SlideShare uma empresa Scribd logo
1 de 46
voipSecurity
Ridhvesh Shethwala – 15mcei27
Outlines
Introduction
What is Voip.?
How Voip works.?
Protocol used in Voip
Security attack on Voip system
How we can prevent it.?
Conclusion
Reference
Network Features PSTN (Voice) VoIP (Voice)
Switch Circuit Switched Packet Switched
Connection Connection Oriented Connection Oriented
Bit Rate Fixed and low<=64kb/s Standard Bit Rate
Bursts Nonexistent
Error tolerance User error control Self error Control
Info resending Can not (real time) It Can
Delay Must be low and stable Very Less Delay
What is voip.?
VoIP (Voice Over Internet Protocol) is an IP network
based voice transmission technology, instead of the
traditional analog telephone line, it allows people to
make telephone calls through broadband internet
connections.
In other words, just installing network telephone
software on the PCs at each end, people can talk
through to each other through the IP network.
With the development of network technology,
network IP telephony grew from PC-PC to IP-PSTN,
PSTN-IP, PSTN- PSTN and IP-IP, etc.
How Voip
works.?
Analog Signal
Converting Analog to Digital Signal
Compress
Encode
Packetization
Transmitted through IP Network
Decode
Decompress
Converting Digital to Analog Signal
HowVoip
works.?
(Cont.)
Protocolusedin
Voip.
RTP
SIP
MGCP
H.323
RTP
Real-TimeTransport Protocol (RTP) is an internet
standard protocol, used to transfer real time data, such
as audio and video. It can be used for IP telephony.
RTP includes two parts: data and control.The control
part is called RealTime Control Protocol (RTCP).
VoIP uses protocols such as real-time protocol (RTP)
and H.323 to deliver packets over the internet.
It provides support for real-time applications, includes
timing reconstruction, loss detection, security and
content identification.
RTP
(Cont.)
RTP Header contains information of the payload, such as
the source address, size, encoding type, etc.
To transfer RTP packet on the network, we need to use User
Datagram Protocol (UDP) to create a UDP header.To
transfer UDP packet over IP network, we also need to create
an IP header.
RTP Data structure RTP Data in IP packet
RTP
(Cont.)
RTP FEATURES:-
To provide end-to-end delivery service for real time data,
such as audio and video.
RTP uses time stamps and sequence numbers to implement
reliable delivery, flow control and congestion control.
RTP is only a protocol framework, it is open to new
multimedia software.
RTP and RTCP provide functionalities to deliver real time
data. RTP and RTCP aren’t responsible for synchronization,
or something like it which is the higher level task.
RTCP
RealTime Control Protocol carries control information,
which is used to manage the QoS.
It provides supports for applications such as real-time
conference.
The supports include source identification, multicast-
to-unicast translator, and different media streams
synchronization.
There are five types of RTCP packets:-
I. RR: Receive Report
II. SR: Sender Report.
III. SDES: Source Description Items.
IV. BYE: used to indicate that participation is finished.
V. APP: application specified functions.
H.323
H.323 is a set of protocols for voice, video, and data
conferencing over packet-based networks such as the
Internet.
The H.323 protocol stack is designed to operate above
the transport layer of the underlying network.
H.323 can be used on top of any packet-based network
transport like Ethernet,TCP/UDP/IP, ATM, and Frame
Relay to provide real-time multimedia communication.
H.323 uses the Internet Protocol (IP) for inter-network
conferencing.
H.323
(cont.)
Scope of H.323
Point-to-point and multipoint conferencing support:
Inter-network interoperability:
Heterogeneous client capabilities
Audio and video codecs:
Management and accounting support:
Security:
Supplementary services
H.323
(CONT.)
Authentication under H.323 can be either symmetric
encryption- based or subscription-based.
For symmetric encryption-based authentication, prior
contact between the communicating entities is not
required because the protocol uses Diffie-Hellman key-
exchange to generate a shared secret identity between
the two entities.
With reference to the H.235 recommendation, a
subscription-based authentication requires a prior
shared secret identity, and there are three variations of
this:
 Password-based with symmetric encryption,
 Password-based with hashing, and
 Certificate-based with signatures
MGCP
Media Gateway Control Protocol (MGCP) is a
protocol used for controllingVoice over IP (VoIP)
Gateways from external call control elements.
MGCP is the emerging protocol that is receiving wide
interest from both the voice and data industries.
MGCP is a protocol for controlling media gateways
from call agents. It superseded the Simple Gateway
Control Protocol (SGCP) .
In aVoIP system, MGCP can be used with SIP or H.323.
SIP or H.323 will provide the call control functionality
and MGCP can be used to manage media
establishment in media gateways.
MGCP
(cont.)
Characteristics of MGCP:
-- A master/slave protocol.
-- Assumes limited intelligence at the edge (endpoints)
and intelligence at the core (call agent).
-- between call agents and media gateways.
-- Differs from SIP and H.323 which are peer-to-peer
protocols.
-- Interoperates with SIP and H.323.
MGCP
(cont.)
MGCP provides:
 Call preservation—calls are maintained during failover
and failback
 Dial plan simplification—no dial peer configuration is
required on the gateway
 Hook flash transfer
 Tone on hold
 MGCP supports encryption of voice traffic.
 MGCP supports Q Interface Signalling Protocol (QSIG)
functionality.
SIP
The Session Initiation Protocol is a text-based
signaling communications protocol, which is used to
creation, management and terminations of each
session.
It is responsible for smooth transmission of data
packets over the network. It considers the request
made by the user to make a call and then establishes
connection between two or multiple users.When the
call is complete, it destroys the session.
SIP
(CONT.)
SIP can be used for two party (unicast) or multi party
(multicast) sessions. It works in along with other
application layer protocols that identify and carry the
session media.
The protocol itself provides reliability and does not
depend onTCP for reliability. Also, it depends on the
Session Description Protocol (SDP) which is
responsible for the negotiation for the codec
identification
SIP
(CONT.)
SIP Messages:-
 REGISTER – Registers a user with a SIP server
 INVITE – Used to invite to participate in a Call session
 ACK – Acknowledge an INVITE request
 CANCEL – Cancel a pending request
 OPTIONS – Lists the information about the capabilities
of the caller
 BYE –Terminates a connection
SIP
(CONT.)
Services Provided by the SIP
 Locate User
 Session Establishment
 Session Setup Negotiation
 Modify Session
 Teardown/End Session
Security Aspects ofVoIP
Security
Aspectsin
VoIP
Server authentication:
SinceVoIP users typically communicate with each
other through someVoIP infrastructure that involves
servers (gatekeepers, multicast units, gateways), users
need to know if they are talking with the proper server
and/or with the correct service provider.This applies to
both fixed and mobile users.
Security
Aspectsin
VoIP
(cont.)
Voice confidentiality
This is realized through encryption of the voice packets
and protects against eavesdropping. In general, the
media packets of multimedia applications are
encrypted as well as voice data. Advanced protection
of media packets also includes authentication/integrity
protection of the payloads.
Security
Aspectsin
VoIP
(cont.)
Call authorization:
This is the decision-making process to determine if
the user/terminal is actually permitted to use a service
feature or a network resource (QoS, bandwidth, codec,
etc.). Most often authentication and authorization
functions are used together to make an access control
decision. Authentication and authorization help to
thwart attacks like masquerade, misuse and fraud,
manipulation and denial-of-service.
Security
Aspectsin
VoIP
(cont.)
Key Management:
 This includes not only all tasks that are necessary for
securely distributing keying material to users and
servers, but also tasks like updating expired keys and
replacing lost keys. Key management may be a
separate task from theVoIP application (password
provisioning) or may be integrated with signalling when
security profiles with security capabilities are being
dynamically negotiated and session-based keys are to
be distributed.
Security
Aspectsin
VoIP
(cont.)
Masquerading:
A masquerade is the pretense of an entity to be
another entity. Masquerading can lead to charging
fraud, breach of privacy, and breach of integrity. This
attack can be carried out by hijacking a link after
authentication has been performed, or by
eavesdropping and subsequent replaying of
authentication information. Using a masquerade
attack, an attacker can gain unauthorized access to
VoIP services. An attacker can steal the identity of a
real user and obtain access by masquerading as the
real user.
Security
Aspectsin
VoIP
(cont.)
Eavesdropping:
Eavesdropping attacks describe a method by which an
attacker is able to monitor the entire signaling and/or
data stream between two or moreVoIP endpoints, but
cannot or does not alter the data itself.
Security
Aspectsin
VoIP
(cont.)
Interception and Modification:
These classes of attacks describe a method by which
an attacker can see the entire signaling and data
stream between two endpoints, and can also modify
the traffic as an intermediary in the conversation.
Security
Aspectsin
VoIP
(cont.)
Denial of Service:
A denial of service (DoS) attack is an attack that is
conducted to deliberately cause loss of availability of a
service. We identify DoS attacks at several levels;
transport-level, server level, signaling level.
Transport level: An IP-level DoS attack may be carried
out by flooding a target, e.g. by ping of death or Smurf
attack.
Server level: Servers may be rendered unusable by
modifying stored information in order to prevent
authorized users from accessing the service.
Security
Aspectsin
VoIP
(cont.)
Misrepresentation:
The term misrepresentation is generically used to
mean false or misleading communication.
Misrepresentation includes the delivery of information
which is false as to the identity, authority or rights of
another party or false as to the content of information
communicated.
Security
Solutionin
VoIP
 Confidentiality: Confidentiality can be achieved
by using different encryptions techniques, which
provide user authentication. For ex: a hash record key
with a shared secret is used between the parties to
prevent malicious users from call monitoring. Such
measures should be taken to get confidentiality.
Integrity: To protect the source of data we use
Integrity that provides user authentication. It is used
for origin integrity, and without integrity control, any
non-trusted system has the ability to modify the
different contents without any notice.
Security
Solutionin
VoIP
(cont.)
HTTP Digest Authentication:
SIP uses HTTP Digest Authentication method to
authenticate data, such as password. HTTP Digest
authentication offers one-way message authentication
and replay protection, but it doesn’t protect message
integrity and confidentiality.
By transmitting an MD5 or SHA-1 digest of the secret
password and a random challenge string, HTTP Digest
can protect password.
Although HTTP digest authentication has the
advantage that the identity of the user is encrypted,
and transmitted in cipher text, but if the password is
short or weak, by intercepting the hash value, the
password can be decrypted easily.
Security
Solutionin
VoIP
(cont.)
S/MIME:
(Secure/Multi-Purpose Internet Mail Extension)
 MIME bodies are inserted into SIP messages. MIME
defines mechanisms for integrity protection and
encryption of the MIME contents.
SIP can use S/MIME to enable mechanisms like public
key distribution, authentication and integrity
protection, confidentiality of SIP signaling data.
S/MIME relies heavily on the certification of the end
user.
Moreover self certification is vulnerable to man-in-the-
middle attack, so either the certificates from known
public certification authorities (CAs) or private CAs
should be used, so the S/MIME mechanism is seriously
limited.
Security
Solutionin
VoIP
(cont.)
Firewall
Firewalls are usually used to protect trusted network
from un-trusted network. Firewalls usually work on IP
andTCP/UDP layer, it determines what types of traffic
is allowed and which system are allowed to
communicate. Firewall doesn’t monitor the application
layer. Since SIP needs to open ports dynamically, this
enhances the complexity of firewall, as the firewall
must open and close ports dynamically.
Security
Solutionin
VoIP
(cont.)
Some OtherWaysTo Protect:-
To prevent message alteration established secured
communication channel between communicating
parties.To prevent media alteration and degradation
use SRTP protocol.
Use secured devices for communication and switching
of voice as well as data.
Use Strong authentication and password at device
level.
Change defaults passwords and enable SIP
authentication. Use the devices which support SRTP
cipher technique.
Security
Solutionin
VoIP
(cont.)
UseVLAN with 802.1x in internet to split data and
voice traffic.
DisableTelnet in the phone configuration, allow only
to administrators.To avoid message tampering and
voice pharming attack use encrypted transmitted data
using encryption mechanisms like IPsec,TLS and
S/MIME.
Security
Solutionin
VoIP
(cont.)
 for a secure session inVOIP we should take
following measures:
 Use and maintain anti-virus and anti-spyware programs.
 Do not open unknown attachments of mails which have
unknown or fake IDs.
 Verify the authenticity and security of downloaded files
and new software. Configure your web browser(s)
properly by enabling/disabling the necessary cookies.
 Active firewall session in your network and always place
your back-up securely.
 Create strong passwords and change them regularly
and do not disclose such information publicly.
Conclusion
VoIP system is low cost and less configuration than
PSTN Network.VoIP is EmergingTechnology and
contain some loop hopes so there are some attacks can
possible on it. As in futureVoIP Replace the PSTN
system it need better security. Using some of Secure
protocols like SRTP and some advance Encryption
standards, using firewall, end-to-end encryption we
can make it secure.
References
Cisco, “Overview of the Session Initiation Protocol”, September,
(2002)
David Gurle, Olivier Hersent, “MediaGateway to Media Controller
Protocols”,August,(2003).
 Rohit Dhamankar Intrusion Prevention: The Future ofVoIP Security
White paper (2010)
 PorterT “Threats toVoIP CommunicationSystems, Syngress Force
EmergingThreat Analysis” ,pg. 3-25. (2006).
Mark Collier,ChiefTechnologyOfficer Secure Logix Corporation,
"BasicVulnerability Issues for SIP Security.pdf”,1 March (2005).
VoIP Security and PrivacyThreat Taxonomy "Public Release 1.0
24 October 2005" (access 29 Jan 2012)
Voip security

Mais conteúdo relacionado

Mais procurados

Asterisk presentation v1.1
Asterisk presentation v1.1Asterisk presentation v1.1
Asterisk presentation v1.1Farhan Fuad
 
Voice over internet protocol (VoIP)
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP) Namra Afzal
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocolSanthosh Somu
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)habib_786
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)Abdullah Shah
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?mahipal9
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6mithilak
 
Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)William Lee
 
Generations of Cellular Network
Generations of Cellular NetworkGenerations of Cellular Network
Generations of Cellular NetworkMuhammad Ahmed
 
voice over internet protocol
voice over internet protocol voice over internet protocol
voice over internet protocol jomin mathew
 

Mais procurados (20)

Voip
Voip Voip
Voip
 
Asterisk presentation v1.1
Asterisk presentation v1.1Asterisk presentation v1.1
Asterisk presentation v1.1
 
Voice over internet protocol (VoIP)
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP)
 
What is XMPP Protocol
What is XMPP ProtocolWhat is XMPP Protocol
What is XMPP Protocol
 
CoAP - Web Protocol for IoT
CoAP - Web Protocol for IoTCoAP - Web Protocol for IoT
CoAP - Web Protocol for IoT
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
 
Session initiation-protocol
Session initiation-protocolSession initiation-protocol
Session initiation-protocol
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
 
VOIP
VOIPVOIP
VOIP
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?
 
Voip
VoipVoip
Voip
 
TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP Addressing
 
H.323 protocol
H.323 protocolH.323 protocol
H.323 protocol
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)
 
SIP for geeks
SIP for geeksSIP for geeks
SIP for geeks
 
Generations of Cellular Network
Generations of Cellular NetworkGenerations of Cellular Network
Generations of Cellular Network
 
voice over internet protocol
voice over internet protocol voice over internet protocol
voice over internet protocol
 

Semelhante a Voip security

Case study about voip
Case study about voipCase study about voip
Case study about voipelmudthir
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacksEditor IJCATR
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)mashiur
 
Voice over IP (VOIP)
Voice over IP (VOIP)Voice over IP (VOIP)
Voice over IP (VOIP)Ahmed Ayman
 
1 VoIP Overview[1]
1 VoIP Overview[1]1 VoIP Overview[1]
1 VoIP Overview[1]William Giba
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networkingsangusajjan
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip OverviewMayank Vora
 
1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P OverviewMayank Vora
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
 
Current trends and innovations in voice over IP
Current trends and innovations in voice over IPCurrent trends and innovations in voice over IP
Current trends and innovations in voice over IPALTANAI BISHT
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056mashiur
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchIJMER
 
MULTIMEDIA SERVICES OVER IP NETWORKS
MULTIMEDIA SERVICES OVER IP NETWORKSMULTIMEDIA SERVICES OVER IP NETWORKS
MULTIMEDIA SERVICES OVER IP NETWORKSYatish Bathla
 

Semelhante a Voip security (20)

Case study about voip
Case study about voipCase study about voip
Case study about voip
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
 
Voice over IP (VOIP)
Voice over IP (VOIP)Voice over IP (VOIP)
Voice over IP (VOIP)
 
1 VoIP Overview[1]
1 VoIP Overview[1]1 VoIP Overview[1]
1 VoIP Overview[1]
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
R43019698
R43019698R43019698
R43019698
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P Overview
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
Ip
IpIp
Ip
 
Ip
IpIp
Ip
 
Vo ip sip
Vo ip sipVo ip sip
Vo ip sip
 
Current trends and innovations in voice over IP
Current trends and innovations in voice over IPCurrent trends and innovations in voice over IP
Current trends and innovations in voice over IP
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
Vpn
Vpn Vpn
Vpn
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A Research
 
MULTIMEDIA SERVICES OVER IP NETWORKS
MULTIMEDIA SERVICES OVER IP NETWORKSMULTIMEDIA SERVICES OVER IP NETWORKS
MULTIMEDIA SERVICES OVER IP NETWORKS
 

Mais de Shethwala Ridhvesh

Mais de Shethwala Ridhvesh (6)

Politics in india
Politics in indiaPolitics in india
Politics in india
 
A Maximum Flow Min cut theorem for Optimizing Network
A Maximum Flow Min cut theorem for Optimizing NetworkA Maximum Flow Min cut theorem for Optimizing Network
A Maximum Flow Min cut theorem for Optimizing Network
 
TCP/IP performance over Optical Fiber
TCP/IP performance over Optical FiberTCP/IP performance over Optical Fiber
TCP/IP performance over Optical Fiber
 
Col wiz ppt
Col wiz pptCol wiz ppt
Col wiz ppt
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Green computing_ridhvesh
Green computing_ridhveshGreen computing_ridhvesh
Green computing_ridhvesh
 

Último

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 

Último (20)

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 

Voip security

  • 2. Outlines Introduction What is Voip.? How Voip works.? Protocol used in Voip Security attack on Voip system How we can prevent it.? Conclusion Reference
  • 3. Network Features PSTN (Voice) VoIP (Voice) Switch Circuit Switched Packet Switched Connection Connection Oriented Connection Oriented Bit Rate Fixed and low<=64kb/s Standard Bit Rate Bursts Nonexistent Error tolerance User error control Self error Control Info resending Can not (real time) It Can Delay Must be low and stable Very Less Delay
  • 4. What is voip.? VoIP (Voice Over Internet Protocol) is an IP network based voice transmission technology, instead of the traditional analog telephone line, it allows people to make telephone calls through broadband internet connections. In other words, just installing network telephone software on the PCs at each end, people can talk through to each other through the IP network. With the development of network technology, network IP telephony grew from PC-PC to IP-PSTN, PSTN-IP, PSTN- PSTN and IP-IP, etc.
  • 5.
  • 6. How Voip works.? Analog Signal Converting Analog to Digital Signal Compress Encode Packetization Transmitted through IP Network Decode Decompress Converting Digital to Analog Signal
  • 9. RTP Real-TimeTransport Protocol (RTP) is an internet standard protocol, used to transfer real time data, such as audio and video. It can be used for IP telephony. RTP includes two parts: data and control.The control part is called RealTime Control Protocol (RTCP). VoIP uses protocols such as real-time protocol (RTP) and H.323 to deliver packets over the internet. It provides support for real-time applications, includes timing reconstruction, loss detection, security and content identification.
  • 10. RTP (Cont.) RTP Header contains information of the payload, such as the source address, size, encoding type, etc. To transfer RTP packet on the network, we need to use User Datagram Protocol (UDP) to create a UDP header.To transfer UDP packet over IP network, we also need to create an IP header. RTP Data structure RTP Data in IP packet
  • 11. RTP (Cont.) RTP FEATURES:- To provide end-to-end delivery service for real time data, such as audio and video. RTP uses time stamps and sequence numbers to implement reliable delivery, flow control and congestion control. RTP is only a protocol framework, it is open to new multimedia software. RTP and RTCP provide functionalities to deliver real time data. RTP and RTCP aren’t responsible for synchronization, or something like it which is the higher level task.
  • 12. RTCP RealTime Control Protocol carries control information, which is used to manage the QoS. It provides supports for applications such as real-time conference. The supports include source identification, multicast- to-unicast translator, and different media streams synchronization. There are five types of RTCP packets:- I. RR: Receive Report II. SR: Sender Report. III. SDES: Source Description Items. IV. BYE: used to indicate that participation is finished. V. APP: application specified functions.
  • 13. H.323 H.323 is a set of protocols for voice, video, and data conferencing over packet-based networks such as the Internet. The H.323 protocol stack is designed to operate above the transport layer of the underlying network. H.323 can be used on top of any packet-based network transport like Ethernet,TCP/UDP/IP, ATM, and Frame Relay to provide real-time multimedia communication. H.323 uses the Internet Protocol (IP) for inter-network conferencing.
  • 14. H.323 (cont.) Scope of H.323 Point-to-point and multipoint conferencing support: Inter-network interoperability: Heterogeneous client capabilities Audio and video codecs: Management and accounting support: Security: Supplementary services
  • 15.
  • 16. H.323 (CONT.) Authentication under H.323 can be either symmetric encryption- based or subscription-based. For symmetric encryption-based authentication, prior contact between the communicating entities is not required because the protocol uses Diffie-Hellman key- exchange to generate a shared secret identity between the two entities. With reference to the H.235 recommendation, a subscription-based authentication requires a prior shared secret identity, and there are three variations of this:  Password-based with symmetric encryption,  Password-based with hashing, and  Certificate-based with signatures
  • 17. MGCP Media Gateway Control Protocol (MGCP) is a protocol used for controllingVoice over IP (VoIP) Gateways from external call control elements. MGCP is the emerging protocol that is receiving wide interest from both the voice and data industries. MGCP is a protocol for controlling media gateways from call agents. It superseded the Simple Gateway Control Protocol (SGCP) . In aVoIP system, MGCP can be used with SIP or H.323. SIP or H.323 will provide the call control functionality and MGCP can be used to manage media establishment in media gateways.
  • 18. MGCP (cont.) Characteristics of MGCP: -- A master/slave protocol. -- Assumes limited intelligence at the edge (endpoints) and intelligence at the core (call agent). -- between call agents and media gateways. -- Differs from SIP and H.323 which are peer-to-peer protocols. -- Interoperates with SIP and H.323.
  • 19.
  • 20. MGCP (cont.) MGCP provides:  Call preservation—calls are maintained during failover and failback  Dial plan simplification—no dial peer configuration is required on the gateway  Hook flash transfer  Tone on hold  MGCP supports encryption of voice traffic.  MGCP supports Q Interface Signalling Protocol (QSIG) functionality.
  • 21. SIP The Session Initiation Protocol is a text-based signaling communications protocol, which is used to creation, management and terminations of each session. It is responsible for smooth transmission of data packets over the network. It considers the request made by the user to make a call and then establishes connection between two or multiple users.When the call is complete, it destroys the session.
  • 22. SIP (CONT.) SIP can be used for two party (unicast) or multi party (multicast) sessions. It works in along with other application layer protocols that identify and carry the session media. The protocol itself provides reliability and does not depend onTCP for reliability. Also, it depends on the Session Description Protocol (SDP) which is responsible for the negotiation for the codec identification
  • 23.
  • 24. SIP (CONT.) SIP Messages:-  REGISTER – Registers a user with a SIP server  INVITE – Used to invite to participate in a Call session  ACK – Acknowledge an INVITE request  CANCEL – Cancel a pending request  OPTIONS – Lists the information about the capabilities of the caller  BYE –Terminates a connection
  • 25.
  • 26. SIP (CONT.) Services Provided by the SIP  Locate User  Session Establishment  Session Setup Negotiation  Modify Session  Teardown/End Session
  • 28. Security Aspectsin VoIP Server authentication: SinceVoIP users typically communicate with each other through someVoIP infrastructure that involves servers (gatekeepers, multicast units, gateways), users need to know if they are talking with the proper server and/or with the correct service provider.This applies to both fixed and mobile users.
  • 29. Security Aspectsin VoIP (cont.) Voice confidentiality This is realized through encryption of the voice packets and protects against eavesdropping. In general, the media packets of multimedia applications are encrypted as well as voice data. Advanced protection of media packets also includes authentication/integrity protection of the payloads.
  • 30. Security Aspectsin VoIP (cont.) Call authorization: This is the decision-making process to determine if the user/terminal is actually permitted to use a service feature or a network resource (QoS, bandwidth, codec, etc.). Most often authentication and authorization functions are used together to make an access control decision. Authentication and authorization help to thwart attacks like masquerade, misuse and fraud, manipulation and denial-of-service.
  • 31. Security Aspectsin VoIP (cont.) Key Management:  This includes not only all tasks that are necessary for securely distributing keying material to users and servers, but also tasks like updating expired keys and replacing lost keys. Key management may be a separate task from theVoIP application (password provisioning) or may be integrated with signalling when security profiles with security capabilities are being dynamically negotiated and session-based keys are to be distributed.
  • 32. Security Aspectsin VoIP (cont.) Masquerading: A masquerade is the pretense of an entity to be another entity. Masquerading can lead to charging fraud, breach of privacy, and breach of integrity. This attack can be carried out by hijacking a link after authentication has been performed, or by eavesdropping and subsequent replaying of authentication information. Using a masquerade attack, an attacker can gain unauthorized access to VoIP services. An attacker can steal the identity of a real user and obtain access by masquerading as the real user.
  • 33. Security Aspectsin VoIP (cont.) Eavesdropping: Eavesdropping attacks describe a method by which an attacker is able to monitor the entire signaling and/or data stream between two or moreVoIP endpoints, but cannot or does not alter the data itself.
  • 34. Security Aspectsin VoIP (cont.) Interception and Modification: These classes of attacks describe a method by which an attacker can see the entire signaling and data stream between two endpoints, and can also modify the traffic as an intermediary in the conversation.
  • 35. Security Aspectsin VoIP (cont.) Denial of Service: A denial of service (DoS) attack is an attack that is conducted to deliberately cause loss of availability of a service. We identify DoS attacks at several levels; transport-level, server level, signaling level. Transport level: An IP-level DoS attack may be carried out by flooding a target, e.g. by ping of death or Smurf attack. Server level: Servers may be rendered unusable by modifying stored information in order to prevent authorized users from accessing the service.
  • 36. Security Aspectsin VoIP (cont.) Misrepresentation: The term misrepresentation is generically used to mean false or misleading communication. Misrepresentation includes the delivery of information which is false as to the identity, authority or rights of another party or false as to the content of information communicated.
  • 37. Security Solutionin VoIP  Confidentiality: Confidentiality can be achieved by using different encryptions techniques, which provide user authentication. For ex: a hash record key with a shared secret is used between the parties to prevent malicious users from call monitoring. Such measures should be taken to get confidentiality. Integrity: To protect the source of data we use Integrity that provides user authentication. It is used for origin integrity, and without integrity control, any non-trusted system has the ability to modify the different contents without any notice.
  • 38. Security Solutionin VoIP (cont.) HTTP Digest Authentication: SIP uses HTTP Digest Authentication method to authenticate data, such as password. HTTP Digest authentication offers one-way message authentication and replay protection, but it doesn’t protect message integrity and confidentiality. By transmitting an MD5 or SHA-1 digest of the secret password and a random challenge string, HTTP Digest can protect password. Although HTTP digest authentication has the advantage that the identity of the user is encrypted, and transmitted in cipher text, but if the password is short or weak, by intercepting the hash value, the password can be decrypted easily.
  • 39. Security Solutionin VoIP (cont.) S/MIME: (Secure/Multi-Purpose Internet Mail Extension)  MIME bodies are inserted into SIP messages. MIME defines mechanisms for integrity protection and encryption of the MIME contents. SIP can use S/MIME to enable mechanisms like public key distribution, authentication and integrity protection, confidentiality of SIP signaling data. S/MIME relies heavily on the certification of the end user. Moreover self certification is vulnerable to man-in-the- middle attack, so either the certificates from known public certification authorities (CAs) or private CAs should be used, so the S/MIME mechanism is seriously limited.
  • 40. Security Solutionin VoIP (cont.) Firewall Firewalls are usually used to protect trusted network from un-trusted network. Firewalls usually work on IP andTCP/UDP layer, it determines what types of traffic is allowed and which system are allowed to communicate. Firewall doesn’t monitor the application layer. Since SIP needs to open ports dynamically, this enhances the complexity of firewall, as the firewall must open and close ports dynamically.
  • 41. Security Solutionin VoIP (cont.) Some OtherWaysTo Protect:- To prevent message alteration established secured communication channel between communicating parties.To prevent media alteration and degradation use SRTP protocol. Use secured devices for communication and switching of voice as well as data. Use Strong authentication and password at device level. Change defaults passwords and enable SIP authentication. Use the devices which support SRTP cipher technique.
  • 42. Security Solutionin VoIP (cont.) UseVLAN with 802.1x in internet to split data and voice traffic. DisableTelnet in the phone configuration, allow only to administrators.To avoid message tampering and voice pharming attack use encrypted transmitted data using encryption mechanisms like IPsec,TLS and S/MIME.
  • 43. Security Solutionin VoIP (cont.)  for a secure session inVOIP we should take following measures:  Use and maintain anti-virus and anti-spyware programs.  Do not open unknown attachments of mails which have unknown or fake IDs.  Verify the authenticity and security of downloaded files and new software. Configure your web browser(s) properly by enabling/disabling the necessary cookies.  Active firewall session in your network and always place your back-up securely.  Create strong passwords and change them regularly and do not disclose such information publicly.
  • 44. Conclusion VoIP system is low cost and less configuration than PSTN Network.VoIP is EmergingTechnology and contain some loop hopes so there are some attacks can possible on it. As in futureVoIP Replace the PSTN system it need better security. Using some of Secure protocols like SRTP and some advance Encryption standards, using firewall, end-to-end encryption we can make it secure.
  • 45. References Cisco, “Overview of the Session Initiation Protocol”, September, (2002) David Gurle, Olivier Hersent, “MediaGateway to Media Controller Protocols”,August,(2003).  Rohit Dhamankar Intrusion Prevention: The Future ofVoIP Security White paper (2010)  PorterT “Threats toVoIP CommunicationSystems, Syngress Force EmergingThreat Analysis” ,pg. 3-25. (2006). Mark Collier,ChiefTechnologyOfficer Secure Logix Corporation, "BasicVulnerability Issues for SIP Security.pdf”,1 March (2005). VoIP Security and PrivacyThreat Taxonomy "Public Release 1.0 24 October 2005" (access 29 Jan 2012)