SECURITY ANALYSIS OF PROTOCOL (VOIP) VOICE OVER INTERNET ON SIGNAL PRIVATE MESSENGER APPLICATION
Abstract_ Signal is an instant messaging application that is quite popular. Currently Signal's instant messaging application includes the most secure messaging application because it maintains the privacy of all users. Just like other instant messaging applications, signal also provides service...
Saved in:
Main Author: | |
---|---|
Format: | Theses |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/52578 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | Abstract_ Signal is an instant messaging application that is quite popular. Currently Signal's instant messaging application includes the most secure messaging application because it maintains the privacy of all users. Just like other instant messaging applications, signal also provides services to make calls using Voice over Internet Protocol (Voip) technology. Voice over Internet Protocol technology converts analog voice into digital and it is sent over the network in the form of data packages in real time. Because a lot of people have started using Signal as a means of chatting and telephone, it causes the possibility of vulnerability that can be utilized to hack this application, especially on VoIP technology. Various attacks on Voip technology often occur like Man in The Middle Attack (MITM), Denial of Services (DoS), Eavesdropping and more. This research will analyze VoIP security on the Signal application. In addition to using VoIP, for the security side and this application uses the Signal protocol to initiate calls and also for key exchanges and authentication.
This study aims to determine the level of security of Voip on the Signal application and also examine whether the technologies used to support the work of Voip are in accordance with existing theories, do not rule out the possibility of this research to find vulnerability in Voip technology that is applied to this application. The stages used in this study are library studies, testing and also passive scanning in general and specifically, then an analysis of scanning results, from the results of scanning done testing to test the theory used and also testing security vulnerabilities in VoIP. The results of the testing will be analyzed and determined conclusions. The hope of this research is to find out how the technology works and how the theories used are implemented properly.
|
---|