no. 1, pp. 1-28.

Patrick, P 2009, Voice over IP Security, Cisco Press, Indianapolis, USA.

Perenyi, M, Gefferth, A, Trang Dinh, D & Molnar, S 2007, 'Skype Traffic Identification', paper presented at the Global Telecommunications Conference, 2007. GLOBECOM '07. IEEE.

Piccard, P 2006, 'Skype Security', in Syngress Force Emerging Threat Analysis, Syngress, Rockland, pp. 103-121.

Porter, T 2006, 'Threats to VoIP Communications Systems', in Syngress Force Emerging Threat Analysis, Syngress, Rockland, pp. 3-25.

Porter, T & Gough, M 2007, 'Skype Security', in How to Cheat at VoIP Security, Syngress, Burlington, pp. 253-262.

Porter, T, Kanclirz, J, Zmolek, A, Rosela, A, Cross, M, Chaffin, L, Baskin, B & Shim, C 2006a, 'PSTN Architecture', in Practical VoIP Security, eds. P Thomas, K Jan, Z Andyet al, Syngress, Burlington, pp. 91-121.

Porter, T, Kanclirz, J, Zmolek, A, Rosela, A, Cross, M, Chaffin, L, Baskin, B & Shim, C 2006 b, ' The IP Multimedia Subsystem: True Converged Communications', in Practical VoIP Security, Syngress, Burlington, pp. 499-517. Prowell, S, Kraus, R & Borkin, M 2010, 'Man-in-the-Middle', Seven Deadliest Network Attacks, Syngress, Boston, pp. 101-120.

140 References |

Page 142: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Quittek, J, Niccolini, S, Tartarelli, S, Stiemerling, M, Brunner, M & Ewald, T 2007, 'Detecting SPIT Calls by Checking Human Communication Patterns', paper presented at the Communications, 2007. ICC '07. IEEE International Conference on, 24-28 June 2007.

Quittek, J, Niccolini, S, Tartarelli, S & Schlegel, R 2008, 'On Spam over Internet Telephony (SPIT) Prevention', Communications Magazine, IEEE, vol. 46, no. 8, pp. 80-86.

Ragin, CC 1987, The Comparative Method: Moving Beyond Qualitative and Quantitative Strategies, University of California Press, Berkeley, Los Angeles and London.

Richardson, T 2007, 'Next Generation Network Management', in The Cable and Telecommunications Professionals' Reference (Third Edition), ed. H Goff, Focal Press, Boston, pp. 207-224.

Rose, G 1982, Deciphering sociological research, Macmillan, London.

Rufi, A 2007, Network Security 1 and 2 Companion Guide (Cisco Networking Academy), Cisco Press, Indianapolis, USA.

Sarrocco, C & Ypsilanti, D 2007, ‘Convergence and next generation networks’, ministerial background report 2, Organization for Economic Cooperation and Development (OECD), viewed 9 March 2011, <http://www.oecd.org/dataoecd/25/11/40761101.pdf>.

Schulzrinne, H & Rosenberg, J 1998a, ‘A Comparison of SIP and H.323 for Internet Telephony’, proceedings of the 1998 Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV '98), July 1998, Cambridge, England.

Schulzrinne, H & Rosenberg, J 1998b, 'Signaling for Internet telephony', paper presented at the Network Protocols, 1998. Proceedings. Sixth International Conference on, 13-16 Oct 1998.

Schulzrinne, H & Rosenberg, J 1999, 'Internet Telephony: architecture and protocols - an IETF perspective', Computer Networks, vol. 31, no. 3, pp. 237-255.

141 References |

Page 143: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Schulzrinne, H & Rosenberg, J 2000, 'The Session Initiation Protocol: Internet-centric signaling', Communications Magazine, IEEE, vol. 38, no. 10, pp. 134-141.

Sengar, H, Zhen, R, Haining, W, Wijesekera, D & Jajodia, S 2010, 'Tracking Skype VoIP Calls Over The Internet', paper presented at the INFOCOM, 2010 Proceedings IEEE, 14-19 March 2010.

Shanks, G 2002, 'Guidelines for Conducting Positivist Case Study Research in Information Systems', Australasian Journal of Information Systems, vol. 10, no. 1.

Simon, M & Slay, J 2010, 'Recovery of Skype Application Activity Data from Physical Memory', paper presented at the Availability, Reliability, and Security, 2010. ARES '10 International Conference on, 15-18 Feb. 2010.

Sisalem, D, Kuthan, J & Ehlert, S 2006, 'Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms', Network, IEEE, vol. 20, no. 5, pp. 26-31.

Srivatsa, M, Iyengar, A, Liu, L & Jiang, H 2010, 'Privacy in VoIP Networks: Flow Analysis Attacks and Defense', Parallel and Distributed Systems, IEEE Transactions on, vol. PP, no. 99, pp. 1-1.

Stanton, R 2006, 'Secure VoIP - an achievable goal', Computer Fraud & Security, vol. 2006, no. 4, pp. 11-14.

Strauss, AC, Corbin, JM 1998, Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, 2ed edn, Sage Publications, London.

Sudman, S 1976, Applied sampling, Academic Press, New York.

Sundquist, J & Service, N 2006, Top 10 Myths about VoIP, Epygi Technologies Ltd., viewed on 3 March 2011, <http://www.epygi.com/pdf/WhitePapers/Epygi%20white%20paper%20-%2010%20VoIP%20Myths.pdf>.

142 References |

Page 144: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Thom, GA 1996, 'H.323: the multimedia communications standard for local area networks', Communications Magazine, IEEE, vol. 34, no. 12, pp. 52-56.

Trochim, WMK 2006, The Research Methods Knowledge Base, 2nd edition, viewed 4 January 2011, <http://www.socialresearchmethods.net/kb/dedind.php>.

Varey, R J, Wood-Harper, T, Wood, R 2002, ‘A theoretical review of management and information systems using a critical communications theory’, Journal of Information Technology, vol.17, no. 4, pp. 229-240.

Varshney, U, Snow, A, McGivern, M & Howard, C 2002, 'Voice over IP', Commun. ACM, vol. 45, no. 1, pp. 89-96.

Venkatesha Prasad, R, Sangwan, A, Jamadagni, HS, Chiranth, MC, Sah, R & Gaurav, V 2002, 'Comparison of voice activity detection algorithms for VoIP', paper presented at the Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh International Symposium on, 2002.

VOIPSA, 2005, ‘VoIP Security and Privacy Threat Taxonomy’ viewed on 27 February 2011, <http://www.voipsa.org/Activities/VOIPSA_Threat_Taxonomy_0.1.pdf>.

Wallingeord, T 2006, VoIP HACKS Tips & Tools for Internet Telephony, O'reilly, Sebastopol, CA, US.

Walsh, TJ & Kuhn, DR 2005, 'Challenges in securing voice over IP', Security & Privacy, IEEE, vol. 3, no. 3, pp. 44-49.

Wang, X, Chen, S & Jajodia, S 2005, Tracking anonymous peer-to-peer VoIP calls on the internet, ACM, Alexandria, VA, USA, pp. 81-91

Wang, X, Zhang, R, Yang, X, Jiang, X & Wijesekera, D 2008, Voice pharming attack and the trust of VoIP, ACM, Istanbul, Turkey, pp. 1-11.

Warwick, DP 1975, The sample survey: theory and practice, McGraw-Hill, New York.

143 References |

Page 145: Chapter 1- Introduction Web viewIN is based on a signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local Area Signaling Services (CLASS) services

Weisberg, HF 1977, An introduction to survey research and data analysis, W. H. Freeman, San Francisco.

Yates, F 1960, Sampling methods for censuses and surveys, 3rd ed., revised and enlarged. edn, C. Griffin, London.

Ye, Z, Yuanchao, L, Vikram, A & Huirong, F 2009, 'On Privacy of Skype VoIP Calls', paper presented at the Global Telecommunications Conference, 2009. GLOBECOM 2009, IEEE.

Yu-Sung, W, Bagchi, S, Singh, N & Wita, R 2009, 'Spam detection in voice-over-IP calls through semi-supervised clustering', paper presented at the Dependable Systems & Networks, 2009. DSN '09. IEEE/IFIP International Conference on, June 29 2009-July 2 2009.

Zhang, R, Wang, X, Farley, R, Yang, X & Jiang, X 2009a, On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers, ACM, Sydney, Australia, pp. 61-69.

Zhang, R, Wang, X, Yang, X, Farley, R & Jiang X 2009b, ‘An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems’, ISPEC pp. 59-70.

Zhu, Y & Fu, H 2010, 'Traffic analysis attacks on Skype VoIP calls', Computer Communications, vol. In Press, Corrected Proof.

Zisiadis, D, Kopsidas, S & Tassiulas, L 2007a, 'An Architecture for Secure VoIP and Collaboration Applications', paper presented at the Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU 2007. Third International Workshop on, 19-19 July 2007.

Zisiadis, D, Kopsidas, S & Tassiulas, L 2007b, 'Voice Interactive Personalized Security Protocol: Definition and Security Analysis', paper presented at the Secure Network Protocols, 2007. NPSec 2007. 3rd IEEE Workshop on, 16-16 Oct. 2007.

144 References |