Voip security

Voip security

VoIP Security

Defined: Voice over IP (VoIP) Security is a branch of the information security field that is specifically applied to VoIP infrastructures. The objective of VoIP security is to preserve the availability of VoIP services, protection of VoIP caried and stored information from theft or corruption, voice communication integrity or QoS (Quality of Service), or the prevention of voice communication carryting spam and fraudulent usage of voice communication (toll fraud).

Background: VoIP operates differently than data services. For example, in order to establish real-time communication VoIP uses various signaling protocols such as SIP to identify the calling parties, define call characteristics and ring the phone. Once the call is established the conversation is carried over an IP network using packetized voice. Signaling protocols have their own specific characteristics such as dynamic assignment of ports for RTP traffic.

While the signaling phase is handled, in the case of Enerprise VoIP, by a PBX and Call Manager, in most implementations, RTP traffic is routed in a Peer-to-Peer (P2P) mode between calling parties, completely bypassing the PBX/Call Manager. From a security perspective, it is very difficult to protect the various end-points using P2P communication given that RTP traffic is a stream of packets with random, binary content created by digitizing human speech, and that all VoIP phones regardless of the vendor and geographical location, are using this protocol. Finally, traffic flows directly between phones without any centralized controllers.

VoIP is highly sensitive to QoS parameters such as packet loss, jitter and delay. Basic VoIP characteristics such as its real-time nature and stringent QoS requirements mean that even a benign attack can significantly disrupt VoIP services. Implementing existing security techniques and technologies such as IPS, Firewalls or encryption, without taking into account the QoS impact and specific nature of VoIP protocols, could lead to a severe impact on the quality of voice communication, and in some cases, to the complete loss of voice services.

Another unique threat is voice spam or SPIT (Spam over Internet Telephony). While conceptually it is similar to email spam, there is one significant difference. Existing anti-spam applications can examine the entire email including the header and the content resulting in acceptable false-positive ratios with a high efficiency throughput. In the VoIP environment, information carried by the signaling protocols can be relatively easily analyzed, but it can also be easily spoofed or altered. Real-time speech processing and pattern matching for a large number of concurrent calls is still a problem with current technologies.

The popular tool SiVuS [http://www.vopsecurity.org] was the first VoIP Scanner to be published. The tool is designed to help security professionals perform several security checks to validate the security of SIP signaling in VoIP networks. The tool provides the means to test for signaling message authentication, confidentiality, robustness, registration hijacking, service disruption and craft specific SIP messages to test filtering conditions in Session Border Controllers. VCube [http://www.vcubescanner.com] is the evolutionary commercial version of SiVuS.

VoIP Vulnerabilities and Threats: The traditional enterprise VoIP infrastructure consists of a wide range of components, applications and specialized protocols—including wireless—implemented in the form of complex networks and often globally distributed. These IP-based telecommunication networks introduce a large number of new attack vectors that in many cases impose different security requirements than traditional data security threats. VoIP vulnerabilities and exploits can be roughly classified as:• Software-related (introduced by a VoIP application/equipment vendor)• Configuration-related (introduced during deployment and life cycle of VoIP infrastructure)• Protocol-related (inherent protocol issues – SIP, UNIStim, Skinny, H323, RTP)• Composite (any combination of the above)• Device-level (related to a particular device/application such as IP PBX)• System-level (related to the VoIP infrastructure components and topology)• Unidirectional or duplex (related to flow of data and information)

Further Reading:

1. Peter Thermos, Ari Takanen, "Securing VoIP Networks", Addison-Wesley, 2007

2. Thomas Porter, Michael Gough, “How to Cheat at VoIP Security”, Syngress, 2007

3. Bogdan Materna, “A Proactive Approach to VoIP Security”, VoIPshield Systems White Paper, 2007 [http://www.voipshield.com/proactive_wp.html]

4. David Endler, Mark Collier, "Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions”, McGraw-Hill Osborne Media, 2006

5. Thomas Porter, “Practical VoIP Security”, Syngress, 2006

6. D. Richard Kuhn, Thomas J. Walsh, Steffen Fries, “Security Considerations for Voice Over IP Systems”, NIST Special Publication 800-58, 2005

7. James F. Ransome, John Rittinghouse, "Voice over Internet Protocol (VoIP) Security”, Digital Press, 2004.

External Links:

VoIPSA [http://www.voipsa.org] VoIP Security Blogs Bogdan’s Blog [http://blog.voipshield.com/] Mark Collier’s Blog [http://www.voipsecurityblog.com] Bluebox Podcast [http://www.blueboxpodcast.com] Palindrome Technologies [http://www.palindrometech.com] VoIPshield Systems Inc ( [http://www.voipshield.com] )Sipera [http://www.sipera.com] Voice Over Packet Security [http://www.vopsecurity.org] VCube Scanner [http://www.vcubescanner.com]


Wikimedia Foundation. 2010.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • VoIP spam — VoIP spam, is the proliferation of unwanted, automatically dialed, pre recorded phone calls using Voice over Internet Protocol (VoIP). Some pundits have taken to referring to it as SPIT (for Spam over Internet Telephony ).Voice over IP systems,… …   Wikipedia

  • VOIP — (англ. Voice over Internet Protocol; IP телефония)  система связи, обеспечивающая передачу речевого сигнала по сети Интернет или по любым другим цифровом виде и, как правило, перед передачей преобразовывается (сжимается) с тем, чтобы удалить… …   Википедия

  • VoIP-Softwarevergleich — Voice over IP (VoIP) Software wird dazu benutzt, Telefongespräche über das Internet zu führen. VoIP Gespräche sind oftmals günstiger als konventionelle Telefongespräche. Weil Gespräche über das Internet leicht abgehört werden können, verwenden… …   Deutsch Wikipedia

  • VoIP recording — Voice over Internet Protocol (VoIP) recording is a subset of telephone recording or voice logging, first used by call centers and now being used by all types of businesses. There are many reasons for recording VoIP call traffic such as: reducing… …   Wikipedia

  • VoIP VPN — Secure Voice Encryption= A VoIP VPN combines Voice over IP and Virtual Private Network technologies to offer a method for delivering secure voice. Because VoIP transmits digitized voice as a stream of data, the VoIP VPN solution accomplishes… …   Wikipedia

  • Voice over IP Security Alliance — The Voice over IP Security Alliance (VOIPSA) was launched in early 2005 to bring together Voice over IP and information security vendors, providers, and thought leaders to address current and emerging security threats to VoIP. The stated mission… …   Wikipedia

  • Skype security — Skype is a Voip system developed by Skype Technologies S.A., and owned by eBay. It is a peer to peer based network in which voice calls don’t pass through a central server. Skype users search for other users to connect to, enabling them to search …   Wikipedia

  • Mobile VoIP — or simply mVoIP is an extension of mobility to a Voice over IP network. Two types of communication are generally supported: cordless/DECT/PCS protocols for short range or campus communications where all base stations are linked into the same LAN …   Wikipedia

  • Social engineering (security) — Social engineering is the art of manipulating people into performing actions or divulging confidential information.Mitnick, K: CSEPS Course Workbook (2004), p. 4, Mitnick Security Publishing.] While similar to a confidence trick or simple fraud,… …   Wikipedia

  • Managed VoIP Service — In computing, Managed VoIP Services (MVS) are, simply put, VoIP services that have been outsourced. A company providing such a service is a Managed VoIP Service Provider. Managed VoIP services can provide enterprises with the necessary skills and …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”