Intrusion Prevention: The Future of VoIP Security
|
|
|
- Bertina Heath
- 10 years ago
- Views:
Transcription
1 Intrusion Prevention: The Future of VoIP Security
2 Introduction...2 VoIP Building Blocks...3 VoIP Security Threat Scenarios...7 Attacks against the underlying VoIP devices OS...7 Configuration Weaknesses in VoIP devices...8 IP Infrastructure Attacks...9 VoIP Protocol Implementation Vulnerabilities...9 VoIP Application Level Attacks...9 The Future of VoIP Security...10 VoIP and TippingPoint...11 Summary Voice-over-IP (VoIP) technology has come of age and is quickly gaining momentum on Broadband networks. VoIP packetizes phone calls through the same routes used by network and Internet traffic and is consequently prone to the same cyber threats that plague data networks today. These include denial-ofservice attacks, worms, viruses, and hacker exploitation. In addition to these traditional network security and availability concerns, there are also a plethora of new VoIP protocols that have yet to undergo detailed security analysis and scrutiny. The challenge of VoIP security is not new. History has shown that many other advances and trends in information technology (e.g. TCP/IP, Wireless , Web Services, etc.) typically outpace the corresponding realistic security requirements that are often tackled only after these technologies have been widely adopted and deployed. TippingPoint s Intrusion Prevention technology protects networks against the known cyber threats of today, as well as the future VoIP specific vulnerabilities and threats that are beginning to emerge. Introduction VoIP technology in general refers to the set of software, hardware and industry standards that enable voice to be transported using the Internet Protocol (IP). The technology has been initially welcomed by many broadband service providers who plan on offering telephony services to their customers. According to some analyst estimates, VoIP will account for 75 percent of the world voice services by 2007 and the IP-based PBX market is estimated to grow to $16 billion worldwide by 2006 i. The technology is compelling to a wide audience for several reasons: VoIP phone bills are typically cheaper than traditional phone bills to the consumer. VoIP networks offers providers easier IT management and reduction in operating cost for a combined network for voice and data. Copyright 2004 TippingPoint Technologies, Inc. All rights reserved. 2
3 VoIP technology is feature rich to support next generation multimedia applications. However, despite the seemingly overwhelming advantages of VoIP to Public Switched Telephone Networks, there are stringent and mandatory requirements that VoIP providers and the technology itself must live up to: For service providers, a VoIP network must provide emergency services like 911 at all times, and have a similar uptime (99.995%) as the traditional phone network. To make the end-user experience of a phone call over the IP network comparable to the traditional phone call, VoIP networks must guarantee a Quality-of-Service similar to the traditional phone systems. This implies that the VoIP implementations must effectively deal with lost voice packets and voice packets arriving out-of-order, which are a common occurrence in a typical IP network. The VoIP network must also guarantee that any communication between the end parties in a call cannot be intercepted or modified by a malicious third party. It should be difficult for a hacker to conduct a man-in-themiddle attack between the end parties. The VoIP implementation should enforce user authentication and not allow any unauthorized party to make free phone calls. Along with the aforementioned requirements, the convergence of voice and data networks only serves to exacerbate and magnify the security risks of today s prevalent cyber attacks. Successful attacks against a combined voice and data network can totally cripple the functioning of an enterprise, halt all communications required for productivity, or result in irate customers and lost revenue. Part of the inherent problem in protecting VoIP data networks is simply keeping the infrastructure completely up-to-date with patches for the latest vulnerabilities. The trend of shrinking vulnerability-to-exploit windows presents a daunting challenge for administrators trying to patch hundreds of servers and desktops. Because of availability concerns in a VoIP network, maintenance windows for normal upgrades and patching may be few and far between. Defense-in-depth strategies that include virtual patching are a necessity in defending an organization's VoIP data network. VoIP Building Blocks There are a variety of devices, protocols and configurations seen in typical VoIP deployments today. VoIP technology can be used to make calls between: a PC and a traditional phone, a PC and another PC, a traditional phone and another traditional phone (voice is packetized and travels over the IP network), a VoIP phone and another PC, and a traditional phone or VoIP phone. Copyright 2004 TippingPoint Technologies, Inc. All rights reserved. 3
4 The physical elements that are present in a typical VoIP deployment include: VoIP Telephone: The VoIP phone used by an end-user to make a telephone call. The phone is capable of converting voice into media data packets. The phone may also have advanced features like Web browsing, instant messaging and multi-media conferencing. Call Server: Software that runs on a dedicated server platform and offers the functionality of call control and call signaling. This is essentially porting the conventional functions of Private Branch Exchange (PBX) to a dedicated server. Gateway: The network device that connects the IP network and the carrier network such as ISDN or PSTN. Optional Elements: MultiPoint Control Units for conferencing, backend services for data tracking of call endpoints, authentication servers etc. There are currently three protocols widely used in VoIP implementations the H.323 family of protocols, the Session Initiation Protocol (SIP) and the Media Gateway Controller Protocol (MGCP). VoIP vendors are current selling solutions that can work with either of these families of protocols. H.323 Family of Protocols H.323 is a set of recommendations from the International Telecommunication Union (ITU) and consists of family of protocols that are used for call set-up, call termination, registration, authentication and other functions. These protocols are transported over TCP or UDP protocols. The following diagram shows the various H.323 protocols with their transport mechanisms: Figure 1: H.323 Protocol Family ii These protocols can be further sub-divided into two classes protocols used for call signaling (Q.931, H.225, H.245, H.235, RTCP) and the protocol that carry the compressed voice traffic (RTP). The following figure illustrates the typical set-up and voice data transfer using H.323 family of protocols. Copyright 2004 TippingPoint Technologies, Inc. All rights reserved. 4
5 Figure 2: H.323 Call Set-Up and Voice data Transfer iii SIP The Session Initiation Protocol (SIP) was defined by the Internet Engineering Task Force (IETF) for creating, modifying and terminating sessions between two or more participants. These sessions are not limited to VoIP calls. The SIP protocol is a text-based protocol similar to HTTP, and offers an alternative to the complex H.323 protocols. Due to its simpler nature, the protocol is becoming more popular than the H.323 family of protocols and will likely emerge as the dominant standard in coming years. A SIP deployment typically uses a proxy server to initiate calls on behalf of the endpoint (a user or VoIP phone), and a location server to track an end point s location. These figures illustrate a typical SIP-based call: Copyright 2004 TippingPoint Technologies, Inc. All rights reserved. 5
6 Figure 3 SIP Call Setup and Data Transfer iv A request is sent (SIP INVITE) to ESTABLISH a session 1 DNS Server DNS Query for the IP Address of the SIP Proxy of the 2 Destination Domain SIP Proxy 6 3 The INVITE is forwarded Media Transport The Location Service is queried to check that the destination IP address represents a valid registered device, and for its IP Address Location Service 4 SIP Proxy 5 The request is forwarded to the End-Device SIP IP Phone Figure 4: SIP Call in Progress Copyright 2004 TippingPoint Technologies, Inc. All rights reserved. 6
7 MGCP and MeGaCo/H.248 MGCP and Megaco/H.248 are control protocols designed to centrally manage Media Gateways deployed across a VoIP infrastructure. A Media Gateway executes commands sent by the centralized Media Gateway Controller (MGC) and is designed to convert data between PSTN to IP, PSTN to ATM, ATM to IP, and also IP to IP. MGCP and Megaco/H.248 provide mechanisms to interconnect with other VoIP networks, and also facilitate large-scale deployments of VoIP. MGCP and Megaco/H.248 can be used to set up, maintain and terminate calls between multiple endpoints, while monitoring all of the events and connections associated with those endpoints from the MGC. Figure 5: Media Gateway and Media Gateway Controller v VoIP Security Threat Scenarios A VoIP deployment faces a variety of threats from different networking layers, as well as from different areas of trust from within the network. For instance, an attacker can try to compromise a VoIP gateway, cause a denial-of-service attack to the Call Manager, exploit a vulnerability in a vendor s SIP protocol implementation or try to hijack VoIP calls through traditional TCP hijacking, UDP spoofing, or application manipulation. The attacks against a VoIP network can be best categorized as follows: Attacks against the underlying VoIP devices Operating System VoIP devices such as IP phones, Call Manager, Gateways, and Proxy servers inherit the same vulnerabilities of the operating system or firmware they run on top of. For instance, the Cisco Call Manager is typically installed on Windows 2000 and the Avaya Call Manager on Linux. There are hundreds of remotely Copyright 2004 TippingPoint Technologies, Inc. All rights reserved. 7
8 exploitable vulnerabilities in flavors of Windows and Linux operating systems for which there are numerous point-and-shoot exploits freely available for download on the Internet. No matter how secure an actual VoIP application happens to be, this becomes moot if the underlying operating system is compromised. The following are merely a few examples of historical issues with popular VoIP devices: The Cisco Call Manager is vulnerable to the same Windows buffer overflows that have emerged over the last few years (LSASS, Messenger, ASN.1, etc.) [2]. An attacker gaining control of a Call Manager or an IP phone may provide the necessary access to launch more sophisticated attacks against the entire VoIP network. Similarly, any denial of service vulnerability in the underlying Cisco IOS running on a Gateway device could potentially be exploited to disrupt the VoIP network. There is a variety of known denial of service vulnerabilities and corresponding public exploits for Cisco IOS. In a recent security study, an Avaya IP phone was rendered unusable by bombarding it with specific IP traffic [3]. Alcatel, Avaya and Cisco phones are reportedly vulnerable to a DoS that can be triggered by sending fragmented UDP packets, and TCP ACK flood [5]. Configuration Weaknesses in VoIP devices Many of the VoIP devices in their default configuration may have a variety of exposed TCP and UDP ports. The default services running on the open ports may be vulnerable to DoS, buffer overflows or weak passwords, which may result in compromising the VoIP devices. Many VoIP devices run Web servers for remote management purposes, which may be vulnerable to attacks ranging from information disclosure to buffer overflows. Multiple installations of the Cisco Call Manager that runs an IIS server were reportedly compromised by the Nimda and the Code Red worms [4]. If any of the open services are not configured with a password or a weak password, an attacker may acquire an unauthorized access to that device. This is a known vulnerability against the Cisco SIP-based phones telnet service [6]. The SNMP services offered by the devices may be vulnerable to reconnaissance attacks or buffer overflows. In a recent testing, valuable information was gathered from an Avaya IP phone by using SNMP queries with the public community name [3]. Many VoIP devices are configured to periodically download a configuration file from a server through TFTP or other mechanisms. An attacker could potentially divert or spoof this connection and trick the device into downloading a malicious configuration file instead. Copyright 2004 TippingPoint Technologies, Inc. All rights reserved. 8
9 IP Infrastructure Attacks The availability of VoIP services directly depends on the availability of the IP infrastructure it rides upon. Any DDoS attacks such as SYN floods or other traffic surge attacks that exhaust network resources (e.g. bandwidth, router connection table, etc.) could severely impact all VoIP communications. Even worms or zombie hosts scanning for other vulnerable servers could cause unintentional traffic surges and crater availability of these VoIP services. VoIP protocols all rely on TCP and UDP as transport mediums and hence also vulnerable to any low level attacks on these protocols such as session hijacking (TCP), malicious IP Fragmentation, spoofing (UDP), TCP RST window brute forcing, or a variety of IP protocol anomalies which may cause unpredictable behavior in some VoIP services. VoIP Protocol Implementation Vulnerabilities Functional protocol testing (also called fuzzing ) is a method of finding bugs and vulnerabilities by creating different types of packets for that protocol which contain data that pushes the protocol's specifications to the point of breaking them. These specially crafted anomalous packets are consequently sent to an application, operating system, or hardware device capable of processing that protocol, and the results are then monitored for any abnormal behavior (crash, resource consumption, etc.). Functional protocol testing has already led to a wide variety of Denial of Service and Buffer Overflow vulnerability discoveries in vendor implementations of VoIP products that use H.323 and SIP. Many of these vulnerabilities have been the direct result of focused VoIP research conducted by the University of Finland s PROTOS group [7], which specializes in the security testing of protocol implementations. The PROTOS group typically makes their tools available to the public, which means any script kiddie can download and run the tools necessary to crash vulnerable implementations. VoIP Application Level Attacks At the application level, there are a variety of VoIP specific attacks that can be performed to disrupt or manipulate service. Some of them include: Denial of Service: By spoofing his identity, an attacker may cause a denial-of-service in SIP-based VoIP networks by sending a CANCEL or BYE message to either of the communicating parties and end the call. Since SIP is UDP based, sending a spoofed ICMP port unreachable message to the calling party could also result in a DoS [8]. Copyright 2004 TippingPoint Technologies, Inc. All rights reserved. 9
10 Call Hijacking: An attacker can also spoof a SIP response, indicating to the caller that the called party has moved to a rogue SIP address, and hijack the call [8]. Resource Exhaustion: A potential DoS attack could starve the network of IP addresses by exhausting the IP addresses of a DHCP server in a VoIP network. Eavesdropping: An attacker with local access to the VoIP LAN may sniff the network traffic and decipher the voice conversations. A tool named VOMIT (voice over misconfigured internet telephones) can be downloaded to easily perform this attack. Message Integrity: The attacker may be able to conduct a man-in-themiddle attack and alter the original communication between two parties. Toll Fraud: An attacker can impersonate a valid user/ip phone and use the VoIP network for making free long distance calls. The Future of VoIP Security VoIP technology is still at the early stage of adoption, and attacks against deployments have been largely unheard of or undetected. As VoIP increases in popularity and numbers of consumers, so does the potential for harm from a cyber attack. The 2004 CSI/FBI computer crime and security survey states that Denial-of- Service attacks are now the most expensive problem for organizations, with insider network abuse ranked third. This does not bode well for ensuring availability of VoIP networks without a proactive way to detect and block these attacks. It will become easier for attackers to infect and control a large number of zombie bots by continuing to exploit the vulnerabilities in the widely deployed Windows and Linux platforms. It has been reported that the wildly successful strain of Agobot worms at one time had infected hundred of thousands of Windows systems, allowing groups of hackers to launch distributed attacks. A recent DDoS attack on Akamai s DNS infrastructure is estimated to have involved over 15,000 compromised zombie hosts worldwide [12]. Undoubtedly there are an abundance of vulnerabilities yet to be discovered in the implementations of other VoIP protocols such as H.245, H.235, H.248 through similar functional fuzzing techniques employed by the PROTOS group. It will be important to prevent these as-yet-undiscovered vulnerabilities from being exploited by enforcing selective conformance of VoIP protocols to their specifications and provide proactive zero-day protection. We can expect to see more VoIP application-level attacks occur as attackers become savvier to the technology and gain easier access to test the VoIP infrastructure as it becomes more prevalent across residential areas. It will be important to keep track of calls, devices, users, and sessions to enforce security policy and prevent abuse of the VoIP network. Copyright 2004 TippingPoint Technologies, Inc. All rights reserved. 10
11 VoIP and TippingPoint Much like firewalls in any IT infrastructure today, Intrusion Prevention technology will become a required component in any VoIP deployment. TippingPoint s UnityOne Intrusion Prevention System (IPS) offers a unique, total security and high performance solution for protecting VoIP deployments. The UnityOne IPS prevents DDoS floods, viruses, worms, buffer overflows and many other malicious attacks against the IP infrastructure and the VoIP devices. The IPS also examines the VoIP protocols at wire speed, and blocks any anomalies and application-level attacks. TippingPoint has established the VoIP Security Research Lab as a nerve center for breakthrough VoIP security testing. TippingPoint's industry-recognized security researchers work alongside VoIP vendors and customers in analyzing weaknesses in VoIP architectures, discovering new vulnerabilities through functional protocol testing, educating and training, as well as presenting research in trade magazines, security journals and conferences. The by-product of these research efforts ensures UnityOne IPS is able to protect against the latest VoIP vulnerabilities and attack techniques. To learn more about how TippingPoint can help prevent the onslaught of VoIP cyber threats mentioned in this paper, [email protected] or call Copyright 2004 TippingPoint Technologies, Inc. All rights reserved. 11
12 References [1] Recent ASN.1 Vulnerabilities [2] Cisco Call Manager Windows 2000 Workstation Service Buffer Overflow [3] Breaking Through IP Telephony [4] Cleaning Nimda Virus from Cisco Call Manager shtml [5] Miercom VoIP Security Assessment [6] Cisco IP Phones Compromise [7] Security Testing of Protocol Implementations at the University of Finland [8] Security Risk Factors in IP Telephony Based Networks [9] Vulnerabilities in Pingtel VoIP Phone (Call Hijack) (Null Password) [10] VocalTec DoS [11] CSI/FBI Computer Crime Survey [12] 'Zombie' PCs caused Web outage, Akamai says [13] RFC Media Gateway Control Protocol (MGCP) [14] Voice over IP i ii iii iv v Copyright 2004 TippingPoint Technologies, Inc. All rights reserved. 12
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems
Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems VOIP Components Common Threats How Threats are Used Future Trends Provides basic network connectivity and transport
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
IP Phone Security: Packet Filtering Protection Against Attacks. Introduction. Abstract. IP Phone Vulnerabliities
W H I T E P A P E R By Atul Verma Engineering Manager, IP Phone Solutions Communications Infrastructure and Voice Group [email protected] Introduction The advantages of a converged voice and data network are
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
Cconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
Conducting an IP Telephony Security Assessment
Conducting an IP Telephony Security Assessment Mark D. Collier Chief Technology Officer [email protected] www.securelogix.com Presentation Outline Ground rules and scope Discovery Security policy
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
White Paper. avaya.com 1. Table of Contents. Starting Points
White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Villains and Voice Over IP
Villains and Voice Over IP Heather Bonin ECE 578 March 7, 2004 Table of Contents Introduction... 3 How VOIP Works... 3 Ma Bell and her Babies... 3 VoIP: The New Baby on the Block... 3 Security Issues...
Multi-layered Security Solutions for VoIP Protection
Multi-layered Security Solutions for VoIP Protection Copyright 2005 internet Security Systems, Inc. All rights reserved worldwide Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper
ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network
ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and
Voice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
Modern Denial of Service Protection
Modern Denial of Service Protection What is a Denial of Service Attack? A Denial of Service (DoS) attack is generally defined as a network-based attack that disables one or more resources, such as a network
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
VoIP Security Methodology and Results. NGS Software Ltd
VoIP Security Methodology and Results NGS Software Ltd Barrie Dempster Senior Security Consultant [email protected] Agenda VoIP Security Issues Assessment Methodology Case Study: Asterisk VoIP Security
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
Deployment of Snort IDS in SIP based VoIP environments
Deployment of Snort IDS in SIP based VoIP environments Jiří Markl, Jaroslav Dočkal [email protected] K-209 Univerzita obrany Kounicova 65, 612 00 Brno Czech Republic Abstract This paper describes
Threat Mitigation for VoIP
Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities
VoIP: The Evolving Solution and the Evolving Threat. Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide
VoIP: The Evolving Solution and the Evolving Threat Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide VoIP: The Evolving Solution and the Evolving Threat An ISS Whitepaper 2
Voice over IP (VoIP) Basics for IT Technicians
Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com
PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure
VOIP Attacks On The Rise
VOIP Attacks On The Rise Voice over IP (VoIP) infrastructure has become more susceptible to cyber-attack due to the proliferation of both its use and the tools that can be used for malicious purposes.
Secure VoIP for optimal business communication
White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
Protect Yourself Against VoIP Hacking. Mark D. Collier Chief Technology Officer SecureLogix Corporation
Protect Yourself Against VoIP Hacking Mark D. Collier Chief Technology Officer SecureLogix Corporation What Will Be Covered How to assess the security of your IPT network: In house/external and ground
Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document
Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general
Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)
Overview Voice-over over-ip (VoIP) ENUM VoIP Introduction Basic PSTN Concepts and SS7 Old Private Telephony Solutions Internet Telephony and Services VoIP-PSTN Interoperability IP PBX Network Convergence
Security Guidance for Deploying IP Telephony Systems
Report Number: I332-016R-2005 Security Guidance for Deploying IP Telephony Systems Systems and Network Attack Center (SNAC) Released: 14 February 2006 Version 1.01 [email protected] ii This Page Intentionally
Network/Internet Forensic and Intrusion Log Analysis
Course Introduction Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of
2010 White Paper Series. Top Ten Security Issues Voice over IP (VoIP)
2010 White Paper Series Top Ten Security Issues Voice over IP (VoIP) Top Ten Security Issues with Voice over IP (VoIP) Voice over IP (VoIP), the use of the packet switched internet for telephony, has grown
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
Mitigating the Security Risks of Unified Communications
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Mitigating the Security Risks of Unified Communications Fernando Almeida 1 +, Jose
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
DoS/DDoS Attacks and Protection on VoIP/UC
DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
VOIP SECURITY ISSUES AND RECOMMENDATIONS
VOIP SECURITY ISSUES AND RECOMMENDATIONS Sathasivam Mathiyalakan MSIS Department, College of Management, University of Massachusetts Boston Phone: (617) 287 7881; Email: [email protected] ABSTRACT
VOIP TELEPHONY: CURRENT SECURITY ISSUES
VOIP TELEPHONY: CURRENT SECURITY ISSUES Authors: Valeriu IONESCU 1, Florin SMARANDA 2, Emil SOFRON 3 Keywords: VoIP, SIP, security University of Pitesti Abstract: Session Initiation Protocol (SIP) is the
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
Voice over IP (VoIP) Vulnerabilities
Voice over IP (VoIP) Vulnerabilities The Technical Presentation Diane Davidowicz NOAA Computer Incident Response Team N-CIRT [email protected] "Security problems in state of the art IP-Telephony
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call
Ingate Firewall/SIParator SIP Security for the Enterprise
Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...
Network Security: Introduction
Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has
Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
Denial of Service (DoS) Technical Primer
Denial of Service (DoS) Technical Primer Chris McNab Principal Consultant, Matta Security Limited [email protected] Topics Covered What is Denial of Service? Categories and types of Denial of
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
A1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Strategies to Keep Your VoIP Network Secure
V OIP NETWORK SECURITY VoIP enterprise deployments need strategies to help provide a balance between security and ease of use. Wesley Chou Strategies to Keep Your VoIP Network Secure A s VoIP technology
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
Just as the ecommerce companies have
Protecting IMS Networks From Attack Krishna Kurapati Krishna Kurapati is the founder and CTO of Sipera Systems (www.sipera.com), a company that specializes in security for VOIP, mobile and multimedia communications.
SECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Troubleshooting Voice Over IP with WireShark
Hands-On Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services are maintaining the quality of the voice service
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology
Voice Over Internet Protocol (VOIP) SECURITY Rick Kuhn Computer Security Division National Institute of Standards and Technology What is VOIP? Voice Over Internet Protocol Voice Communications over data-style
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
Convergence Technologies Professional (CTP) Course 1: Data Networking
Convergence Technologies Professional (CTP) Course 1: Data Networking The Data Networking course teaches you the fundamentals of networking. Through hands-on training, you will learn the vendor-independent
IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow
IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication
Hands on VoIP. Content. Tel +44 (0) 845 057 0176 [email protected]. Introduction
Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
VoIP Time to Make the Call? Abstract
VoIP Time to Make the Call? By Steve Sullivan Abstract Is it time to make the call and join the growing numbers of companies that are embracing Voice over IP technologies? Even though VoIP is a relatively
CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE
CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE Due to the encouraging feedback this series of articles has received, we decided to explore yet another type of cyber intrusionthe Man In The Middle (MITM)
Voice Over IP and Firewalls
Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Use of Voice Over IP (VoIP) in enterprises is becoming more and more
E-BUSINESS THREATS AND SOLUTIONS
E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were
Safeguards Against Denial of Service Attacks for IP Phones
W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)
Frequent Denial of Service Attacks
Frequent Denial of Service Attacks Aditya Vutukuri Science Department University of Auckland E-mail:[email protected] Abstract Denial of Service is a well known term in network security world as
