voip security : not an afterthought. overview what is voip? difference between pstn and voip. why...

16
VoIP security : Not an Afterthought

Upload: shawn-mccormick

Post on 26-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

VoIP security : Not an Afterthought

Page 2: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

OVERVIEW

• What is VoIP?• Difference between PSTN and VoIP.• Why VoIP?• VoIP Security threats• Security concerns• Design and implementation• Conclusion

Page 3: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

What is VoIP?

• VoIP is Voice over internet protocol, is a technology allows voice conversations to be carried over the Internet.• VoIP exchanges voice information in digital form, in discrete packets

rather than by using the traditional circuit-committed protocols of the Public Switched Telephone Network (PSTN).

Page 4: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

Difference between PSTN and VoIP.

• In PSTN (Public Switched Telephone Network) the control is rested at switch.• In VoIP the resource control is at deeper part of network.

Page 5: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

Why VoIP?

• Price• Flexibility• Protocols• Implementation• Service

Page 6: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

VoIP Security threats• Security threats Viruses impacting servers. Denial of service attacks. Logical attacks on SIP. Subscription fraud and non-payment. Call eavesdropping.

Page 7: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

Security concerns

• Preserve the availability:

• By network/service access control

• Preserve integrity:

• Prevent malicious activities by encryption techniques.

• Prevent theft of the VoIP service.

• Prevent fraudulent use of VoIP services

• Preserve the confidentiality:

• By encryption techniques.

Page 8: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

• Preserve Authentication by login password.• Preserve authorization by access control, role based authentication

Page 9: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

Is VoIP Security Different?

• VoIP services are real-time.

• VoIP services are target of voice specific malicious activities such as

toll fraud, service theft, voice spam and identity theft.

• VoIP services are extremely sensitive to delay, packet loss and jitter

caused by worms, viruses and DoS attacks.

• VoIP services are impacted by the existing security devices such as

firewalls/NAT, encryption engines and IDS/IPS.

Page 10: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

An Approach to VoIP Security

Open source security

Prevention Protection Reducing the risks

VoIP Infrastructure

Page 11: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

Design and implementation

• Major concerns for VoIP software development are 1)Software stability. 2)Robustness. 3)Interoperability.For implementation of VoIP its should have separate voice transport, signaling, service creation from one another.

Page 12: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

VoIP protocols

The two most widely used protocols for VoIP are the ITU standard H.323 and the IETF standard SIP. Both are signaling protocols that set up, maintain and terminate a VoIP call. In addition, the Media Gateway Control Protocol (MGCP) provides a signaling and control protocol between VoIP gateways and traditional PSTN (Public Switched Telephone Network) gateways. ITU-T , H.323 is a comprehensive protocol under the ITU-T specifications for sending voice, video and data across a network. The H.323 specification includes several sub-protocols:

Page 13: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

1. H.225 for specifying call controls (e.g. call setup and teardown),2. H.235 for specifying the security framework for H.323 and the call setup. 3. H.245 for specifying media paths and parameter negotiations such as terminal capabilities. 4. H.450 for specifying supplementary services such as call hold and call waiting.

Page 14: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

Conclusion

• VoIP presents a number of interesting security challenges that differ substantially from those of traditionally telephony.

• In addressing these challenges, we might consider the roles of the vendor, service provider, and implementer communities.

Page 15: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

References

• http://www.voip-info.org/• Voip security : not an afterthought by Douglas C.Sicker and

Tomlookabaugh

Page 16: VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design

Thank you