Just as the ecommerce companies have
|
|
|
- Christian Jesse Alexander
- 10 years ago
- Views:
Transcription
1 Protecting IMS Networks From Attack Krishna Kurapati Krishna Kurapati is the founder and CTO of Sipera Systems ( a company that specializes in security for VOIP, mobile and multimedia communications. He can be reached at 214/ or [email protected]. Application-level attacks and fuzzing are on the rise. Can IMS cope? Just as the ecommerce companies have learned that they must go to great lengths to protect their core servers from hackers, malware and service abuses, so too must network operators who plan to offer Internet-based services using IMS (IP Multimedia Subsystem) technologies. Because the Internet is an open system, any user can freely connect to it at any time from any place with little effort, making it a fertile breeding ground for a wide variety of malicious and unauthorized activities. With both ecommerce and IMS, security is a necessary requirement, as any down time of the site or service means lost revenue for the company. Ecommerce sites typically protect their infrastructure and services with a variety of security devices and techniques. These range from denial of service (DoS)/distributed DoS (DDoS) protection for HTTP request traffic to intrusion detection/prevention systems IDS/IPS) that do deep packet inspection for vulnerabilities in application traffic. Many ecommerce sites also deploy application-specific firewalls and implement SSL/ HTTPS access for ecommerce transactions (see this issue, pp ). While the IMS network attacks bear similarities to those on ecommerce sites, both the attacks and required devices with IMS are unique to this network. This article explains why IMS is so vulnerable, and then describes several potential IMS FIGURE 1 How To Hack An IMS Network AAA HSS AS Chrg Services IPSec/ IKEv2 Module Scripting Tools IMS Message Formats Utility to Read ISIM GPRS SIP Server Call Server Prepaid ISIM Card/ GPRS Data Card ISIM Card Reader Script various Fuzzing, Flood & Spoofing Attacks WLAN PDG IMS Core IP-IP-GW Media Gateway 40 BUSINESS COMMUNICATIONS REVIEW / SEPT 2006 Use BCR s Acronym Directory at
2 FIGURE 2 Examples Of Floods And The Components Attacked Security Init Flood Security Auth Flood PDG/P-CSCF I/S-CSCF MGW AAA/HSS AS Mobile IMS Register Request Flood Building an attack vector to exploit an IMS network takes very little time or money VCC Notify Flood Presence Update Flood Media Flood Talk Burst Request Flood attacks and the different security requirements that need to be addressed. It also briefly explores possible solutions that can complement current authentication and encryption, to protect against all these attacks. While the article focuses on IMS, many of the same problems and solutions apply equally to unlicensed mobile access (UMA) networks, which some view as mobile precursors to IMS. Let s first explore why IMS is such an easy target for malicious users, and then take a close look at the major application-layer weaknesses and how to address them. Glossary Of Terms PDG: Packet Data Gateway is the security gateway that terminates and aggregates the IPSec tunnels. CSCF: Call Server Control Function provides registration of the endpoints and routing of the SIP signaling messages. The various CSCF components include the Proxy-CSCF (P-CSCF), the Interrogating-CSCF (I-CSCF); and the Serving-CSCF (S-CSCF). MGW: Media Gateway interfaces with the media plane of the circuit switched network, by converting between RTP and PCM. HSS: Home Subscriber Server is the main data storage for all subscriber and service related data. AAA: Authentication Authorization Accounting Server controls the database concerning who can access the network, and tracks billing data for each user. AS: Application Server is responsible for the execution of service-specific logic and delivering value-added services. Building An Attack Tool Is Easy IMS and one of its chief components, the Session Initiation Protocol (SIP), enable a rich set of converged services, but they also open up the network to a host of known IP-based vulnerabilities. Some of these can be addressed by firewalls and some by the packet data gateway (PDG), while other application-layer attacks are completely new. At the same time, building an attack vector to exploit an IMS network takes very little investment in terms of time or money. The components are available for free as open-source software, and all the IMS specifications are publicly available at the 3GPP website. After simply purchasing a Universal or IP multimedia Services/Subscriber Identity Modules (U/I-SIM) card, a competent hacker could, in just a few days, easily write scripts to read the cards. Once the SIM cards are hacked, the perpetrator is easily inside the IMS network, as shown in Figure 1. Because IMS specifies IPSec as the preferred form of core-level, network-layer security, once tunnels are established with the packet data gateway, the clever hacker can readily launch huge floods of traffic up to 10,000 messages per second, which is equivalent to the traffic from 10 million subscribers, bringing down multiple nodes in the network, including the PDG itself. Flooding is just one of many IMS vulnerabilities. In fact, our lab has identified more than 90 major classes of unique vulnerabilities and more than 20,100 attacks that can be launched against IMS networks. Some IMS attacks can be launched even before the user authenticates (necessary each time the user initiates a request to gain access to system capabilities and services), while others can be used to attack the core infrastructure and take down the service, or they can be used to attack the end users. Here are some specific examples: BUSINESS COMMUNICATIONS REVIEW / SEPT
3 Some flood attacks can be launched before the IPSec tunnels are set up FIGURE 3 Stealth Attack Example PDG P/I/S-CSCF MGW AAA HSS Mobile Stealth call origination attack Floods, Distributed Floods And Stealth Attacks As just described, DoS attacks, as shown in Figure 2, basically flood the IMS network with a tremendously large number of random messages. Whether sent from a single location or from multiple locations (DDoS), the flood of messages is well beyond the processing capacity of the target system, thereby quickly exhausting its resources and denying services to its legitimate users. The nature of these flood attacks is very similar to what can be launched at other networks, but the impact could be much more devastating. Floods that are extremely damaging to IMS networks include those based on the Internet Key Exchange (IKE), such as IKE_SA_INIT floods and IKE_SA_AUTH floods, both of which are possible even before setting up the IPSec tunnel. Application-specific floods such as Register Request Floods and Presence Update Floods are also possible. These attacks are easily created using publicly available tools. In a stealth attack, one or more specific endpoints are deliberately attacked from one (DoS) or more (DDoS) sources, although at a much lower call volume than is characteristic of flood type attacks, as shown in Figure 3. What makes IMS particularly vulnerable to these floods is the fact that the IKE messages in IMS, for the first time, expose the key IMS infrastructure components to attack, including the home subscriber server (HSS), which stores and provides real-time customer data. Any of these flooding attacks would be devastating if the IMS network is used to offer emergency services and/or connectivity to other non-ims networks. If IMS is assumed to be the architecture for wireless and wired public networks, then any attack on an IMS network could potentially affect the more than 2 billion users connecting to wireless and wireline networks today. The key challenge is to stop all these attacks (i.e., no false negatives) while allowing legitimate traffic to still pass through (i.e., no false positives). There is no standard mechanism in the IMS specifications to handle these types of attacks, so vendors need to develop their own techniques to provide this protection. Rate limiting is sometimes used to prevent floods and distributed floods, but it does not selectively block only the attack traffic. Protocol Fuzzing Fuzzing is a legitimate method of testing software systems, in which semi-valid input is provided to an application to see how it reacts. Then appropriate fixes can be implemented, if necessary. Malicious users, however, employ this same methodology to exploit vulnerabilities in a target system. They do this by sending messages whose content is good enough that the target will assume it s valid. In reality, the message is broken or fuzzed enough that, when the target system attempts to parse or process it, various failures result. These can include application delays, information leaks, or even catastrophic system crashes. Fuzzing attacks are nearly impossible in the PSTN and on 2G cellular networks because the FIGURE 4 Examples Of Fuzzing Security Init Fuzzing PDG P/I/S-CSCF MGW AAA/HSS AS Mobile Register Request Fuzzing VCC Notify Fuzzing Presence Update Fuzzing 42 BUSINESS COMMUNICATIONS REVIEW / SEPT 2006
4 signaling traffic is encoded (not text-based like SIP) and the OSes and protocols are proprietary, so hackers don t have access to the details. However, in the IMS network and on the public Internet, fuzzed messages can easily be used to launch attacks. They can even be transmitted using encrypted and authenticated traffic all the way to the IMS core, as shown in Figure 4. IMS also may be more vulnerable to fuzzed messages because it is the product of hundreds of IETF drafts and RFCs, combined with some 3GPP specs, and none of these are very mature or robust. In addition, each message is handled by multiple subsystems, offering many points of potential vulnerability. Again, IMS specifications do not spell out how these fuzzing vulnerabilities are to be addressed. A deep-packet-inspecting security device needs to decrypt and examine the traffic at wire speed to prevent these fuzzing attacks, by either fixing the malformed part of the message or dropping the call. Otherwise the mobile devices or infrastructure will be overwhelmed and reboot, since they don t know how to handle the fuzzed messages. VOIP Spam VOIP spam, or Spam-over-Internet Telephony (SPIT), is unsolicited and unwanted bulk messages that can be easily generated and broadcast over the IMS network. The origins of such bulk calls routed over IP are often very difficult to trace because of the portability and mobility of devices and soft clients, as well as the IP layer s open invitation to fraud, unauthorized resource use and privacy violations. Similar problems exist on the Internet, too, and solutions, such as spam filters, have been developed to address them. However, these solutions do not address VOIP behavior and VOIP call states (such as call forwarding, transfer and caller ID spoofing detection), so these will not work for IMS networks. Fraud Fraud can happen in IMS networks in many ways. As mentioned above, the fraudulent user can easily gain access to the IMS network by hacking the U/I SIM cards. Once s/he has access, s/he can commence toll fraud by acting as a gateway between the local PSTN and the IMS network. The attack and result could be quite similar to the recently publicized million-dollar toll fraud on a VOIP network (see, for example, Although IMS is ostensibly to be secured by IPSec, the fraudulent user can easily become an authenticated subscriber and once inside, can access the entire IMS network and servers. Hackers already have many techniques such as password cracking, buffer overflows, exploits for OS vulnerabilities and installing rootkits to get access to the servers, routers, firewalls and operating systems in the network once they get connected. These attacks expose subscriber records and call records to the hackers. To protect against fraud, the behavior of all subscribers needs to be monitored in real time, and misbehaving subscribers need to be blocked. In PSTN networks, you have fraud protection systems that monitor SS7 and billing traffic for potential anomalies. Today, IMS specifications count only on authentication and authorization systems, both of which are easily hacked, to address fraud. Rogue Devices New, smart devices and new access capabilities (such as USB, Bluetooth and downloadable software) can pose a great risk to IMS networks, even inadvertently. Since most of these devices have soft clients, they are easy targets for worms and viruses. These devices also can be recruited as bots on the Internet by hackers to attack the IMS networks and applications. Current Approaches To IMS Security The probability of damaging attacks against the IMS network is obviously greater than network operators and IMS equipment suppliers and standards bodies have recognized. If operators are to succeed with IMS, they will need to protect subscribers, software, servers and other infrastructure nodes from the attacks described above. In IMS networks and on the public Internet, fuzzed messages can easily be used to launch attacks TABLE 1 Today s IMS Security PDG/P-CSSF Firewall Functionality Not Addressed User authentication Layer 3 IP access control IMS application information-based access control Signaling and/or Layer 3 IP flow control IMS application information-based flow control media encryption NAT functions IMS message fuzzing prevention Layer 4 TCP/UDP stateful packet IMS message spoofing prevention inspection IMS message and media misuse prevention HTTP/FTP application protection IMS service misuse prevention Application layer gateway (ALG) IMS subscriber protection IMS spam prevention BUSINESS COMMUNICATIONS REVIEW / SEPT
5 So far, IMS standards provide only privacy and authentication Thus far, IMS security in 3GPP/3GPP2 refers to various encryption techniques and authentication mechanisms (TS and TS ), plus IPSec and security gateways (TS ). Although these techniques are well understood and standardized in 3GPP/3GPP2 specifications, and some already have been integrated into a variety of wireless infrastructure products, they provide only privacy and authentication. Therefore, most operators approach the issue by implementing firewalls and/or packet data gateways (PDGs) in front of their Proxy-Call Server Control Function (P-CSCF) that provide the following functions: Authentication and encryption methods to prove the identity of IMS users and ensure the privacy of their communications. Stateful firewall capabilities that offer Layer 3 (IP) and Layer 4 (TCP/UDP) access control and flow control, network address translation (NAT) traversal with topology hiding and dynamic opening/closing of media ports. While these services are important, they do not protect against attacks launched by authenticated users, attacks embedded in the encrypted traffic and application layer attacks, as shown in Table 1 and discussed above. Conclusion We have seen how easy it is to become an authenticated subscriber on the IMS network through the purchase (or hacking) of a prepaid SIM card. As we discussed, it is hard to determine which authenticated subscribers can be trusted. We also have seen that traditional security mechanisms are insufficient, and that IMS security specifications are lacking. We note that the encryption and authentication that have been specified are only part of the solution. The probability of malicious attacks and service abuse of VOIP and other real-time IP communications applications continues to increase, together with the increase in attack sophistication. All these developments are creating a new level of security requirements for the operator that go beyond anything they have deployed thus far. The best way to provide the required level of protection is to comply with the 3GPP standards and rigorously apply all authentication and encryption mechanisms; deploy the very best existing data security techniques, such as firewall, IDS/IPS and spam filters; and deploy an IMS application-level security device that takes the best existing security techniques but also incorporates a variety of sophisticated IMS-specific security methodologies that include behavior learning, filtering and anomaly detection and verification. Together, these practices will proactively protect the IMS network from attacks, misuse and service abuse which networks and end-users could face today and in the future 44 BUSINESS COMMUNICATIONS REVIEW / SEPT 2006
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Voice Over IP and Firewalls
Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Use of Voice Over IP (VoIP) in enterprises is becoming more and more
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
Ingate Firewall/SIParator SIP Security for the Enterprise
Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem
FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving
Threat Mitigation for VoIP
Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities
Cconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
Implementing Conditional Conference Call Use Case over IMS and Non IMS Testbed an experimental results through comparison approach
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 109 Implementing Conditional Conference Call Use Case over IMS and Non
Security Best Practices for Enterprise VoIP. Preventing Attacks and Managing Risk
Security Best Practices for Enterprise VoIP Preventing Attacks and Managing Risk A Sipera White Paper September 2007 Summary To take full advantage of unified communications (UC), enterprises are extending
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
Challenges and opportunities for Open Source solutions
GDS20910 39HA83090K2 D3 S20910 328MGD 7 W510200RQ1 UT 10 T28GHY620 JH7 BE4ET276 90K2 D39HA83 0K2 D39HA830 8JD6200NS12 RQ1 UTW510200 H7 BE4ET2763J 8HGDOI0912 M1 Y620110 T28GH UTW510200 83090K2 GDS20910
Voice over IP Security
Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Solution Brief. Secure and Assured Networking for Financial Services
Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to
SIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
Security considerations for IMS access independence
3GPP TSG SA WG3 Security S3#20 S3-010468 16-19 October, 2001 Sydney, Australia Source: Title: Document for: Agenda Item: Telia / independence Information Security Security considerations for access independence
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
End-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
Network Security: Introduction
Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has
How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack
DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014 Protecting the Information that Secures the Homeland This page
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
White Paper. avaya.com 1. Table of Contents. Starting Points
White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting
Advanced SIP Series: SIP and 3GPP Operations
Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
VoIP Security Threats and Vulnerabilities
Abstract VoIP Security Threats and Vulnerabilities S.M.A.Rizvi and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, UK e-mail: [email protected] This paper presents the
VOIP TELEPHONY: CURRENT SECURITY ISSUES
VOIP TELEPHONY: CURRENT SECURITY ISSUES Authors: Valeriu IONESCU 1, Florin SMARANDA 2, Emil SOFRON 3 Keywords: VoIP, SIP, security University of Pitesti Abstract: Session Initiation Protocol (SIP) is the
Intrusion Prevention: The Future of VoIP Security
Intrusion Prevention: The Future of VoIP Security Introduction...2 VoIP Building Blocks...3 VoIP Security Threat Scenarios...7 Attacks against the underlying VoIP devices OS...7 Configuration Weaknesses
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Access Mediation: Preserving Network Security and Integrity
Access Mediation: Preserving Network Security and Integrity Definition Access mediation is the process of examining and controlling signaling traffic between networks, resources and users by filtering
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
VOIP SECURITY ISSUES AND RECOMMENDATIONS
VOIP SECURITY ISSUES AND RECOMMENDATIONS Sathasivam Mathiyalakan MSIS Department, College of Management, University of Massachusetts Boston Phone: (617) 287 7881; Email: [email protected] ABSTRACT
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Enterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
VoIP Security* Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011
VoIP Security* Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011 *Thanks to Prof. Angelos Keromytis for materials for these lecture slides. CSE545 - Advanced Network Security -
Business Phone Security. Threats to VoIP and What to do about Them
Business Phone Security Threats to VoIP and What to do about Them VoIP and Security: What You Need to Know to Keep Your Business Communications Safe Like other Internet-based applications, VoIP services
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Voice over IP (VoIP) Vulnerabilities
Voice over IP (VoIP) Vulnerabilities The Technical Presentation Diane Davidowicz NOAA Computer Incident Response Team N-CIRT [email protected] "Security problems in state of the art IP-Telephony
A Reality Check on Security in VoIP
A Reality Check on Security in VoIP Communications Rick Robinson CISSP ISSAP IEEE Sr. Member Agenda Background Overview of Threats Top Ten With Reality Checks Trends Actions Pearls Questions Background
Mitigating the Security Risks of Unified Communications
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Mitigating the Security Risks of Unified Communications Fernando Almeida 1 +, Jose
of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier
VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture
IMS Interconnect: Peering, Roaming and Security Part One
T E C H N O L O G Y W H I T E P A P E R IMS Interconnect: Peering, Roaming and Security Part One IMS interconnection promises to enable greater reach and richer offerings for the providers that establish
Session Border Controllers in Enterprise
A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
Juha Heinänen [email protected]
From Voice over IP to Voice over Internet Juha Heinänen [email protected] From VoIP to VoINET VoIP replaced wires in PBX and PSTN backbones with IP preserves the traditional, centralized telephony service
Delivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
Architectural Overview of IP Multimedia Subsystem -IMS
Architectural Overview of IP Multimedia Subsystem -IMS Presented by: Masood Khosroshahy June 2006 B E G I N N I N G 1 Project supervisor: Prof. Elie Najm Simplified view of the layered architecture in
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Security Guidance for Deploying IP Telephony Systems
Report Number: I332-016R-2005 Security Guidance for Deploying IP Telephony Systems Systems and Network Attack Center (SNAC) Released: 14 February 2006 Version 1.01 [email protected] ii This Page Intentionally
Advanced SIP Series: SIP and 3GPP
Advanced SIP Series: SIP and 3GPP, Award Solutions, Inc Abstract The Session Initiation Protocol has been selected as the main signaling protocol of the Third Generation Partnership Projects IP Multimedia
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks
An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
CPNI VIEWPOINT 03/2007 HOSTED VOICE OVER IP
HOSTED VOICE OVER IP AUGUST 2007 Abstract Voice over IP (VoIP) is the term used for a set of technologies that enable real time voice or video conversations to take place across IP networks. VoIP devices
SANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
Strategies to Keep Your VoIP Network Secure
V OIP NETWORK SECURITY VoIP enterprise deployments need strategies to help provide a balance between security and ease of use. Wesley Chou Strategies to Keep Your VoIP Network Secure A s VoIP technology
Table of Content. Introduction Components Architectural Characteristics Concepts Protocols Service Examples Discussion. ToC
Danar Barzanji Marcel K Steffen Roger Trösch 22.06.2006 Communication Systems IMS www.packetizer.com Table of Content Introduction Components Architectural Characteristics Concepts Protocols Service Examples
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.
SIP SECURITY Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne WILEY A John Wiley and Sons, Ltd., Publication Foreword About the Authors Acknowledgment xi xiii xv 1 Introduction
A Call Conference Room Interception Attack and its Detection
A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,
