How To Counter SpIT

Size: px
Start display at page:

Download "How To Counter SpIT"

Transcription

1 Countering SPAM over Internet Telephony (SPIT) Markus Hansen Independent Centre for Privacy Protection Schleswig-Holstein International Symposium Privacy and Security in Internet Telephony / VoIP Berlin IFA

2 Countering SPIT: Motivation Internet Telephony has developed, allows costsaving use of VoIP technology. VoIP will affect audio communication as affected written communication. Unsolicited calls are already annoying PSTN customers. => SPAM over Internet Telephony (SPIT) will become a problem similar to SPAM.

3 Countering SPIT: Motivation SPIT is expected to increase dramatically with cheaper calls. => Privacy protection needed. Laws prohibiting such calls are most often effectless against calls from other countries. => Technical approach needed. Telecommunication is regulated by several laws. Sanctions are up to five years in prison. => Legal compliance needed.

4 Legal Aspects of Filtering SPAM & SPIT Secrecy of Telecommunication (European level): Art. 8 ECHR: Respect for private life and correspondence Secrecy of Telecommunication and SPAM: c.f. Art 29 Data Protection Working Party Opinion 2/2006 on privacy issues related to the provision of screening services (WP118).

5 Art. 29 Group: WP 118 European regulations concerning SPAM filtering derive from the interpretation of Dir. 95/46/EC and Dir. 2002/58/EC in compliance with the ECHR and the corresponding case law of the Court of Human Rights. Other Directives (as e.g., e-privacy) can be relevant as well. Equivalent application to telephone calls as far as no differences derive from the syncronism of the medium.

6 Art. 29 Group: WP 118 Art. 4, 5 Dir. 2002/58/EC: Confidentiality of electronic communication has to be secured (e.g., by technical-organisational means). Personal data processing in the course of filtering viruses can be justified for the purpose of safeguarding the security of applications and services. Personal data processing in the course of filtering spam can be justified for the purpose of safeguarding the security of applications and services under certain requirements.

7 Art. 29 Group: WP 118 Personal data processing in the course of detecting any predetermined content CANNOT be justified for the purpose of safeguarding the security of applications and services. In all cases transparency and adequate user information has to be secured.

8 SPIT-AL: Legal Aspects Secrecy of Telecommunication, e.g. in Germany: Art. 10 GG, 88 TKG, 206 StGB Protecting content of communication and fact that it has taken place (or been unsuccessful). Binding any person involved in providing telecommunication services Control over any SPIT filter therefore has to be in hands of user as one of the communication partners.

9 SPIT-AL: Legal Aspects Telecommunication law (TKG) 88 Secrecy of Telecommunication 148 f. Suppression of Communication (Reject call, Greylisting) VoIP has not yet gone through courts.

10 SPIT-AL: Legal Aspects Privacy Law (aka: Data Protection Law) TKG Different SPIT-AL actions and configuration presets for private citizens, companies oder administrations. (Administrative Law: Right to be heard) Whitelists / Blacklists is processing of personal data => Infrastructure für consent / withdrawel => web interface => Teleservices Law

11 SPIT-AL: Legal Aspects Consequences for Development: Completely user-controlled filtering! Transparency and control of data processing and its consequences. Configuration presets for different types of users. Configuration options fine-grained.

12 The SPIT-AL Project SPIT-AbwehrLösung Public Funding : e-region Plus (Schleswig-Holstein) ERDF European Regional Development Fund Project Partners: TNG The Net Generation AG Internet Service Provider and Telecommunication Company ICPP Independent Centre for Privacy Protection Privacy Protection Authority of Schleswig-Holstein

13 The SPIT-AL Project White Paper download at Prototype Implementation in progress <= Test Run with 1000 users by end of 2006 Open Source Project Public funding, public benefit! Diploma Thesis at Dresden University of Technology

14 SPITting into your Ear Calls from Humans: Call Centres Calls from Automated Devices: Spam Bots Ringtone SPIT: Alert-Info Header Combinations

15 SPIT-AL: Technical Approach SPAM: Header & Content Analysis Content Analysis of Audio Communication: Synchronous Communication, impossible to do before call is established. Technically complex, binding resources. (C.f.: Microsoft V-Priorities. Patents?) Unneccessary once caller and callee talk. Not planned within SPIT-AL.

16 SPIT-AL: Technical Approach Analyze Information about Caller: Caller ID? (Lacking Authenticity with SIP) Origin: PSTN / SIP (Proxy, IP Range)? On Whitelists / Buddylists / Blacklists? Recursive Lists / Web of Trust Statistiscal Analysis (backbone) Analyze Information about Call: E.g.: 6 a.m.? Sorry, Mum. Weighten results, sum up.

17 SPIT-AL: Technical Approach Different Actions according to results: Establish call. (implementation: easy) Busy on first try. (greylisting) Challenge the caller: Please press *42#. (simple voice menu) What is 10 devided by 2? (tricky :-)) Voice Box => asynchronous Announce alternate reachability

18 SPIT-AL: Technical Approach Different Actions according to results: Simulate Callee (c.f. Telecrapper2000) binding your resources! Honeyphones (as in Honeypots, Honeynets) collect and analyse information on SPIT Reject call Implementation: Easy Legal: Suppression of Communication All not in SPIT-AL 'Filtering' not appropriate. Therefore: Reachability Management to counter SPIT

19 INCOMING CALL INCOMING CALL 1 VOICE DATA

20 Conclusions The SPIT problem will increase, countermeasures are needed. Countermeasures have to take effect before caller and callee talk to each other. Reachability management is a possible approach. Can be expanded/integrated into identity management system.

21 Future VoIP needs Security and Privacy Enhancements! E.g. strong end-to-end encryption E.g. end-to-end authentication VoIP could use a lot of other development, too. Thanks for listening! :-) Project: Contact: [email protected]

CE 817 - Advanced Network Security VoIP Security

CE 817 - Advanced Network Security VoIP Security CE 817 - Advanced Network Security VoIP Security Lecture 25 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially

More information

Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)

Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Vijay Radhakrishnan & Ranjith Mukundan Wipro Technologies, Bangalore, India Email:{radhakrishnan.vijay,

More information

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60 SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION Page 54 of 60 UNIFIED COMMUNICATION SYSTEM (VOIP) PROPOSAL FOR KISUMU JUDICIARY COURTS. 1.0 PARTICULARS

More information

Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags

Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags Markus Hansen Sebastian Meissner Independent Centre for Privacy Protection Schleswig-Holstein

More information

Privacy and Data Protection (and more) for Big Data

Privacy and Data Protection (and more) for Big Data Privacy and Data Protection (and more) for Big Data Marit Hansen Deputy Privacy and Information Commissioner Schleswig-Holstein, Germany [email protected] Madrid, 25 February 2015 Setting

More information

Prevention of Spam over IP Telephony (SPIT)

Prevention of Spam over IP Telephony (SPIT) General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem

More information

VOICE OVER IP SECURITY

VOICE OVER IP SECURITY VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee

More information

R&S IP-GATE IP gateway for R&S MKS9680 encryption devices

R&S IP-GATE IP gateway for R&S MKS9680 encryption devices Secure Communications Product Brochure 0.00 R&S IP-GATE IP gateway for encryption devices R&S IP-GATE At a glance The R&S IP-GATE is an IP interface for the encryption device. Used with the, the R&S IP-GATE

More information

8x8 Virtual Office Mobile User Guide for ios

8x8 Virtual Office Mobile User Guide for ios 8x8 User Guide for ios Works with iphone, ipad and ipod Touch Version 3.0, August 2012 The Champion For Business Communications Table of Contents Introduction...3 Features...3 Technical Requirements...4

More information

Fact Sheet. N-fon Case Study

Fact Sheet. N-fon Case Study Fact Sheet. N-fon Case Study nfon AG, a service provider based in Munich, Germany is successfully providing hosted PBX services for the corporate market. These services offer an attractive option for organisations

More information

A Phased Framework for Countering VoIP SPAM

A Phased Framework for Countering VoIP SPAM International Journal of Advanced Science and Technology 21 A Phased Framework for Countering VoIP SPAM Jongil Jeong 1, Taijin Lee 1, Seokung Yoon 1, Hyuncheol Jeong 1, Yoojae Won 1, Myuhngjoo Kim 2 1

More information

Kommunikationsdienste im Internet Möglichkeiten und Risiken

Kommunikationsdienste im Internet Möglichkeiten und Risiken Die Zukunft der Kommunikationsdienste im Internet Möglichkeiten und Risiken Erwin P. Rathgeb Technik der Rechnernetze, Universität Duisburg-Essen Jochen Kögel, Marc Barisch IKR, Universität Stuttgart Steffen

More information

The user interface of SIPPS is fully skinnable

The user interface of SIPPS is fully skinnable - THE ULTIMATE SOFTWARE TELEPHONE - SIPPS : Voice over IP for everybody SIPPS is a professional Voice over IP client software SIPPS is fully SIP-compliant Fully customizable softphone The user interface

More information

optipoint 410/420 S General configuration instructions for VoIP suppliers

optipoint 410/420 S General configuration instructions for VoIP suppliers optipoint 410/420 S General configuration instructions for VoIP suppliers bktoc.fm Inhalt Inhalt 0 1 Introduction........................................................... 3 1.1 Prerequisites for the

More information

VoIP telephony over internet

VoIP telephony over internet VoIP telephony over internet Yatindra Nath Singh, Professor, Electrical Engineering Department, Indian Institute of Technology Kanpur, Uttar Pradesh India. http://home.iitk.ac.in/~ynsingh MOOC on M4D (c)

More information

Managing Risks at Runtime in VoIP Networks and Services

Managing Risks at Runtime in VoIP Networks and Services Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in

More information

ABC SBC: Software Defined Communication Networks. FRAFOS GmbH

ABC SBC: Software Defined Communication Networks. FRAFOS GmbH ABC SBC: Software Defined Communication Networks FRAFOS GmbH Introduction SIP was designed with the vision of revolutionizing the way communication services are developed, deployed and operated. Following

More information

ARTICLE 29 Data Protection Working Party

ARTICLE 29 Data Protection Working Party ARTICLE 29 Data Protection Working Party 00451/06/EN WP 118 Working Party 29 Opinion 2/2006 on privacy issues related to the provision of email screening services Adopted on 21 February 2006 This Working

More information

Release Notes for MyPBX SOHO 70.20.0.X

Release Notes for MyPBX SOHO 70.20.0.X Release Notes for MyPBX SOHO 70.20.0.X ===Firmware Version: V70.20.0.20==== Applicable Model: MyPBX SOHO Release Date: January 6th, 2015 http://www.yeastar.com 1/12 1. Announcement We are pleased to announce

More information

IP-PBX Buyers Guide 2006

IP-PBX Buyers Guide 2006 IP-PBX Buyers Guide 2006 Produced by: Contents PBX Basics What s Different about IP-PBX Basic Features of IP-PBX Advanced Features Other Issues Conclusion IP-PBX Guide 2 PBX Basics A PBX is essentially

More information

VoIP Fraud and Misuse

VoIP Fraud and Misuse DFN Tagung 15.10.2013 VoIP Fraud and Misuse Detection and Mitigation Prof. Dr.-Ing. Erwin P. Rathgeb Dirk Hoffstadt, M.Sc. Networking Technology Group Institute for Experimental Mathematics & Institute

More information

Quick Reference Guide for Avaya Distributed Office voice mail

Quick Reference Guide for Avaya Distributed Office voice mail IP Telephony Contact Centers Mobility Services Quick Reference Guide for Avaya Distributed Office voice mail 03-602108 Issue 1 May 2007 This guide explains how to use Avaya Distributed Office voice mail.

More information

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011 Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice

More information

SIP Messages. 180 Ringing The UA receiving the INVITE is trying to alert the user. This response MAY be used to initiate local ringback.

SIP Messages. 180 Ringing The UA receiving the INVITE is trying to alert the user. This response MAY be used to initiate local ringback. SIP Messages 100 Trying This response indicates that the request has been received by the next-hop server and that some unspecified action is being taken on behalf of this call (for example, a database

More information

NCAS National Caller ID Authentication System

NCAS National Caller ID Authentication System NCAS National Caller ID Authentication System The National Telecom Security Border Controller OmniBud INC. 2003 2013 Dedicate to Internet Communication and Access Security NCAS Registration Module PSTN

More information

VoIPOffice. VoIPOffice Hosted Edition provides advanced features such as Unified Messaging, Automatic Call Distribution,

VoIPOffice. VoIPOffice Hosted Edition provides advanced features such as Unified Messaging, Automatic Call Distribution, Telappliant Hosted Edition is the next generation call management solution providing ultimate flexibility and features, all via a high speed Internet connection. Hosted Edition provides all of the benefits

More information

Avaya IP Office 8.1 Configuration Guide

Avaya IP Office 8.1 Configuration Guide Avaya IP Office 8.1 Configuration Guide Performed By tekvizion PVS, Inc. Contact: 214-242-5900 www.tekvizion.com Revision: 1.1 Date: 10/14/2013 Copyright 2013 by tekvizion PVS, Inc. All Rights Reserved.

More information

SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.

SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd. SIP SECURITY Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne WILEY A John Wiley and Sons, Ltd., Publication Foreword About the Authors Acknowledgment xi xiii xv 1 Introduction

More information

6 Steps to SIP trunking security. How securing your network secures your phone lines.

6 Steps to SIP trunking security. How securing your network secures your phone lines. 6 Steps to SIP trunking security How securing your network secures your phone lines. The myths about SIP trunking can be misleading. There are stories that SIP has set off a cyber crime wave of corporate

More information

Direct IP Calls. Quick IP Call Mode

Direct IP Calls. Quick IP Call Mode Unicorn3112 Tips Direct IP Calls...1 Quick IP Call Mode...1 PSTN Pass Through...2 VoIP-to-PSTN Calls...2 PSTN-to-VoIP Calls...3 Route Calls to PSTN...4 Forward Calls to PSTN...4 Forward Calls to VoIP...4

More information

MICROSOFT FULL ACCESS MAILBOX (50GB) MICROSOFT OUTLOOK CLIENT ROARING PENGUIN SPAM FILTER ROARING PENGUIN 3-YEAR ARCHIVING UNIQUE FEATURES

MICROSOFT FULL ACCESS MAILBOX (50GB) MICROSOFT OUTLOOK CLIENT ROARING PENGUIN SPAM FILTER ROARING PENGUIN 3-YEAR ARCHIVING UNIQUE FEATURES SOLUTION BUNDLE OVERVIEW 2016 EMAIL BUNDLES EMAIL 1 MICROSOFT FULL ACCESS MAILBOX (50GB) MICROSOFT OUTLOOK CLIENT EMAIL 2 $8/SEAT $3 50 /SEAT Automatic Updates on Spam Software *Applicable across all bundles:

More information

HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION

HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION 01 INTRODUCTION Inclarity is the UK s leading provider of Hosted Telephony, Hosted UC and Hosted Video solutions. We help our customers to communicate

More information

Mark and Sweep Robocall Detection and Prevention. By Dan Weber, Alan Basinger, Dean Willis, and David Schwartz

Mark and Sweep Robocall Detection and Prevention. By Dan Weber, Alan Basinger, Dean Willis, and David Schwartz Mark and Sweep Robocall Detection and Prevention By Dan Weber, Alan Basinger, Dean Willis, and David Schwartz Background of the Robocall Problem Current Solution Attempts Solution Deployability Incentives

More information

VoIP SPAM and a Defence against this Type of Threat

VoIP SPAM and a Defence against this Type of Threat VoIP SPAM and a Defence against this Type of Threat MIROSLAV VOZNAK FILIP REZAC Department of Telecommunications CESNET, z.s.p.o. Zikova 4, 160 00 Prague 6 CZECH REPUBLIC [email protected], [email protected]

More information

How to make free phone calls and influence people by the grugq

How to make free phone calls and influence people by the grugq VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth

More information

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 "It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed,

More information

Ingate Firewall/SIParator SIP Security for the Enterprise

Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...

More information

How to Build a Simple Virtual Office PBX System Using TekSIP and TekIVR

How to Build a Simple Virtual Office PBX System Using TekSIP and TekIVR How to Build a Simple Virtual Office PBX System Using TekSIP and TekIVR This document explains how to build a simple virtual office PBX system using TekSIP and TekIVR. In this example following components

More information

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures

More information

Vonage Business Solutions for Android User Guide

Vonage Business Solutions for Android User Guide Vonage Business Solutions for Android User Guide 1 Vonage Business Solutions, Inc. 1375 Peachtree Street, NE Suite 200 Atlanta, GA 30309 Sales 1-877-862-2562 Support 1-866-901-0242 www.vonagebusiness.com

More information

Extension Manual. 3CX Assistant, MyPhone User portal, Dial codes & Voice mail for 3CX Phone System Version 8.0

Extension Manual. 3CX Assistant, MyPhone User portal, Dial codes & Voice mail for 3CX Phone System Version 8.0 Extension Manual 3CX Assistant, MyPhone User portal, Dial codes & Voice mail for 3CX Phone System Version 8.0 Copyright 2006-2009, 3CX ltd. http:// E-mail: [email protected] Information in this document is

More information

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step

More information

D3 TECHNOLOGIES SPAM FILTER

D3 TECHNOLOGIES SPAM FILTER D3 TECHNOLOGIES SPAM FILTER The D3 Technologies spam filtering provides virus, attachment, and spam filtering services for email. We check all emails for viruses and malicious content, since we feel these

More information

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM Evelina Nicolova Pencheva, Vessela Liubomirova Georgieva Department of telecommunications, Technical University of Sofia, 7 Kliment Ohridski St.,

More information

Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0

Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data

1. Introduction. 2. Sectoral Areas Affected. 3. Data Security. 4. Data Breach Requirements. 5. Traffic Data 1. Introduction Special data protection rules apply to the protection of Personal Data by Data Controllers in the electronic communications sector. These are in addition to the general obligations that

More information

Using Advanced Phone Features

Using Advanced Phone Features Using Advanced Phone Features This chapter describes how to configure advanced features on your IP Phone. It contains the following sections: Configuring Privacy and Security, page 9 Enabling and Using

More information

Extension Manual. User portal, Dial codes & Voice mail for 3CX Phone System Version 7.0

Extension Manual. User portal, Dial codes & Voice mail for 3CX Phone System Version 7.0 Extension Manual User portal, Dial codes & Voice mail for 3CX Phone System Version 7.0 Copyright 2006-2008, 3CX ltd. http:// E-mail: [email protected] Information in this document is subject to change without

More information

VoIP Resilience and Security Jim Credland

VoIP Resilience and Security Jim Credland VoIP Resilience and Security Jim Credland About THUS plc Provider and user of VoIP and Soft Switch technologies Developing Enterprise Security Standards NISCC VoIP Working Group Security Considerations

More information

Countering Unsolicited Calls in the Internet Telephony: An anti-spit Architecture

Countering Unsolicited Calls in the Internet Telephony: An anti-spit Architecture Countering Unsolicited Calls in the Internet Telephony: An anti-spit Architecture Panos STAMATIOU 1 and Dimitris GRITZALIS 1,2 1 Hellenic Open University (HOU), Dept. of Informatics, Patras, Greece 2 Athens

More information

SERVICE DESCRIPTION Web Proxy

SERVICE DESCRIPTION Web Proxy SERVICE DESCRIPTION Web Proxy Date: 14.12.2015 Document: Service description: Web Proxy TABLE OF CONTENTS Page 1 INTRODUCTION 3 2 SERVICE DESCRIPTION 4 2.1 Basic service 4 2.2 Options 6 2.2.1 Web Filter

More information

THINKTEL COMMUNICATIONS 3CX PHONE SYSTEM V.11. 3CX Phone System THINKTEL SIP TRUNK from scratch

THINKTEL COMMUNICATIONS 3CX PHONE SYSTEM V.11. 3CX Phone System THINKTEL SIP TRUNK from scratch THINKTEL COMMUNICATIONS 3CX PHONE SYSTEM V.11 3CX Phone System THINKTEL SIP TRUNK from scratch TA B L E O F C O N T E N T S 1.1 INTRODUCTION... 3 2.1 REQUIREMENTS... 4 2.2 3CX PHONE SYSTEME INSTALLATION...

More information

SIP Service Providers and The Spam Problem

SIP Service Providers and The Spam Problem SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation

More information

8x8 Virtual Office Mobile User Guide for ios

8x8 Virtual Office Mobile User Guide for ios 8x8 User Guide for ios Works with iphone, ipad and ipod Touch Version 4.0, October 2012 The Champion For Business Communications Table of Contents Introduction...3 Features...3 Technical Requirements...4

More information

Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat K.Guirguis

Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat K.Guirguis Alexandria University Institute of Graduate Studies and Research Department of Information Technology. Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat

More information

R&S IP-GATE IP gateway for ISDN encryption devices

R&S IP-GATE IP gateway for ISDN encryption devices Secure Communications Product Brochure 0.00 R&S IP-GATE IP gateway for ISDN encryption devices R&S IP-GATE At a glance The R&S IP-GATE is an IP interface for the most recent models of the R&S MKS9680 and

More information

Implementing Intercluster Lookup Service

Implementing Intercluster Lookup Service Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end

More information

Spam goes VoIP. Number Harvesting for Fun and Profit. Hack in The Box 2007 Dubai Hendrik Scholz [email protected]

Spam goes VoIP. Number Harvesting for Fun and Profit. Hack in The Box 2007 Dubai Hendrik Scholz hs@123.org Spam goes VoIP Number Harvesting for Fun and Profit Hack in The Box 2007 Dubai Hendrik Scholz [email protected] 1 Agenda VoIP Threads Difference between Spam and SPIT Use Cases for VoIP numbers Number Harvesting

More information

CONFIGURING TALKSWITCH FOR RUBICON SERVICE

CONFIGURING TALKSWITCH FOR RUBICON SERVICE TALKSWITCH TECH NOTE CONFIGURING TALKSWITCH FOR RUBICON SERVICE CONFIGURING TALKSWITCH FOR RUBICON SERVICE CT.TS005.004502 Before proceeding, we recommend that you follow the steps outlined in the Start

More information

Implementing SIP and H.323 Signalling as Web Services

Implementing SIP and H.323 Signalling as Web Services Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de

More information

Visocall IP PBX Connection

Visocall IP PBX Connection Visocall IP PBX Connection Specification Authors: V 2.1 Buchmüller Seite 1 von 8 Table of Contents DOCUMENT STATUS... 3 1 INTRODUCTION... 4 2 FUNCTIONALITY... 4 2.1 PAT TELEPHONE FUNCTION... 4 2.2 EVENT

More information

Dramatically simplifying voice and data networking. IVR Editor HOW-TO Guide

Dramatically simplifying voice and data networking. IVR Editor HOW-TO Guide Dramatically simplifying voice and data networking IVR Editor HOW-TO Guide 2 edgebox How-To Guide IVR Editor HOW-TO Guide Table of Contents Introduction... 3 IVR...3 The edgebox IVR Editor...3 Understanding

More information

Call-Blocking Technology

Call-Blocking Technology Call-Blocking Technology MODERATOR: Bikram Bandy, FTC PANELISTS: Andrew Whitt, Verizon Communications Jeff Stalnaker, PrivacyStar Matt Stein, Primus Telecommunications Canada Inc. Andrew Whitt Director

More information

Eliac Call Recording - Configurator Guide. Eliac. Call Recording System Ver. 2.x. www.smartsoft-eg.com

Eliac Call Recording - Configurator Guide. Eliac. Call Recording System Ver. 2.x. www.smartsoft-eg.com Eliac Call Recording System Ver. 2.x 1 System Overview Eliac Call Recording is a complete system that records both incoming and outgoing calls for any analog telephone lines, and can record either internal

More information

Swisscom Service description for Microsoft Office 365

Swisscom Service description for Microsoft Office 365 1 Scope Swisscom (Switzerland) AG makes available Microsoft Online Services and Microsoft Office applications for your (Company) use as a customer. They can be used on PC s running a current Windows or

More information

Connecting with Vonage

Connecting with Vonage Connecting with Vonage Vonage (http://www.vonage.com/) offers telephone service using the VoIP (Voice over Internet Protocol) standard SIP (Session Initiation Protocol). The service allow users making

More information

Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice. 2005-05-11 Upperside WiFi Voice 2005

Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice. 2005-05-11 Upperside WiFi Voice 2005 Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice 2005-05-11 Upperside WiFi Voice 2005 Jörg Ott Dirk Kutscher [email protected] [email protected] 2005

More information

Extension Manual User portal, Dial codes & Voice mail for 3CX Phone System Version 6.0

Extension Manual User portal, Dial codes & Voice mail for 3CX Phone System Version 6.0 Extension Manual User portal, Dial codes & Voice mail for 3CX Phone System Version 6.0 Copyright 2006-2008, 3CX ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change

More information

EZLoop IP-PBX Enterprise SIP Server

EZLoop IP-PBX Enterprise SIP Server EZLoop IP-PBX Enterprise SIP Server Copyright 2007 Teletronics International, Inc. 2 Choke Cherry Road, Rockville, MD 20850 [email protected] www.teletronics.com CH1. Overview...4 1.1 Specifications...4

More information

Configuring Quadro IP PBXs with "SIP Connect"

Configuring Quadro IP PBXs with SIP Connect Configuring Quadro IP PBXs with "SIP Connect" Revision: 1.0 Abstract: This document describes how to configure the Quadro IP PBXs to use the IP-PSTN service from SIP Connect PAGE 1 Document Revision History

More information

An outline of the security threats that face SIP based VoIP and other real-time applications

An outline of the security threats that face SIP based VoIP and other real-time applications A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications

More information

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea

More information

How To Protect Your Privacy On The Net

How To Protect Your Privacy On The Net International Working Group on Data Protection in Telecommunications Report and Guidance on Data Protection and Privacy on the Internet "Budapest - Berlin Memorandum" adopted at the 20th Meeting in Berlin,

More information

Auto Attendants. Call Management

Auto Attendants. Call Management Auto Attendants Customer Portal Top Level Auto Attendant (Always On) Multiple Top Level Auto Attendants (Always on) Top Level Auto Attendant (Time Based) Sub-Level Auto Attendants Web based user interface

More information

Connecting with Free IP Call

Connecting with Free IP Call Connecting with Free IP Call Free IP Call (http://www.freeipcall.com/) offers telephone service using the VoIP standard SIP. The service allow users making/receiving VoIP calls to/from VoIP telephone numbers

More information