System for Rogue VoIP Phone Detection and Managing VoIP Phone Mobility
Ilyas Khudhair Dubi1, Ghiath Mageb Waheeb2, Saif Ahmed Jabbar3, Hasimi Sallehuddin4, Nurhizam Safie Mohd Satar5, Farashazillah Yahya6, Nur Azaliah Abu Bakar7 

1Ilyas Khudhair Dubi, Faculty of Information Science & Technology, Universiti Kebangsaan Malaysia Ghiath.
2Mageb Waheeb, Faculty of Information Science & Technology, Universiti Kebangsaan Malaysia.
3Saif Ahmed Jabbar, Faculty of Information Science & Technology, Universiti Kebangsaan Malaysia.
4Hasimi Sallehuddin, Faculty of Information Science & Technology, Universiti Kebangsaan Malaysia.
5Nurhizam Safie Mohd Satar, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Selangor, Malaysia.
6Farashazillah Yahya, Faculty of Computing & Informatics, Universiti Malaysia Sabah, Malaysia.
7Nur Azaliah Abu Bakar, Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia.

Manuscript received on 03 March 2019 | Revised Manuscript received on 09 March 2019 | Manuscript published on 30 July 2019 | PP: 2469-2474 | Volume-8 Issue-2, July 2019 | Retrieval Number: B2080078219/19©BEIESP | DOI: 10.35940/ijrte.B2080.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The quickly propelling Voice over Internet Protocol (VoIP) innovation, is picking up customer fascination in the business today. Its uses, including IP communication frameworks, includes the transmission of voice as information bundles which after achieving the getting side, reassembles and deciphers according to necessity. This encourages open just as private IP frameworks. The real drawback, keeping numerous organizations off from utilizing VoIP advances is related to the security of this framework. This paper examines a strategy and the following framework that get to arrange data for approved system gadgets. The entrance insights and data empower to follow gadget development all through the system. In addition, it offers to recognize unapproved gadgets making false endeavors to get to the system, presenting to be an approved access gadget.
Index Terms: VoIP Security Threats, VoIP Attacks.

Scope of the Article: Mobility and Location-Dependent Services