STEM: Secure Telephony Enabled Middlebox
|
|
|
- Constance McGee
- 9 years ago
- Views:
Transcription
1 TELECOMMUNICATIONS NETWORK SECURITY STEM: Secure Telephony Enabled Middlebox Brennen Reynolds and Dipak Ghosal, University of California This work as support by NSF grants NCR and ANI ABSTRACT Dynamic applications, including IP telephony, have not seen wide acceptance within enterprises because of problems caused by the existing network infrastructure. Static elements, including firewalls and network address translation devices, are not capable of allowing dynamic applications to operate properly. The Secure Telephony Enabled Middlebox (STEM) architecture is an enhancement of the existing network design to remove the issues surrounding static devices. The architecture incorporates an improved firewall that can interpret and utilize information in the application layer of packets to ensure proper functionality. In addition to allowing dynamic applications to function normally, the STEM architecture also incorporates several detection and response mechanisms for well-known network-based vulnerabilities. This article describes the key components of the architecture with respect to the SIP protocol. INTRODUCTION AND BACKGROUND The services operating over data networks have evolved from short text messages to real-time audio and video. This evolution has required the elements in the data path to become more sophisticated and intelligent. Today, enterprise networks are connected together through a large number of static devices including routers, firewalls, and network address translation devices (middleboxes). These devices only operate with traffic that can be expressed as a static set of rules. They are capable of handling the applications currently deployed within the enterprise, but that is changing. With the deployment of new applications including Internet Protocol (IP) telephony and videoconferencing, problems have begun to appear. The problems stem from the dynamic nature of the underlying protocols on which these applications are built. The application sessions for both major IP telephony protocols, Session Initiation Protocol (SIP) [1] and H.323 [2], cannot be captured using a traditional filter. This dynamic behavior makes it impossible to create a set of predefined static filters to match each session. The problems related to running dynamic applications through static devices fill a range of categories including application vulnerabilities, denial of service, and scalability issues. This problem has been identified, and several solutions have been proposed. One solution outlined in [3] examines the possibility of adding a new device to the network that would work in parallel with a firewall or network address translation (NAT) device. All traffic related to IP telephony is routed through the new device. A new protocol, Firewall Control Protocol [3], was designed to allow the IP telephony proxy device to directly interact with the firewall. The argument for implementing a separate device to handle one particular protocol is that it reduces the overall complexity of the firewall and frees implementers from single-vendor dependence when new applications are developed. This solution works well if the number of applications requiring a proxy is small but decreases the overall effectiveness and security gained by the firewall when there are multiple devices accessible from public networks. Another solution presented in [4] involves a redesign of the middlebox architecture. They created adaptation layers between the internal components of a firewall: operating system, firewall, and protocol parser. These layers allow each component to be independent of the others. Furthermore, there is the ability to interact with external components, but there are no provisions regarding the method of communication with these devices. The ability to externally configure the firewall device in real time is a major advantage over current firewall architectures, but there are some very serious security risks. By including the capability to control the firewall from an external source, an authentication mechanism must be incorporated into the firewall to ensure that only legitimate users manipulate the box s configuration. This security mechanism is not considered in their design and is required for real world deployment. In addition to the above literature, a number of proposals have been submitted to the Internet Engineering Task Force (IETF) in the form of /02/$ IEEE IEEE Communications Magazine October 2002
2 Terminals (phone or PC) SIP Proxy Figure 1. STEM network entities. Media/ signaling gateway Local area network Internet draft reports [5]. This problem is significant enough that an IETF working group, Middlebox Communication (Midcom), was formed to initiate the design of a protocol to allow an external entity to control a middlebox. The remaining part of this article is organized as follows. We describe the components of the new Secure Telephony Enabled Middlebox (STEM) architecture and the protocols used for communication between them. We examine how the architecture handles several of the most common call scenarios. We enumerate the major network vulnerabilities and show how protection mechanisms have been incorporated to guard against them. We explain how the architecture is implemented and tested, and provide a conclusion and outline of future work. THE SECURE TELEPHONY ENABLED MIDDLEBOX ARCHITECTURE As the previous work has shown, simply designing a single device is not sufficient to solve the problem. The solution must be a system comprised of several devices working together to provide the necessary functionality. The Secure Telephony Enabled Middlebox (STEM) architecture is designed to address the problems of deploying dynamic applications in an enterprise network. A core middlebox will be present, but will be internally different from those deployed today. This new firewall will be capable of interpreting currently deployed applications as well as adapt to handle future ones. To provide this capability, dynamically loadable parsers for different applications will be built. A logical entity called the Security Manager implements the security policy for the network and the enforcement mechanisms to control the devices providing connectivity between the enterprise LAN and other networks. Logical control channel Security Manager PSTN Logical control channel Firewall Internet Router ARCHITECTURE COMPONENTS The STEM architecture shown in Fig. 1 is similar to the basic network required for SIP deployments. 1 The firewall component was included in the STEM architecture because it is an essential component of an enterprise s network as well as the source of many problems for dynamic applications. The Security Manager (SM) is a logical component that will be used to control the operation of the firewall and media/signaling (M/S) gateways within the network. The SM also incorporates the security policy settings for the enterprise domain that affect how IP telephony services operate. The SIP proxy allows incoming calls from the Internet by relaying SIP control messages. The final element in the STEM architecture is the IP-telephony-enabled terminals. These can either be software running on workstations or IP phones. Security Manager The SM s primary function is to ensure that the network consistently operates a high level of security without degrading the level of service. It is a logical entity that has its various functional components implemented on top of different physical components in the network. The elements of the SM include a database mapping IP telephony addresses to machine addresses in the enterprise, a call preference database with an entry for each employee, the various threshold levels that are triggered when the network is under attack, and the enforcement mechanisms to ensure that only authorized users are allowed to use IP telephony services. The SM database contains the mapping between user addresses (SIP URLs [1]) and the machine addresses (IP addresses) at which the user is currently receiving calls. This can be implemented by the SIP Location Server. With users becoming more mobile, it is necessary to maintain a relationship between the called user address and the network address of the terminal at which the user is located. When the firewall receives a SIP request message it informs the SM, which translates the SIP URL to the appropriate machine address. With the external calling party using the user address and not the machine address, it is irrelevant if the network behind the firewall is using private machine addresses. At least one interface on the firewall must belong to the internal network and therefore be able to route either public or private addresses. The SM also knows if the called user is connected to the internal network via a virtual private network (VPN) tunnel and appropriately instructs the firewall. The database containing the users call profile can be placed at the SIP proxy or be added to A logical entity called the Security Manager implements the security policy for the network and the enforcement mechanisms to control the devices providing connectivity between the enterprise LAN and other networks. 1 For information about the operation and requirements of standard SIP components refer to RFC 2543 published by the IETF [1]. IEEE Communications Magazine October
3 The overall function of the firewall still remains to allow only certain traffic to cross between its interfaces. However, the internal structure of the firewall in the STEM architecture is an enhancement upon the existing firewall designs. Flow Monitor Protocol Parsers Operating system Figure 2. A firewall architecture block diagram. the Location Server. The profile contains information about incoming call preferences and a listing of spam addresses specified by the user. Upon authentication, a user can configure their incoming call preference at the SM. During an incoming call, a query of the called user s profile will determine the SM s response to the firewall. The list of options includes, but is not limited to: Automatically accept the call. Forward the call to another user or service (e.g., voice mail). Automatically drop the call or send a query message to the user with the calling party s information and request further response. The other database the SM must have access to, but does not necessarily maintain, is the user authentication database. It is assumed that most enterprise networks require users to log into terminals, and a global repository of user authentication tokens is attached to the network. To help fight the problem of too many passwords, when the SM authenticates the user it acts as a proxy and forwards messages between the user terminal and the authentication server. Successfully authenticating to the enterprise s authentication server proves to the SM the user can be trusted. Firewall The overall function of the firewall still remains to allow only certain traffic to cross between its interfaces. However, the internal structure of the firewall in the STEM architecture is an enhancement upon the existing firewall designs. Conventional packet filter firewalls operate at the network and/or transport layers and are therefore unaware of the application layer. We outline the key aspects of the firewall architecture that is aware of the application running over the network and transport layers. The block diagram of the key components shown in Fig. 2 is an extension of the firewall architecture in [4]. All the components of the firewall are created as selfcontained entities with a common interface layer through which they interact, thereby allowing intercomponent dependence to be kept to a minimum. By creating each component independent of others, they can be dynamically loaded and unloaded without taking the entire device offline. This allows network administrators to maximize network uptime while performing maintenance on one specific component of the firewall. Pattern Matcher: The Pattern Matcher is the most basic component in the firewall, and all packet filter firewalls include this component. It allows configuration of static rule sets using Pattern Matcher External Interface To Security Manager machine addresses, transport protocols, and port number specifications [6]. Each rule set has an action assigned to it that is executed when the rule is triggered. Protocol Parser: The most important block in the firewall architecture is the Protocol Parser. This component comprises multiple parsers. Each parser is designed to understand the operation of a single complex protocol. The SIP parser includes a call monitor component that is responsible for ensuring that each call follows the protocol-specified state transitions. The dynamic port numbers are extracted from the call setup and passed to the Pattern Matcher to open the appropriate pinholes. There is the possibility of two calls selecting the same port numbers. Therefore, the SIP parser must monitor both the port and internal IP address associated with a data stream. It will instruct the Pattern Matcher to completely close a port only after all streams have terminated. Additionally, the parser also extracts the codecs advertised by the terminals during call setup. This information is passed to the Flow Monitor to detect malicious streams. Flow Monitor: The Flow Monitor is designed to handle malicious data streams. It monitors the data rate of the call streams, and if they exceed the threshold set by the bandwidth requirements advertised during the call setup, the firewall can respond. The triggered response can be set by the individual network administrators and could include dropping packets of the malicious stream or applying a traffic throttling algorithm. External Interface: The External Interface component allows the firewall to communicate with other devices. It is responsible for parsing incoming messages for other components and generating appropriate response messages. Media/Signaling Gateway The M/S gateway is responsible for translating calls between a circuit-switched network and a packet-switched network. In the STEM architecture, the M/S gateway will also have to interact with the SM. Similar to the firewall, it will have to request how the called user wishes to handle an incoming call. To prevent unauthorized users from connecting to the network and initiating calls using the M/S gateway, all users must authenticate with the SM before the gateway will allow outgoing calls to be placed. User Terminals Two types of user terminals exist on an enterprise s network: a personal com- 4 IEEE Communications Magazine October 2002
4 Called terminal TCP connection (5) INVITE (6) ACK (7) BYE (9) Figure 3. Incoming net-to-net call flow. puter with IP telephony software and a dedicated hardware device capable of IP telephony functions (i.e., an IP telephone). Both types must be capable of communicating with the SM in addition to understanding SIP (or H.323). PROTOCOLS The STEM architecture requires two control protocols to function. One is used between the SM and the enforcement devices (firewall and M/S gateway), the other between the SM and the user terminals. Security Manager to Enforcement Devices The frequency and volume of communication between the SM and the firewall or M/S gateway is high enough that a permanent connection should be established. To improve the security of this connection, it could be established out-ofband with respect to the local area network. Isolating the connection to a separate physical medium reduces the chance of a third party being able to tamper with it. At the very least, the communication should be strongly encrypted. The functionality of the protocol itself is being developed by the IETF Midcom Working Group. Their work has not yet resulted in a complete protocol design, but it has resulted in the creation of both a protocol requirement [7] and architectural framework [8] document. The protocol capable of fulfilling the requirements outlined in these two documents will be able to perform all necessary functions the STEM architecture requires. Security Manager to Terminals Communication between the SM and the user terminals is different than that between the SM and the firewall. The SM can be communicating with thousands of terminals simultaneously and only for a brief period of time. The protocol used must be lightweight and provide several key functionalities. It must allow the users to be authenticated and be able to protect the content of the messages from eavesdropping during transmission. CALL SETUP SCENARIOS SIP server TCP SYN (1) INVITE (4) BYE (9) RTP media flow (8) Firewall Security Manager Authorization of incoming call (3) TCP SYN (1) INVITE (2) BYE (9) Calling terminal A large number of call scenarios exist in a converged network comprising the public switched telephone network (PSTN) and an IP network. In this study we consider three categories: netto-net, phone-to-net, and net-to-phone calls. NET-TO-NET All net-to-net calls must pass through the firewall in the STEM architecture. Both incoming and outgoing calls are handled in a similar manner with the exception of the initial call setup. The numbers within the parentheses in Fig. 3 indicate the step in the sequence of interactions involved in an incoming net-to-net call. The calling terminal sends a TCP SYN packet to port 5060 (well-known port of the SIP server) of the destination terminal. The SIP Protocol Parser in the firewall receives this packet and identifies the destination port. It forwards all incoming TCP SYN packets to the enterprise s SIP Proxy regardless of the destination IP address of the packet. The SIP Proxy completes the three-way handshake with the calling party. At this point the calling party sends the SIP INVITE request over the TCP connection. The Protocol Parser identifies the request and contacts the SM with the relevant information. The SM responds to allow the call and provides the current IP address of the user. The request is passed to the SIP Proxy and forwarded to the destination terminal. For the rest of the call setup the SM is not involved and the Protocol Parser assumes a passive role, extracting information and passing it to other components within the firewall. While all call control messages are relayed through the SIP Proxy, the Real-Time Transport Protocol (RTP) stream is created directly between the calling and called terminals. Call termination is achieved in one of two ways: The Protocol Parser detects a BYE message from one of the terminals. The Flow Monitor does not observe any traffic for the corresponding data stream over a given interval. Upon detecting a call termination, the Pattern Matcher is instructed to call all pinholes that were being used in the call. For outgoing calls, users must inform the SM The protocol used must be lightweight and provide several key functionalities. It must allow the users to be authenticated and be able to protect the content of the messages from eavesdropping during transmission. IEEE Communications Magazine October
5 In a phone-to-net call, a terminal connected to the PSTN initiates a call to a terminal in the IP network. This cross network call happens without either end terminal knowing the other is on a different network because of the ENUM extension to the DNS service. Calling terminal User authentication (1) Outgoing call request (2) Figure 4. Net-to-phone call flow. Security Manager TCP connection (4) SIP setup (5) RTP media flow (6) SIP BYE (7) of the machine address they are calling. The SM instructs the firewall to allow the outgoing SYN packet. After the TCP connection is set up, the Protocol Parser and the firewall operate in the same manner as with an incoming call. This category of calls also includes users connected to the enterprise network remotely (e.g., through a VPN). The call model for this scenario is essentially two net-to-net calls with the user s home agent [9] acting as the bridge between the two calls. PHONE-TO-NET In a phone-to-net call, a terminal connected to the PSTN initiates a call to a terminal in the IP network. This cross-network call happens without either end terminal knowing the other is on a different network because of the ENUM extension to the DNS service [10]. The Signaling System 7 (SS7) network uses the information within the dialed number to route the call to the responsible M/S gateway. The incoming call is assigned a voice port on the PSTN side of the gateway. The M/S gateway resolves the dialed phone number into a SIP address. This is done by submitting the dialed number to the SM and receiving the IP address of the end terminal. The gateway must then establish a SIP connection with the called terminal. At this point the gateway translates messages between the PSTN and the IP network. NET-TO-PHONE The net-to-phone call flow is similar to the netto-net call but the call is routed through the M/S gateway and out over the PSTN instead of through the firewall and over the Internet. The sequence of interactions between the STEM architecture components in a net-to-phone call is shown in Fig. 4. Before a user can make a call they must authenticate themselves to the SM. After completing the authentication process, the caller must inform the SM of their intent to make an outgoing call to the PSTN. The SM will instruct the M/S gateway to accept an outgoing call from the user s terminal. A TCP connection is established directly between the calling terminal and the M/S gateway. The calling user sends the SIP Outgoing call notice (3) Media/ Signaling Gateway SS7 call setup (5) SS7 media flow (6) Calling terminal INVITE message over the TCP connection to the gateway. It is the responsibility of the gateway to convert the INVITE message into the appropriate SS7 messages. A voice port within the gateway is allocated for the call and the SS7 messages are sent out to setup the call in the PSTN. When the call terminates, the gateway deallocates the voice port and terminates the TCP connection with the calling terminal. NETWORK VULNERABILITIES AND COUNTERMEASURES There are a large number of different types of vulnerabilities present in converged networks. This section focuses on a small key subset and discusses how the countermeasures are implemented in the STEM architecture to reduce the impact of these vulnerabilities. DENIAL OF SERVICE The class of attacks labeled as denial of service (DoS) is very large. Therefore, four attacks specifically targeted at converged networks have been investigated. Net-to-Net TCP SYN Flood: A TCP SYN flood is launched by an attacker who sends a large number of TCP SYN packets to a destination terminal [11]. Within the STEM architecture, the SIP Proxy will be the target of a SYN flood. The result of the attack is that the target is unable to accept any new connections. It is difficult to detect a SYN flood if the inspection device does not maintain some form of state. In the STEM architecture SYN floods are handled by the firewall, thus preventing them from penetrating the internal network. The Flow Monitor keeps a running counter of incoming SYN packets for each source IP addresses. If the number of incoming SYN packets exceeds a certain threshold, the Flow Monitor instructs the Pattern Matcher to drop any future SYN packets from that address for a given duration. SIP INVITE Flood: An INVITE request flood is specific to IP telephony. The attacker establishes a legitimate TCP connection with the tar- 6 IEEE Communications Magazine October 2002
6 SIP stream ID Number of INVITEs/ unit time SIP BYE RTP media stream SIP ACK SIP INVITE A DoS attack launched from the PSTN has the potential of tying up all the voice ports and perhaps even saturating the signaling link. These types of attacks can be countered by using different types of throttles available in the SS7 protocol No connection TCP SYN SYN/ACK TCP ACK recieved Figure 5. SIP protocol parser state machine and tolerance table. Legitimate RTP stream Malicious RTP stream with high number of large packets Party A Party A Standard packet Large packet Firewall Firewall Party B Party B Figure 6. Legitimate and malicious RTP packet streams. get and then proceeds to generate a large volume of SIP INVITE requests. As a result, the user or SIP server is overwhelmed with incoming call requests. The SIP protocol allows for multiple INVITE messages to be sent between terminals to implement services like call hold and call park. The state machine (Fig. 5) in the SIP Protocol Parser allows multiple INVITE messages to pass. However, there is a tolerance level within the parser to catch misuse of this capability. A counter monitors the number of INVITE messages sent per stream over a given interval of time. If preset threshold levels are exceeded the parser can instruct the Pattern Matcher to drop subsequent control and audio packets associated with that call stream. Malicious RTP Streams: Another DoS attack specific to an IP telephony environment is the use of malicious RTP streams to saturate a network link. To accomplish this the attacker initiates a call to the target. When the two parties begin exchanging voice data the attacker constructs very large RTP packets as shown in Fig. 6 or sends multiple packets with the same RTP sequence numbers. The target may not be aware they are under attack if the extra data is converted into frequencies that humans are unable to hear or are dropped because of duplicate sequence numbering. To prevent these types of attacks, the firewall relies on the Protocol Parser and Flow Monitor. The codecs and bandwidth requirements for each call are announced during setup and extracted by the parser. This information is provided to the Flow Monitor, which monitors the data rate for each call stream. If a stream is detected exceeding some defined threshold, it can be terminated by the firewall or throttled to a lower data rate. Phone-to-Net and Net-to-Phone The limited number of voice ports in the M/S gateway makes it a good target for DoS attacks. Within the STEM architecture, a DoS from the internal LAN is not possible. A user must first authenticate and inform the SM before an outgoing PSTN call can be made. Therefore, it is impossible for an unauthorized user to create a flood of outgoing calls that utilize all the voice ports in the M/S gateway. A DoS attack launched from the PSTN has the potential of tying up all the voice ports and perhaps even saturating the signaling link. These types of attacks can be countered by using different types of throttles available in the SS7 protocol. One potential approach could be to have the M/S gateway send out Transfer Controlled (TFC) messages [12] when all the voice ports are occupied. These messages will cause the upstream signaling transfer point (STP) [12] to throttle call setup requests sent to the M/S gateway. Additionally, application-level call gapping methods can be designed to mitigate these types of DoS attacks. EAVESDROPPING Within the STEM architecture there are two information flows susceptible to eavesdropping: the control flow and the data flow. The control flows in the STEM architecture include the communication between user terminals and the SM, the SM and the firewall, and the SM and the IEEE Communications Magazine October
7 Any communication over the network not classified as a control flow is a data flow. The STEM architecture does not directly protect against data flow eavesdropping. Each application protocol should implement a form of payload encryption to guard against eavesdropping. M/S gateway. The information within these flows can contain user authentication and device configuration messages. Protecting this information from reuse by unauthorized parties is essential. The STEM architecture ensures the protection of the data by using protocols that encrypt the data section of each packet at the end terminal. Furthermore, to detect session replay attacks a timestamp is included in the encrypted section of the packet. The receive terminal can therefore check the time the packet was created and transmitted. Packets containing timestamps outside a threshold will be discarded. Any communication over the network not classified as a control flow is a data flow. The STEM architecture does not directly protect against data flow eavesdropping. Each application protocol should implement a form of payload encryption to guard against eavesdropping. Both SIP and H.323 have provisions defined in the protocol to provide this feature. Within the STEM architecture, all IP telephony terminals must implement the encryption functionality outlined in the protocol specifications. For SIP this includes both the hop-by-hop payload encryption as well as the hop-by-hop encryption of the via field to hide the route a flow traverses. OTHER NETWORK ATTACKS Internal LAN DoS The possibility that a user within an enterprise will launch a DoS attack against another internal user does exist. However, the STEM architecture does not include any countermeasures to this type of attack. The attack path does not include the firewall or the SM; therefore, preventing this type of attack is not possible with this architecture. Session Hijacking Another network-based attack is session hijacking. This attack allows an unauthorized third party to impersonate one end of the session. The ability to perform this attack stems from the design of the transport and link layer protocols. It is not possible to protect against this type of attack from the device level. An integrity checking technology (e.g., IPSec) must be used to ensure the parties are who they claimed to be. Virii, Trojan Horses and Spy-ware The release and spread of viruses and Trojan horses continues to increase each year. The STEM architecture is able to help stop malicious software that phones home (initiates a network connection to an external machine). The firewall s Pattern Matcher and Protocol Parsers are able to block well-known Trojan ports in addition to detecting Trojans that masquerade as legitimate applications but do not transmit the correct data. Host only viruses must still be dealt with by anti-virus software. IMPLEMENTATION OF THE STEM ARCHITECTURE A prototype of the STEM architecture is currently being developed to evaluate the security of the system and determine basic performance metrics. The firewall device is being built on the Linux 2.4 series kernel and uses the Netfilter framework [13] to implement the SIP Protocol Parser, Call Monitor, and Flow Monitor. Several open source SIP softphones and server implementations will be used for testing to ensure that the firewall operates correctly. The SM will be built as a standalone application and initially will use a proprietary protocol to communicate with the firewall. When the IETF s Midcom Working Group publishes the protocol guidelines, the SM and firewall will be modified to use this protocol. Both home-grown and publicly available tools will be used to test the security aspects of the system. The system will also undergo several stress tests to determine the performance capabilities and scalability. CONCLUSIONS AND THE FUTURE The deployment of IP telephony and other dynamic applications will allow enterprises to become more cost effective and offer a higher level of integration. However, before these applications can be widely adopted several major obstacles must be overcome. In this article it was shown that dynamic applications cannot function properly when operating over static network devices. The previous work on this problem has brought a solution closer to reality but not completely. The Secure Telephony Enabled Middlebox (STEM) architecture presented in this article is a comprehensive solution to the problem. The STEM architecture was designed to be technologically neutral, thereby allowing it to work in a diverse range of network environments. Ensuring the security of the network was a top priority in the STEM architecture. Major network-based security vulnerabilities present in an IP telephony deployment have been enumerated, and the counter-measures within the STEM architecture have been discussed. In the near future, patches and hacks to existing networks will be used in enterprises wishing to deploy dynamic applications. It will take several years for vendors to develop solutions using technology like STEM to correctly solve the problems of dynamic applications and static network devices. REFERENCES [1] M. Handley et al., SIP: Session Initiation Protocol, RFC 2543, Mar [2] ITU-T Rec. H.323, Visual Telephone Systems and Equipment for Local Area Networks which Provide a Non- Guaranteed Quality of Service, May [3] J. Kuthan, Internet Telephony Traversal Across Decomposed Firewalls and NATs, Proc. 2nd IP Telephony Wksp., New York, NY, Apr [4] U. Roedig, R. Ackermann, and R. Steinmetz, Evaluating and Improving Firewalls for IP-Telephony Environments, Proc. 1st IP Telephony Wksp., Berlin, Germany, Apr [5] J. Rosenberg, R. Mahy, and S. Sen, NAT and Firewall Scenarios and Solutions for SIP, Internet draft, Nov. 2001, work in progress. [6] R. Stevens, TCP/IP Illustrated Vol. 1: The Protocols, vol. 1, 1st ed., Addison Wesley Longman, [7] R. Swale et al., Middlebox Communications Protocol Requirements, Internet draft, Nov. 2001, work in progress. [8] P. Srisuresh et al., Middlebox Communication Architecture and Framework, Internet draft, Dec. 2001, work in progress. [9] C. Perkins, RFC 2002: IP Mobility Support, Oct [10] P. Faltstrom, E.164 Number and DNS, RFC 2916, Sept [11] CERT Coordination Center, CERT Advisory CA : TCP SYN Flooding and IP Spoofing Attacks, Nov [12] T. Russell, Signaling System 7, 3rd ed., New York: 8 IEEE Communications Magazine October 2002
8 McGraw-Hill, [13] Netfilter Firewalling, NAT, and Packet Mangling for Linux 2.4, 2002; BIOGRAPHIES BRENNEN REYNOLDS is an M.S. candidate at the University of California, Davis. His research interests are in IP telephony, security in converged networks, intrusion detection systems, and network-based vulnerabilities. He his B.S. in computer engineering from the University of California, Davis, in DIPAK GHOSAL his B.Tech. degree in electrical engineering from Indian Institute of Technology, Kanpur, in 1983, his M.S. degree in computer science from Indian Institute of Science, Bangalore, in 1985, and his Ph.D. degree in computer science from the University of Louisiana, Lafayette, in From 1988 to 1990 he was a research associate at the Institute for Advanced Computer Studies at the University of Maryland (UMIACS) at College Park. From 1990 to 1996 he was a member of technical staff at Bellcore, Red Bank, New Jersey. Currently, he is with the faculty of the Computer Science Department at the University of California, Davis. His research interests are in the areas of IP telephony, peer-to-peer systems, mobile and ad hoc networks, and performance evaluation of computer and communication systems. The STEM architecture was designed to be technologically neutral, thereby allowing it to work in a diverse range of network environments. Ensuring the security of the network was a top priority in the STEM architecture. IEEE Communications Magazine October
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
VoIP Security Threats and Vulnerabilities
Abstract VoIP Security Threats and Vulnerabilities S.M.A.Rizvi and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, UK e-mail: [email protected] This paper presents the
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
ReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
An Examination of the Firewall/NAT Problem, Traversal Methods, and Their Pros and Cons
TRAVERSING FIREWALLS AND NATS WITH VOICE AND VIDEO OVER IP An Examination of the Firewall/NAT Problem, Traversal Methods, and Their Pros and Cons Traversing Firewalls and NATs With Voice and Video Over
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
SIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
Methods for Lawful Interception in IP Telephony Networks Based on H.323
Methods for Lawful Interception in IP Telephony Networks Based on H.323 Andro Milanović, Siniša Srbljić, Ivo Ražnjević*, Darryl Sladden*, Ivan Matošević, and Daniel Skrobo School of Electrical Engineering
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC: Why and How? FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This docume nt is copyright of FRAFOS GmbH. Duplication or propagation or e xtracts
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or
White Paper. Traversing Firewalls with Video over IP: Issues and Solutions
Traversing Firewalls with Video over IP: Issues and Solutions V Table of Contents Introduction Role of a Firewall Deployment Issues Relating to IP Video and Firewall Traversal The VCON SecureConnect Solution
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
ETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
IP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes
ZyXEL V100 (V100 Softphone 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V100 Softphone...3 2. Setting up the V100 Softphone.....4 3. V100 Basic Phone Usage.....7
Need for Signaling and Call Control
Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice
1. Public Switched Telephone Networks vs. Internet Protocol Networks
Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol
Voice Over IP and Firewalls
Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Use of Voice Over IP (VoIP) in enterprises is becoming more and more
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?
What is a Firewall? Computer Security Firewalls fire wall 1 : a wall constructed to prevent the spread of fire 2 usually firewall : a computer or computer software that prevents unauthorized access to
VOIP TELEPHONY: CURRENT SECURITY ISSUES
VOIP TELEPHONY: CURRENT SECURITY ISSUES Authors: Valeriu IONESCU 1, Florin SMARANDA 2, Emil SOFRON 3 Keywords: VoIP, SIP, security University of Pitesti Abstract: Session Initiation Protocol (SIP) is the
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?
Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6? - and many other vital questions to ask your firewall vendor Zlata Trhulj Agilent Technologies [email protected]
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Alkit Reflex RTP reflector/mixer
Alkit Reflex RTP reflector/mixer Mathias Johanson, Ph.D. Alkit Communications Introduction Real time audio and video communication over IP networks is attracting a lot of interest for applications like
SIP, Session Initiation Protocol used in VoIP
SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1
Network Convergence and the NAT/Firewall Problems
Network Convergence and the NAT/Firewall Problems Victor Paulsamy Zapex Technologies, Inc. Mountain View, CA 94043 Samir Chatterjee School of Information Science Claremont Graduate University Claremont,
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Best Practices for SIP Security
Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS
Multimedia Communication in the Internet SIP: Advanced Topics Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS SIP and NAT NAT Concept NAT = Network Address Translation Share one IP address
Contents. Specialty Answering Service. All rights reserved.
Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
7. Firewall - Concept
7. - Concept ค อ อ ปกรณ Hardware หร อ Software ซ งถ กต ดต ง เพ อ อน ญาต (permit), ปฏ เสธ(deny) หร อ เป นต วแทน(proxy data) ให ผ านไปย งเคร อข ายท ม ระด บความเช อถ อต างก น 7. - Concept components Network
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Applications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and
Implementing SIP and H.323 Signalling as Web Services
Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Chapter 2 Introduction
Chapter 2 Introduction This chapter describes the features of the NETGEAR 54 Mbps Wireless ADSL Modem Router Model DG834G. The Wireless ADSL Modem Router is a combination of a built-in ADSL modem, ADSL
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
IP Phone Security: Packet Filtering Protection Against Attacks. Introduction. Abstract. IP Phone Vulnerabliities
W H I T E P A P E R By Atul Verma Engineering Manager, IP Phone Solutions Communications Infrastructure and Voice Group [email protected] Introduction The advantages of a converged voice and data network are
Release the full potential of your Cisco Call Manager with Ingate Systems
Release the full potential of your Cisco Call Manager with Ingate Systems -Save cost with flexible connection to Service Providers. -Save mobile costs, give VoIP mobility to your workforce. -Setup an effective
Multimedia Communications Voice over IP
Multimedia Communications Voice over IP Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India Voice over IP (Real time protocols) Internet Telephony
