An Investigation into the Effect of Security on Performance in a VoIP Network
|
|
|
- Daniella Johnson
- 10 years ago
- Views:
Transcription
1 Abstract An Investigation into the Effect of Security on Performance in a VoIP Network Muhammad Tayyab Ashraf, John N. Davies and Vic Grout Centre for Applied Internet Research (CAIR) Glyndŵr University, University of Wales, Wrexham, UK s @stu.newi.ac.uk,{j.n.davies v.grout}@glyndŵr.ac.uk Voice over Internet Protocol (VoIP) is a communications technology that transmits voice over packet switched networks such as the Internet. VoIP has been widely adopted by home and business customers. When adding security to a VoIP system, the quality of service and performance of the system are at risk. This study has two main objectives, firstly it illustrates suitable methods to secure the signalling and voice traffic within a VoIP system, secondly it evaluates the performance of a VoIP system after implementing different security methods. This study is carried out on a pilot system using an asterisk based SIP (Session initiation Protocol) server (Asterisk, 2009). Since VoIP is intended for use over the Internet, VPNs (Virtual Private Networks) have been used in a tunnel configuration to provide the service. Additionally the performance of networks level IPSec (Internet Protocol Security) and application level ZRTP (Zimmerman Real Time Transport Protocol) security have been compared with no security. Registration, call setup and voice transmission packets have been captured and analysed. The results have then been extrapolated to the Internet. Keywords Voice over IP, Quality of voice, Soft-phones, Asterisk open source PBX software, MOS, SIP, RTP 1. Introduction VoIP (Voice over Internet Protocol) is a technology used to transmit voice conversations using the IP (Internet Protocol) over a network using packets of data. The data network can be an Intranet or more likely the Internet and so has changed the strategy adopted by telecommunication managers. It is therefore one of the highest growth areas. Due to the convergence of communications technologies into IP, companies are investing more and more time and money into researching this technology area so that legacy telephone systems can be replaced. The aim of the conversion is to reduce the costs to home and business users by standardization of the network infrastructure. Most houses and business these days have continual use of the Internet and have sufficient bandwidth via broadband services to make it feasible to use for voice calls. The popularity of VoIP is increasing rapidly due to cheap calls worldwide. Skype the free VoIP provider has registered 400 million user accounts at the end of It is now expected that there will be 56 million active VoIP users around the globe by the end of 2009 (Heywood, 2009).
2 Pots (the Plain old telephone system) uses the PSTN (Public Switch Telephone Network) to support communications and utilizes circuit switching. A dedicated point to point circuit is established between the caller and the receiver in order to make a call and this circuit remains dedicated until the end of the conversation. During a call, no other network traffic can use those allocated switch channels. Figure 1 Components of a VoIP system On the other hand data networks utilize packet switching and so a dedicated circuit does not exist, a virtual circuit is created, making the network much more efficient. Voice information is sampled and converted to digital form before being assembled into packets which are transmitted over the IP network. Each data packet contains the source and destination IP address and is routed to the destination using the level 3 routing mechanism prescribed in the network. At the destination these packets are then disassembled and played to the user as seen in Figure 1. Since VoIP is based on computer systems it is vulnerable to security attacks in the same way as any other computer system. There are many ways in which the security of a VoIP system can be exploited. (Benini and Sicari, 2008) As far as the call process is concerned there are three main areas that can be exploited, call setup, voice conversation and the termination of the call. Security mechanisms can be applied to the call setup process as well as the voice transmission to reinforce identification and authentication mechanisms. To protect the information transmitted some techniques employ encryption algorithms or apply cryptographic functions to the packet payload. Unfortunately this can have an adverse effect on the network since it introduces delay, jitter and lost packets into the overall network. The stronger the algorithm the greater the level of security and the greater the corresponding effect on the network. Clearly this can affect the end to end QOS (quality of service) to the user and so it is important for network designers to have some guidelines. This paper investigates security problems that exist and possible techniques that can be used to protect the system from them. In particular it concentrates on two techniques, the use of a VPN (Virtual Private Network) using the level 3 protocol IPSec, (Phifer, 2001) and the use of application level protection using ZRTP (Zimmerman Real Time Transport Protocol) (Zimmermann et al., 2009) to provide the security. Measurements are then made on a pilot network and comparisons are made with measurements taken on the same network without a security technique applied. These results are then scaled up to identify the typical numbers that are safe to use in the Internet. Figure 2 shows applications of VPNs.
3 2. Background to VoIP Security Figure 2 Typical usage of VPNs Before looking at the issues associated with VoIP security it is worthwhile having a brief look at the non VoIP Systems i.e. the existing POTS since this is an indication of the basic problems that need to be addressed Threats and Attacks in a Non VoIP System (PSTN) The public switched telephone network is also susceptible to many threats and attacks the major being toll fraud, wire tapping and attacks on modems Toll Fraud In toll fraud the attackers can place a standard call and use Dual Tone Multi- Frequency (DTMF) tones to access and manipulate PBXs, Interactive Voice Response (IVRs), Automatic Call Distribution (ACDs), and other systems in order to eliminate the cost of long-distance calls. By war dialling, attackers find lines and codes that provide a second dial tone, which they use to commit toll fraud. Since VoIP uses a different signalling system then this technique is rendered redundant Wire Tapping Wire tapping is the monitoring or interception of a telephone conversation by physically accessing the telephone wire. Depending on the laws of the country getting caught doing this can be a very serious crime. Generally this has to be carried out with inside knowledge but is very simple to carry out since once the circuit has been identified then an earpiece can give access to the whole conversation. Since the voice conversation in VoIP is transmitted in packets then this process is made much more difficult Attacks on Modems Dialup modems are still used in many networks usually as backup systems to be used in fault conditions in networks. Remote users attempt to gain access to computer system by dialing the modem. If precautions are not taken to secure the modem then the system becomes vulnerable to attack. VoIP makes this technique redundant
4 2.2. Threats and Attacks in a VoIP System As with many of the security issues associated with computer systems the reason for carrying this out is either to gain advantage - e.g. money or information, at other times it is carried out as a challenge. Fortunately due to the techniques used by VoIP there is a certain amount of built in security Spoofing This type of attack can be best described as the man in the middle attack (Porter & Gough, 2007). Unauthorized persons or a program spoofs or pretends to be someone they are not with the aim of toll fraud, gaining access to messages and obtaining useful information such as bank details, PIN numbers etc. Call forwarding is a feature of forwarding incoming calls from one phone and can also be targeted by attackers. VoIP service elements - e.g. SIP proxy - and can be accessed and the configuration to route the calls on different numbers changed in an attempt to commit toll fraud Interception or Eavesdropping Even though VoIP Networks transmit voice packets without encryption it is not simple to listen to telephone conversations. For this type of attack the unauthorized person must be between the two end users otherwise it is not possible for a hacker to capture the traffic. An unauthorized person with a packet sniffer could capture the VoIP packets but having captured the data then the process of interpreting the data is not simple. Initially it is necessary to select the correct packets and match them up with packets travelling in the opposite direction, which could be taking a different route. Due to the compression techniques normally used the data would have to be played through the appropriate codec for this to be intelligible. The purpose is to obtain user identity, SIP phone numbers and PIN (Gold, 2009) Denial of Service DoS use two types of attacks to collapse the entire VoIP system. The first is by sending the distorted or damaged packets to crash the VoIP system and the other is by sending a flood of well formed packets to exhaust the resources. DoS attacks can occur at two layers of the OSI model either on the application layer or transport layer. At the application layer, DoS attacks by sending a flood of call invitations or by sending registration requests at the signalling channel and if this attack is on the media cannel then DoS attack floods large volumes of call data which consumes large amounts of bandwidth. In both the cases the genuine users are unable to make calls (Chen, 2006) Spam over VoIP VoIP is vulnerable to spam also known as SPIT, (spam over Internet telephony) (Ahson & Ilyas, 2009). This type of spam attack can also disable the whole VoIP system. Not only does the VoIP user receive a lot of unwanted calls every day but also VoIP spam can attack the gateway and degrade the quality of voice.
5 2.3. Security Methods There are techniques that can be applied to address the various attacks described in section 2.2. For Pots the methods adopted require the addition of equipment e.g. firewalls and Secure Terminal Equipment which all involve extra cost. However the solutions for VoIP involve either the reconfiguration of equipment used to protect the data network or the use of different protocols or applications which generally do not cost money but cost in terms of performance (Dantu et al., 2009). 3. VoIP Security Process As with the standard circuit switching process of the PSTN, VoIP also has a three phase approach. Call setup, transmission of the voice information and breakdown of the call VoIP Registration and Call Setup Security issues associated with call setup are twofold - to gain free calls and to block the system to prevent other users from using the network. The same concerns apply to call breakdown (hang up). Before a VoIP call can be established it is necessary to register with the PBX i.e. this registration process ensures that the user is connected to the network available to make or accept calls. Generally this process is protected by passwords and can be limited to specific addresses (MAC and or IP addresses). The users normally register with the PBX as part of the start up process of the application on the client machine. The dominant protocol for VoIP networks to set up calls is the Session Initiation Protocol (SIP) developed by the IETF (Internet Engineering Task Force) RFC It is a text-based protocol and is similar to HTTP which is used in Web services. SIP supports both UDP and TCP transport layer protocols but UDP is dominant due to the reduced overhead (Rescorla, 2004). A number of protocols can be used to provide integrity, confidentiality and authentication of SIP signalling messages. These protocols include the use of IPSec, TLS, S/MIME, DTLS and HTTP digest authentication. The selection and adopting of the security protocol is normally dependant on the ease of use and scalability of the implementation. HTTP digest authentication is the simplest method where a message digest key or hash function is used as a digest authentication to protect the shared secret key during the SIP session negotiation (Johnston, 2004). The IPSec protocol is widely used particularly in a SIP environment since it gives protection to applications that use UDP or TCP. It can be used in transport mode or in tunnel mode to secure the payload. The way that IPSec is used in this investigation is to create secure tunnels between the end devices in order to provide integrity, confidentiality and authentication for signalling and media messages. (Johnston & Piscitello, 2006)
6 3.2. Transfer of Voice Traffic In the UK it is illegal to listen to private conversations; specifically it is unlawful to listen to conversations of people who use either PSTN phones or VoIP phones to make calls. Though it is difficult for a person to capture and interpret the voice packets from the Internet it cannot be completely ignored. The standard media protocol which is used to exchange voice streams is Real time Transport Protocol (RTP) (Schulzrinne, et al., 2003) VPN and IPSec A Virtual Private Network (VPN) is defined as network connectivity deployed on a shared infrastructure with the same policies and security as a private network. It is possible to create a tunnel over a standard IP network (Internet) that supports multiple protocols and therefore extend the security of the private network to remote offices or telecommuters. The VPN is configured between two networks or end systems providing confidentiality via encryption, data integrity to ensure the data has not been altered and authentication to certify the source of the information (Figure 3). Figure 3 The use of VPN with IPSec It is possible to implement VPN protection at different layers. When one layer is encrypted, then by definition all layers above it are protected so network layer protection has become the most popular level to apply cryptographic protection to network traffic. The IP Security Protocol (IPSec) is the most commonly used protocol at level 3 that provides this functionality so this paper concentrates on this (Cisco, 2007) Application Level Protection Since it is possible to provide protection at the application layer and there is no real standard to do a comparison on the performance it was decided to choose a typical application, Zfone. This uses ZRTP (Zimmermin RTP) messages which are embedded into RTP packets as added extensions ignored by an end-point unless it supports ZRTP. It utilises the Diffie-Hellman key exchange mechanism to derive a common key between two communicating parties. The key exchange occurs after the signalling has taken place (SIP and SDP). This solution is provided by the specific VoIP application that sits on top of the TCP/IP stack. Whenever a new VoIP call is negotiated, the application negotiates a new encryption key between the parties and then encrypts the VoIP packets on the fly.
7 Methods to secure Network for VoIP In order to make the secure VoIP system, the surrounding network environment should also be protected by using the techniques normally employed in data networks. Segmentation of entire VoIP networks plays a vital role in controlling the traffic between the different components of a VoIP system. The same techniques used in the data network can be employed. This segmentation of the network can be done physically or logically depending upon the requirement. The traffic can be filtered with the use of different network elements such as routers, switches and firewalls. Private IP addressing schemes also provide security to the VoIP network from external attacks. A Network Address Translator (NAT) server which maps the internal private IP addresses to the public IP addresses in order to route the traffic to the outside world can be used. VoIP firewalls are also used to protect the system from the attackers by filtering the inbound and outbound traffic. Policies are made for the whole VoIP traffic and implemented in the firewalls. There are two types of intrusion detection systems which are used to prevent intrusion, signature based and anomaly based ID systems. Signature based IDS checks the individual packets and matches them with the known signatures to identify the malicious attack. Anomaly based IDS analyze the combined streams of network traffic and performs pattern matching based on predefined traffic heuristics to identify the attacks. The IDS is typically configured to look for a specific function in a protocol e.g. UDP, TCP, and HTTP (Palmieri, 2009). 4. Performance of VoIP System The Quality of Service provided to the end user is of upmost importance and one of the main issues for the implementation of VoIP system, since if the conversation is unintelligible then there is no point in providing the service. The main factors that affect the quality of service are Latency, Jitter and Packet loss 4.1. Latency This is the delay for packet delivery from source to destination and is a general problem in all telecommunication networks. In VoIP latency depends upon the delays created by encoding, packet production, physical network and routing delays, play back and decoding. Encoding delay depends upon the codec used to encode the voice signal. Packet creation delay is the time it takes to create the RTP packets from the encoded voice stream. Network delay is the sum of propagation, transmission and queuing delay. Playback delay is a result of the playback buffer on the receiver side and the decoding delay is the time the system takes to reconstruct the original voice signal. The recommended value for total delay by ITU (International Telecommunication Union) for good quality is 150ms from source to destination. The delay is acceptable from ms. If delay is greater than 300ms then it must be reduced.
8 4.2. Jitter Jitter is the variation in delay for packet delivery and occurs due to improper queuing and network congestion. The information is broken down into packets and then these packets travel from source to destination, maybe by different paths. The arrival of these packets varies depending on network utilisation. The acceptable value of jitter for good voice quality is 20-50ms. If the value of jitter is greater than 50ms then the quality of voice will be poor Packet Loss Packet loss occurs due to many factors but the usual cause is network congestion. The transport level preferred by most VoIP networks is UDP (user datagram protocol) which is a connectionless protocol and so lost packets are a feature of the protocol since packets will not be retransmitted. Similarly if a packet is not received on time then it will be discarded by the VoIP application Effect of Security on VoIP Performance Methods for securing the VoIP system discussed previously are all likely to affect the performance by increasing the latency, jitter and/or packet loss. Encryption algorithms apply cryptographic functions to the packets and introduce delay for the encryption and decryption of voice packets, the stronger the algorithm the greater delay. Security mechanisms also increase call setup delay due to the identification and authentication mechanisms. Security mechanisms can also increase delay and jitter during the call when the VoIP packets pass through them. IPSec security is implemented in the routers to provide the secure tunnel for traffic between the end users. Similarly other security protocols such as ZRTP, SRTP and TLS also induce delay in packets. It is necessary to investigate the overall affect of these on the system. 5. Investigation & Analysis The investigation was carried out by implementing a pilot network using the same equipment and conditions so that a comparison could be made with some level of confidence in the result. Three tests were chosen including VoIP without security, with IPSec security and with ZRTP protocol. These tests were carried out to analyze the effect of security on the quality of voice. The network was designed using an Asterisk SIP server to handle the SIP calls. The X-Lite (X-lite, 2009) softphone application was configured on desktop computers with speakers and headphones for initiating and receiving the calls. The Wireshark application was installed on a separate computer to capture the voice and signalling packets passing through the network. Cisco routers and hubs are used in this network. The routers are connected to each other via fast Ethernet cable.
9 5.1. Scenarios Figure 5 Network Design for VoIP Implementation In the first scenario the quality of voice was checked by measuring the delay and jitter without implementing the security. Device A is local to the Asterisk PBX server and device B is remote - i.e. separated by routers. All the SIP and RTP traffic will pass through the routers insecurely. Wireshark was placed local to the Asterisk server to capture all the VoIP signalling and voice traffic. This enabled the delay and jitter to be analysed offline. Then in scenario two VPN with IPSec security tunnels were implemented on the routers. All the signalling and voice traffic initiated by the end devices and Asterisk servers were encrypted and decrypted by the routers (Figure 6). In scenario three, security is provided at the application level using the ZRTP application layer protocol was used provide end to end encryption to secure the VoIP traffic. The Zphone utility was used for the implementation of ZRTP on the local and remote devices for end to end encryption Analysis As discussed in Section 3 results were taken for the registration process, call setup and the transmission on the voice traffic to ensure that there is no adverse affect on one phase more than the other. Packets were captured using Wireshark and then exported into a spreadsheet to enable offline analysis to be carried out. For the voice traffic captures were taken over a period of several minutes and so a histogram was made of the results Registration Process The first step in the process is for the X-lite clients to register the user with the Asterisk server. The graph shown in Figure 6 is the representation of the SIP traffic which is initiated by the devices for the registration with Asterisk SIP server. It can be seen from Figure 6 that for the remote client to register in an unsecured VPN setup there is a sharp peak around 0.005msecs whereas with IPSec security employed then a delay is introduced and with ZRTP due to the processing required by the client machine the overall time is larger than the unsecured. Even so the whole process only occurs on the start up of the application and lasts for a maximum of 0.038msec so it is not going to have any significant effect on the network.
10 Call Setup Figure 6 Comparison of Registration Process for Remote Client Figure 7 shows the comparison graph for call setup process from remote the VoIP device to the local VoIP device using SIP. The graph is same for both unsecured and ZRTP. The unsecured packets have been sent in a time of 0.05ms and with a delay of 4ms. The same number of average packets has been sent with IPSec security but this shows a time of 1ms but with an increased spread and one packet experienced a delay of 7ms indicating that IPSec increases the length of time taken for the setup. Figure 7: Comparison of Call setup times Again this is not really significant since the call setup only takes place once at the beginning of the call and the worse case time is 7 msecs. The process is initiated by the user and so in human terms it would not be noticed Voice Traffic between End Devices A & B Figure 8 shows the comparison graph for RTP traffic between local and remote VoIP clients. The percentage difference, based on average times for packets between unsecure and IPSec, is 13% and, between Unsecure and ZRTP, is 11%. Figure 8: Comparison of Voice Traffic
11 Delay & Jitter in RTP Streams Calculations can be made from the graph shown in Figure 8 which can be supported by the information provided by Wireshark in summary Table 1. RTP Traffic Average Delay Average Jitter Standard Deviation Min Jitter Max Jitter Total Jitter Unsecure A - B B - A (ms) IPSec A - B B - A (ms) ZRTP A - B B - A (ms) Table 1 Average Delay & Jitter between Local & Remote Extrapolation from Results Based on the results obtained in Section 6.4 calculations can be carried out to investigate the effect that this might have on the use of this type of security through the Internet. These can be seen in Table 2. From previous measurements with the use of the Traceroute utility it has been found that a typical number of routers that are passed through when accessing a web-server on the Internet is 5 and so this has been used as a limit. No. of Routers No. of Users Delay (ms) Jitter (Unsecure) Jitter (IPSec) Jitter (ZRTP) Performance Excellent V. Good Good Fair Poor Table 2 Effect of Users & Routers on the Performance Values for delay and jitter recommended by the ITU for good quality have been used to provide a range of performance grades from excellent to poor in Table 2.
12 Delay < 150ms >150ms < 300ms > 300ms Jitter < 20ms > 20ms < 50ms > 50ms Packet Loss < 1% > 1% < 5 % > 5 % Performance Excellent Good Poor 6. Conclusion Table 3 ITU Recommended Values for VoIP Quality When compared to the plain old telephone system VoIP is quite a secure service which justifies the integration with the data network. However there are issues that need to be addressed to improve the overall security of the network and the VoIP service. Since the use of Virtual Private Networks can run on public and private networks it is a good strategy to adopt to improve the security of the service when passed over the Internet is a very good strategy to adopt despite the usability and performance issues. Usability is not always straightforward when adopting a VPN strategy since there are many options available and they require varying levels of skills for the user. However by adopting a protocol like IPSec at the network layer has the advantage that it will protect any application. Having investigated the performance issues with VPN, the signalling i.e. registration, call setup and call breakdown are insignificant in overall times of the call. But when VPN used in even in an unsecured manner this will have an effect on the network performance on the voice traffic transmitted and hence the QoS experienced by the end to end users. Based on the calculations for a network with 10 users using VoIP run on low end routers implemented on a 100Mbps LAN to get a good QoS the network should be limited to a maximum transit through 5 routers based on the ITU recommended value for delay and jitter. When securing the network with IPSec over the VPN then the percentage difference for average jitter between unsecured and IPSec is 4% due to the overheads encountered in the routers. If security is carried out at the application layer using a specialized application which utilises a protocol like ZRTP the percentage difference when compared to an unsecured VPN is 2.2% Future Enhancement In this study DES encryption standard and pre-shared keys have been used during the implementation of IPSec. Many other encryption standards i.e. 3DES, AES, RSA, hash algorithms are available with IPSec which could have been used to change the level of security used. Two operation modes of IPSec can be used i.e. transport mode and tunnel mode. Only the tunnel mode was used in this study. The transport mode
13 of IPSec could be used in future to secure & analyse the traffic. It is hoped that Asterisk will be available with ZRTP support in future which could be used to analyse the data when the signalling is secured and voice traffic of VoIP. It is anticipated that support for security at other levels e.g. TLS (Transport Layer Security) which provides strong authentication, integrity and message privacy will arrive in new versions of PBX and IP phones. The use of SRTP (Secure RTP) that provides security to RTP streams only and doesn t secure the SIP signalling traffic could also be investigated. SRTP could be used with IPSec to provide the end to end results. 7. References Ahson, Syed A. & Mohammad Ilyas, (2009) VoIP Handbook, CRC Press, 2009 pp.372 Asterisk (2009) accessed at 04/04/2009. Benini M, Sicari S, (2008) Assessing the risk of intercepting VoIP calls Computer Networks 52 (2008) Chen, E. Y. (2006), Detecting DoS attacks on SIP systems, 1st IEEE Workshop on VoIP Management and Security, 2006, pp Cisco Networking Academy (2007), CCNP 2: Remote Access Module, Chapter 13 Virtual private Networks Dantu R, Fahmy S, Schulzrinne H, Cangussu J, (2009), Issues and challenges in securing VoIP, Computers & Security Vol 28 (2009) 1 11 Gold S. (2009), European Union to investigate Internet telephony eavesdropping, Infosecurity Europe 2009 Heywood, T. (2009) A Brief History of VoIP, ezinearticles.com/?a-brief-history-of- VOIP&id= Johnston, A. B. (2004), SIP: Understanding the Session Initiation Protocol, 2nd Ed., Artech House Telecommunications Library. Johnston, A. B. & David M. Piscitello(2006), Understand VOIP security,, Artech House, 2006 pp.103- pp.107 Palmieri F, Fiore U, (2009), Providing true end-to-end security in converged voice over IP infrastructures, Computers & Security 28 (2009) Phifer, L. (2001), VPNs: Virtually Anything? A Core Competence Industry Report, Porter, T. & Gough, M., (2007) VoIP Security, by Syngress Publishing, Inc., 2007 pp. 58, 81 Rescorla, E, and Modadugu N (2004), Datagram Transport Layer Security, June 2004, IETF Internet-Draft, Schulzrinne H, Casner S, Frederick R, and Jacobson V (2003), RTP: a transport protocol for realtime applications, IETF, RFC X-lite(2009) Zimmermann, P. Johnston A. and Callas J, (2009), Internet Draft to the IETF for the ZRTP
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
CPNI VIEWPOINT 03/2007 HOSTED VOICE OVER IP
HOSTED VOICE OVER IP AUGUST 2007 Abstract Voice over IP (VoIP) is the term used for a set of technologies that enable real time voice or video conversations to take place across IP networks. VoIP devices
Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080
Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Voice Over IP and Firewalls
Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Use of Voice Over IP (VoIP) in enterprises is becoming more and more
Voice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and
Indepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
VegaStream Information Note Considerations for a VoIP installation
VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
SIP Trunking and Voice over IP
SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential
Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology
Voice Over Internet Protocol (VOIP) SECURITY Rick Kuhn Computer Security Division National Institute of Standards and Technology What is VOIP? Voice Over Internet Protocol Voice Communications over data-style
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Voice over IP (VoIP) Basics for IT Technicians
Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides
ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.
ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. API: An application programming interface (API) is a source
Overview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
VOIP TELEPHONY: CURRENT SECURITY ISSUES
VOIP TELEPHONY: CURRENT SECURITY ISSUES Authors: Valeriu IONESCU 1, Florin SMARANDA 2, Emil SOFRON 3 Keywords: VoIP, SIP, security University of Pitesti Abstract: Session Initiation Protocol (SIP) is the
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
Service Provider implementation of SIP regarding security Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
Application Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents
Title Six Steps To Getting Your Network Ready For Voice Over IP Date January 2005 Overview This provides enterprise network managers with a six step methodology, including predeployment testing and network
Secure VoIP Transmission through VPN Utilization
Secure VoIP Transmission through VPN Utilization Prashant Khobragade Department of Computer Science & Engineering RGCER Nagpur, India [email protected] Disha Gupta Department of Computer Science
nexvortex SIP Trunking Implementation & Planning Guide V1.5
nexvortex SIP Trunking Implementation & Planning Guide V1.5 510 S PRING S TREET H ERNDON VA 20170 +1 855.639.8888 Introduction Welcome to nexvortex! This document is intended for nexvortex Customers and
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
VoIP Security Threats and Vulnerabilities
Abstract VoIP Security Threats and Vulnerabilities S.M.A.Rizvi and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, UK e-mail: [email protected] This paper presents the
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using
How To Understand The Differences Between A Fax And A Fax On A G3 Network
The Fax on IP Networks White Paper February 2011 2 The Fax on IP Networks Contents Overview... 3 Group 3 Fax Technology... 4 G.711 Fax Pass-Through... 5 T.38 IP Fax Relay... 6 Network Design Considerations...
Skype Connect Requirements Guide
Skype Connect Requirements Guide Version 4.0 Copyright Skype Limited 2011 Thinking about implementing Skype Connect? Read this guide first. Skype Connect provides connectivity between your business and
SIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Course 4: IP Telephony and VoIP
Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.
Title Series Managing IP Centrex & Hosted PBX Services Date July 2004 VoIP Performance Management Contents Introduction... 1 Quality Management & IP Centrex Service... 2 The New VoIP Performance Management
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
WHITE PAPER. Testing Voice over IP (VolP) Networks
WHITE PAPER Testing Voice over IP (VolP) Networks www.ixiacom.com P/N 915-1767-01 Rev B January 2014 2 Table of Contents VoIP Voice over IP... 4 VoIP Benefits... 4 VoIP Challenges... 4 Network requirements
SIP Trunking with Microsoft Office Communication Server 2007 R2
SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
Curso de Telefonía IP para el MTC. Sesión 2 Requerimientos principales. Mg. Antonio Ocampo Zúñiga
Curso de Telefonía IP para el MTC Sesión 2 Requerimientos principales Mg. Antonio Ocampo Zúñiga Factors Affecting Audio Clarity Fidelity: Audio accuracy or quality Echo: Usually due to impedance mismatch
IP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems
Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems VOIP Components Common Threats How Threats are Used Future Trends Provides basic network connectivity and transport
Hands on VoIP. Content. Tel +44 (0) 845 057 0176 [email protected]. Introduction
Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice
Voice over IP Security
Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Voice over IP (VoIP) Vulnerabilities
Voice over IP (VoIP) Vulnerabilities The Technical Presentation Diane Davidowicz NOAA Computer Incident Response Team N-CIRT [email protected] "Security problems in state of the art IP-Telephony
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document
Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general
Goal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP?
Goal We want to know Introduction What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP? VoIP Challenges 2 Carrier Grade VoIP Carrier grade Extremely high availability 99.999% reliability (high
Need for Signaling and Call Control
Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications Small businesses will find this booklet useful for learning how VoIP works and for clarifying
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
SIP Trunking The Provider s Perspective
SIP Trunking The Provider s Perspective Presented by Pete Sandstrom, CTO BandTel Advanced SIP Session Overview 1. Open Systems Interconnection Model (OSI) is more than a model 2. Quality of Service (QoS)
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Agilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402
Agilent Technologies Performing Pre-VoIP Network Assessments Application Note 1402 Issues with VoIP Network Performance Voice is more than just an IP network application. It is a fundamental business and
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
Implementing VoIP support in a VSAT network based on SoftSwitch integration
Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.
Voice over IP (VoIP) for Telephony. Advantages of VoIP Migration for SMBs BLACK BOX. 724-746-5500 blackbox.com
Voice over IP (VoIP) for Telephony Advantages of VoIP Migration for SMBs BLACK BOX Hybrid PBX VoIP Gateways SIP Phones Headsets 724-746-5500 blackbox.com Table of Contents Introduction...3 About Voice
Functional Specifications Document
Functional Specifications Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:19-10-2007
VoIP Analysis Fundamentals with Wireshark. Phill Shade (Forensic Engineer Merlion s Keep Consulting)
VoIP Analysis Fundamentals with Wireshark Phill Shade (Forensic Engineer Merlion s Keep Consulting) 1 Phillip D. Shade (Phill) [email protected] Phillip D. Shade is the founder of Merlion s Keep Consulting,
VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009
VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 "It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed,
Voice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
Frequently Asked Questions about Integrated Access
Frequently Asked Questions about Integrated Access Phone Service How are local, long distance, and international calls defined? Local access transport areas (LATAs) are geographical boundaries set by the
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
Reliability of VoIP Phone Systems
Subtitle Reliability of VoIP Phone Systems Can You Trust VoIP? Reliability of VoIP Phone Systems Compare Business Products 2014 1 Contents Reliability of VoIP Business Phone Systems... 3 VoIP Technology
Cconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
How to choose the right IP gateway for your VoIP migration strategy. Deployment note
How to choose the right IP gateway for your VoIP migration strategy Deployment note Introduction The purpose of this document is to understand the role a TDM to IP gateway has in providing a migration
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
