A VoIP Traffic Monitoring System based on NetFlow v9
|
|
|
- Lenard Perry
- 10 years ago
- Views:
Transcription
1 A VoIP Traffic Monitoring System based on NetFlow v9 Chang-Yong Lee *1, Hwan-Kuk Kim, Kyoung-Hee Ko, Jeong-Wook Kim, Hyun- Cheol Jeong Korea Information Security Agency, Seoul, Korea {chylee, rinyfeel, khko, kjw, Abstract With the development of VoIP (Voice over IP) service, new security threats are expected to be appeared. However, existing IP network security solutions can not detect new VoIP specified network threats because they can not reflect characteristics of VoIP. In this paper, we propose a novel system that can monitor VoIP service and detect VoIP network threats practically. The proposed system collects attributes of VoIP traffic based on NetFlow, and executes monitoring and detecting based on statistic and behavior. 1. Introduction VoIP allows users to perform voice communication using IP network. With some advantages, low cost and providing various extra services, VoIP service has become so popular, and is considered as a business with good prospects. Worldwide VoIP market is expected to be extended over 5 times from current scale until With this development, VoIP is considered to be the alternation for current PSTN (Public Switched Telephone Network) in the near future. However, new security threats are expected to be appeared with the new service. Basically, it is implemented over IP network, and it inherits every security threats of IP network. In addition, appearance of new security threats specified by VoIP characteristic is forecasted. Currently, most of VoIP service use SIP (Session Initiation Protocol) [1] for call set up, and use RTP (Real-time Transport Protocol) [2] for media transportation. Therefore, various security threats using characteristics of SIP and RTP are prospected to be appeared. DoS, scan and some other existing IP based network attacks can be detected and prevented by the existing network security solutions (e.g. firewall, IPS (Intrusion Prevention System)). Generally, they use 5-tuple information (source IP/port, destination IP/port, protocol) inside of IP headers. However, this way of measure is not appropriate to VoIP s case. SIP protocol uses an additional identifier, URI (uniform resource identifier), for user identification and application header is located in a payload of IP packet. Therefore, with existing solutions that check only IP headers, it is impossible to account SIP/RTP traffic. Therefore, a new system is required to recognize, measure and analyze SIP/RTP traffic. In this paper, we propose a structure of a system for monitoring, analyzing and detecting SIPbased VoIP service traffic anomaly. The proposed system collects SIP/RTP traffic information based on NetFlow, executes monitoring VoIP traffic and detects VoIP abnormal traffic by analyzing collected information. *Corresponding author 1 This work was supported by the IT R&D program of MKE/IITA. [2008-S , The Development of SIP-Aware Intrusion Prevention Technique for protecting SIPbase application Services] 1
2 The remainder of this paper is organized as follow. In Section 2, we give related work. In Section 3, we describe VoIP network threat model. In Section 4 and 5, we describe the proposed system and rules for detection. We conclude the paper in Section Related Work 2.1 NetFlow IP flow is defined as a union of IP packets those have same source IP address/port, destination IP address/port, protocol information. If new arrival packet s attribute is not found from a flow table, a new flow will be generated. On the other hand, if it is found, only corresponding flow s attribute (e.g. packets count, bytes, last update time, etc.) will be updated. With this process, only a flow table is maintained until time out, and after the time out, the flows in the table are sent to a flow collector. Due to it doesn t have to maintain whole packets, it can save disk space and system resource. So, a lot of network devices use flow based traffic account to monitor and manage their networks. Cisco NetFlow [3] is the most popular IP flow format to account IP traffic. Currently, NetFlow version 9 has been released and NetFlow version 5 is used by most of network management devices and network security devices. Actually, it is not too much to say that NetFlow is a industrial standard for traffic measuring. However, NetFlow version 5 is not appropriate to VoIP. It supports a fixed template, flow size and metrics, and an user is not able to configure anything to the format of the flow. Cisco released NetFlow vsersion 9 that has an extended header idea. Figure 1. A format of NetFlow version 9 packet In NetFlow version 9 s case, packet header is same as NetFlow version 5. However, the most important change of the NetFlow Version 9 format is that it is template based. Templates provide a flexible design to the record format, a feature that should allow future 2
3 enhancements to NetFlow services without requiring concurrent changes to the basic flowrecord format[4] nprobe VoIP abnormal traffic detecting product never has been released, yet. Only nporbe [5] supports some metrics to measure SIP/RTP traffic since it s version 4.0. nprobe is an open source NetFlow probe. It supports to generate NetFlow version 5, 9 and IPFIX flow. Especially, it supports to generate Netflow version 9 including extended flow header. Since its version 4.0, SIP/RTP plugin is added and it is able to measure VoIP traffic metrics that can be used by netflow collectors for building accurate analysis applications. Table 1 shows VoIP metrics that can be measured by nprobe Previous Proposals Table 1. VoIP metrics that can be measured by nprobe SIP RTP SIP_CALL_ID RTP_FIRST_SSRC SIP_CALLING_PARTY RTP_FIRST_TS SIP_CALLED_PARTY RTP_LAST_SSRC SIP_RTP_CODECS RTP_LAST_TS SIP_INVITE_TIME RTP_IN_JITTER SIP_TRYING_TIME RTP_OUT_JITTER SIP_RINGING_TIME RTP_IN_PKT_LOST SIP_OK_TIME RTP_OUT_PKT_LOST SIP_ACK_TIME RTP_OUT_PAYLOAD_TYPE SIP_RTP_SRC_PORT RTP_IN_MAX_DELTA SIP_RTP_DST_PORT RTP_OUT_MAX_DELTA Currently, research about VoIP security is underway, and some proposals have been released. Geneiatakis proposed a framework for detecting malformed SIP messages[6]. And Wu proposed an abstract intrusion detection framework called SCIDIVE for VoIP system[7]. In 2007, Kang et al. proposed a methodology to profile the behavior of SIP-based VoIP traffic. He profiled the service behavior at multiple levels, server host, server entity, individual user levels[8]. Besides these, some other ideas were proposed for VoIP security. However, most of them are about signature-based detection. And a practical system for monitoring and detecting VoIP traffic is not proposed yet. 3. Threat Model In this paper, we define VoIP network threats as a network attack that uses characteristics of VoIP service and is able to be detected by analyzing traffic. VoIP network threats are categorized into 3 groups, SIP flooding attack, RTP flooding attack, SIP scan. In SIP flooding attack, an attacker sends a specified SIP proxy server or UA (User Agent) numerous SIP request messages (e.g. INVITE, REGISTER etc.) in a short time. It causes system resource starvation at victim device and makes it impossible to provide normal VoIP 3
4 service. Especially, in INVITE flooding s case, it does not cause only service destruction but second damage that ring phones continuously. RTP Flooding sends numerous RTP packets to the victim in a short time without following any media encoding scheme. It can cause decline of voice QoS, and service destruction. VoIP is a real-time service and is very sensitive at voice QoS. Even if QoS decline is very small, it can give very critical damage to the service. In order to perform more complicated VoIP attacks, it is necessary to know some information (e.g. valid URI etc.). SIP Scan attack is performed to get some information to execute second attacks (e.g. eavesdropping, SIP/RTP flooding etc.). In SIP scan attack, attacker tries to register a random URI to registrar server. When the server responses to the REGISTER request, the attacker can check a validation of the URI. And the attacker can check users whose status is on-line, by sending INVITE messages to various users in the network. SIP scan attack does not cause a critical damage by itself, but it has a potential risk for the second attacks. 4. Proposed System In this chapter, we propose a system that monitors VoIP service and detects VoIP network threats described above Overall System Components Figure 2 depicts overall system components of the proposed system. The proposed system consists of VoIP Traffic Observation Point, VoIP Traffic Monitoring and Detecting System, and GUI (Graphic User Interface). VoIP Traffic Observation Point generates NetFlow that includes VoIP Traffic aware information. It is developed as a software type, and can be installed in a third-party server device or network devices (e.g. router), security devices (e.g. IPS). VoIP Traffic Monitoring and Detecting System executes monitoring, analyzing VoIP traffic and detecting VoIP network threats. Monitoring statistic and results of detections are sent to GUI to be reported to a system administrator. The administrator can configure the rules for analyzing and detecting through GUI. Figure 2. Overall System Components 4
5 4.2. VoIP Traffic Observation Point VoIP Traffic Observation Points are located at a number of administrated networks, and collects VoIP traffic information of corresponding network. At first, it collects every raw IP packets from the network, and inspects application headers of them. Now it can distinguish SIP/RTP packets from the other types of IP packets and gathers SIP/RTP attributes (e.g. call- ID, caller/callee URI, SIP method type etc.). Using this information, it generates NetFlow that includes SIP/RTP information. We have chosen NetFlow version 9 as the flow format. NetFlow version 9 supports extended header and appropriate to measure VoIP traffic. The generated NetFlow is sent to VoIP Traffic Monitoring and Detecting System. Figure 3. VoIP Traffic Observation Point 4.3. VoIP Traffic Monitoring and Detecting System Figure 4. VoIP Traffic Monitoring and Detecting System VoIP Traffic Monitoring and Detecting System consists of NetFlow Collector, VoIP Traffic Monitoring and Analyzing Module, Abnormal VoIP Traffic Detecting Module, System Management Module, and GUI Interface. The roles of each module are as follow. NetFlow Collector controls connections between a number of VoIP Observation Points and SIP Traffic Monitoring and Detecting System. And it collects NetFlow version 9 data. It decodes the NetFlow and itemizes SIP/RTP information to measure VoIP traffic for each item. The itemized information is sent to VoIP Traffic Mornitoring and Analyzing Module. VoIP Traffic Monitoring and Analyzing Module calculates the value of statistics for VoIP traffic monitoring(e.g. SIP/RTP traffic volume, session count etc.) and the value of statistics for VoIP traffic analyzing (e.g. ratio of caller/callee IP, the number of each SIP method etc.). The statistics 5
6 are stored in DB, and are used to report traffic information or to detect abnormal VoIP traffic. Out of the statistics some items are sent to GUI, through GUI interface, in real-time, to report service status. Table 2. Metrics to analyze Object Metrics SIP/RTP traffic volume Network the number call sessions monitoring duration of calls Detecting abnormal VoIP Traffic QoS measuring the number of messages for each method the number of source/destination IPs the number of caller/callee URIs jitter of RTP traffic delay of RTP traffic packet loss of RTP traffic Abnormal SIP Traffic Detecting Module executes to detect VoIP network execute to detect VoIP network threats in accordance with detecting rules. It calculates threshold value for each metrics continuously, and store the threshold in a hash table. And every unit time, it executes detecting VoIP network threats by comparing statistics of each metric with correspondent threshold value. The rules for detecting are described in chapter 5. GUI Interface sends VoIP traffic statistics, alert/log of VoIP network threats detection to GUI, to report the status of the service to the administrator, and receives some configuration request from GUI. System Management Module sends system status information (e.g. CPU/Memory usage, network status etc.) to GUI, through GUI Interface. And if it receives system configuration request from GUI Interface, it applies the request to the system. 5. Detecting VoIP Network Attacks Symptoms of INVITE flooding attacks are appeared differently at SIP proxy server and UA. When numerous INVITE messages are centralized on specified device, whole traffic volume of SIP increases abnormally. And SIP proxy server can not process every INVITE request, and can not send RINGING messages for every INVITE requests. If INVITE Flooding targets on UA, you can see the symptom at a number of INVITE requests and 200OK responses. With the same way, you can detect REGISTER flooding using ratio of REGISTER and 200OK messages count. RTP is a UDP based bidirectional protocol, and there is no specified response process after media receiving. Therefore, it is very difficult to detect RTP Flooding based on behavior. But, RTP packets that have same SSRC (Synchronizing Source Collision Resolution), should be sent from a same host. Therefore, By measuring the number of source IPs of RTP packets that has same SSRC, you can suspect of distributed RTP Flooding attack. SIP Scan Attacks are divided into REGISTER Scan, that targets registrar, and INVITE Scan, that targets UA. In REGISTER Scan, a specified user tries to register various URIs in a short time. Therefore, to detect REGISTER scan, you should check the number of REGISTER messages heading to the registrar server and find out if there is an IP address that tries to send REGISTER messages that include various URI each, out of REGISTER messages heading to the registrar server. In INVITE Scan s case, there should be an unique IP address that tries to send INVITE messages to various URI in 6
7 a short time. Therefore, you can check unique number of URI at the To filed of INVITE messages that is originated from specific IP address. 6. Conclusion Table 3. Metrics to check for detection An object of Attack analyze Metrics to check SIP traffic SIP traffic volume heading to ratio of INVITE and SIP proxy server RINGING INVITE flooding REGISTER flooding RTP flooding REGISTER scan INVITE scan SIP traffic at each user s level SIP traffic heading to registrar RTP traffic in each call session SIP traffic heading to registrar Whole SIP traffic SIP traffic volume ratio of INVITE and 200OK SIP traffic volume ratio of REGISTER and 200OK RTP traffic volume the number of src IPs in RTP packets that has same SSRC SIP traffic volume ratio of src IP and URI in REGISTER messages ratio of src IP and callee URI in INVITE messages VoIP service is still on developing, and accordingly security threats are becoming more risky. However, there is no practical solution for monitoring VoIP service and detecting abnormal VoIP traffic. In this paper, we described some VoIP network threats and proposed a system to detect them. The proposed system can collect VoIP information and executes VoIP-aware network monitoring and VoIP traffic anomaly detecting. However, there are still more potential VoIP network threats, and in accordance with it, the system should be more detailed and the rules for detection should be extended. It will be the future work of our research. References [1] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley and E. Schooler, SIP: Session Initiation Protocol, RFC 3261, June [2] H. Schulzrinne, S. Casner, R. Frederick and V. Jacobsonm, RTP: A Transport Protocol for Real-Time Applications, RFC 1889, January, [3] Cisco Systems NetFlow Services and Applications, White Paper, July [4] Cisco Systems Cisco IOS NetFlow version 9 Flow-Record Format, White Paper, [5] L. Deri, nprobe: an Open Source NetFlow Probe for Gigabit Networks, TERENA Networking Conference, [6] D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis and S. Gritzalis, "A Framework for Detecting Malformed Messages in SIP Networks", the 14th IEEE Workshop on Local and Metropolitan Area Networks LANMAN), Greece, September 2005 [7] Y. Wu, S. Bagchi, S. Garg, N. Singh and T. Tsai, SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments, 2004 International Conference on Dependable Systems and Networks (DSN'04), Florence, Italy, 2004 [8] H. Kang, Z. Zhang, S. Ranjan and A. Nucci, SIP-based VoIP Traffic Behavior Profiling and its Application, MineNet 07, San Diego, USA, June
8 8
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Changyong Lee, Hwankuk-Kim, Hyuncheol Jeong, Yoojae Won Korea Information Security Agency, IT Infrastructure Protection Division
SIP Intrusion Detection and Response Architecture for Protecting SIP-based Services
SIP Intrusion Detection and Response Architecture for Protecting SIP-based Services KyoungHee Ko, Hwan-Kuk Kim, JeongWook Kim, Chang-Yong Lee, HyunCheol Jeong Applied Security Technology Team Korea Information
SIP-based VoIP Traffic Behavior Profiling and Its Applications
SIP-based VoIP Traffic Behavior Profiling and Its Applications Hun Jeong Kang, Zhi-Li Zhang, Supranamaya Ranjan and Antonio Nucci Abstract With the widespread adoption of SIP-based VoIP, understanding
SIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna ([email protected]) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
A Call Conference Room Interception Attack and its Detection
A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,
Detecting DoS Attacks on SIP Systems
Detecting DoS Attacks on SIP Systems Eric. Chen TT Information Sharing Platform Laboratories, TT Corporation 3-9-11 Midori-cho, Musashino-shi, Tokyo, 180-8585, Japan TEL: +81-422-59-3347, FAX: +81-422-59-5660
How To Protect Your Phone From Being Hacked By A Man In The Middle Or Remote Attacker
An Empirical Investigation into the Security of Phone Features in SIP-based VoIP Systems Ruishan Zhang 1, Xinyuan Wang 1, Xiaohui Yang 1, Ryan Farley 1, and Xuxian Jiang 2 1 George Mason University, Fairfax,
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
How To Attack A Phone With A Billing Attack On A Sip Phone On A Cell Phone On An At&T Vpn Vpn Phone On Vnet.Com (Vnet) On A Pnet Vnet Vip (Sip)
Billing Attacks on SIP-Based VoIP Systems Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Xuxian Jiang Department of Information and Software Engineering George Mason University, Fairfax, VA 22030, USA {rzhang3,
Open Source VoIP Traffic Monitoring
Open Source VoIP Traffic Monitoring Luca Deri Why VoIP is a Hot Topic? Thanks to open source projects (e.g. Asterisk, Gizmo), and custom Linux distributions (e.g. Asterisk@Home) setting up a VoIP
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
An Overview on Security Analysis of Session Initiation Protocol in VoIP network
An Overview on Security Analysis of Session Initiation Protocol in VoIP network Tarendra G. Rahangdale 1, Pritish A. Tijare 2, Swapnil N.Sawalkar 3 M.E (Pursuing) 1, Associate Professor 2, Assistant Professor
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected].
SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected] Abstract Session Initiation Protocol is one of key IP communication
Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities
Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland [email protected], [email protected] Abstract This
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
SIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna ([email protected]) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
Improving Quality in Voice Over Internet Protocol (VOIP) on Mobile Devices in Pervasive Environment
Journal of Computer Applications ISSN: 0974 1925, Volume-5, Issue EICA2012-4, February 10, 2012 Improving Quality in Voice Over Internet Protocol (VOIP) on Mobile Devices in Pervasive Environment Mr. S.Thiruppathi
Open Source VoIP Traffic Monitoring
Open Source VoIP Traffic Monitoring Luca Deri What is VoIP? VoIP is the routing of voice conversations over the Internet or through any other IP-based network (Wikipedia). Advantages: It allows
NTP VoIP Platform: A SIP VoIP Platform and Its Services 1
NTP VoIP Platform: A SIP VoIP Platform and Its Services 1 Whai-En Chen, Chai-Hien Gan and Yi-Bing Lin Department of Computer Science National Chiao Tung University 1001 Ta Hsueh Road, Hsinchu, Taiwan,
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
SIP Trunking The Provider s Perspective
SIP Trunking The Provider s Perspective Presented by Pete Sandstrom, CTO BandTel Advanced SIP Session Overview 1. Open Systems Interconnection Model (OSI) is more than a model 2. Quality of Service (QoS)
Implementing SIP and H.323 Signalling as Web Services
Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de
Session Initiation Protocol and Services
Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the
Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 211 proceedings Quick Detection of Stealthy SIP Flooding Attacks
Java Based VoIP Performance Monitoring Tool
, October 20-22, 2010, San Francisco, USA Java Based VoIP Performance Monitoring Tool Husna Zainol Abidin, Mohd Ameer Yuslan Razmi, Farah Yasmin Abdul Rahman, Ihsan Mohd Yassin Abstract This paper describes
point to point and point to multi point calls over IP
Helsinki University of Technology Department of Electrical and Communications Engineering Jarkko Kneckt point to point and point to multi point calls over IP Helsinki 27.11.2001 Supervisor: Instructor:
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS
AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS Kati Wilson, Texas A&M University Kati is a student in the Electronics Engineering
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
A Scalable Multi-Server Cluster VoIP System
A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu [email protected] {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing
SIP TRAFFIC LOAD BALANCING Ramy Farha School of Electrical and Computer Engineering University of Toronto Toronto, Ontario Email: [email protected] ABSTRACT This paper presents a novel solution to
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment
A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment Dimitris Geneiatakis and Costas Lambrinoudakis Laboratory of Information and Communication Systems Security
A Study on Countering VoIP Spam using RBL
2011 2nd International Conference on Networking and Information Technology IPCSIT vol.17 (2011) (2011) IACSIT Press, Singapore A Study on Countering VoIP Spam using RBL Seokung Yoon, Haeryoung Park, Myoung
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
Secure VoIP Transmission through VPN Utilization
Secure VoIP Transmission through VPN Utilization Prashant Khobragade Department of Computer Science & Engineering RGCER Nagpur, India [email protected] Disha Gupta Department of Computer Science
Design of a SIP Outbound Edge Proxy (EPSIP)
Design of a SIP Outbound Edge Proxy (EPSIP) Sergio Lembo Dept. of Communications and Networking Helsinki University of Technology (TKK) P.O. Box 3000, FI-02015 TKK, Finland Jani Heikkinen, Sasu Tarkoma
Spam Detection in Voice-over-IP Calls through Semi-Supervised Clustering
Spam Detection in Voice-over-IP Calls through Semi-Supervised Clustering Yu-Sung Wu, Saurabh Bagchi Purdue University, USA Navjot Singh Avaya Labs, USA Ratsameetip Wita Chulalongkorn University, Thailand
Adaptation of TURN protocol to SIP protocol
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 2, January 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 78 Adaptation of TURN protocol to SIP protocol Mustapha GUEZOURI,
VoIP Intrusion Detection Through Interacting Protocol State Machines
VoIP Intrusion Detection Through Interacting Protocol State Machines Hemant Sengar Duminda Wijesekera Haining Wang Sushil Jajodia Center for Secure Information Systems George Mason University Fairfax,
Protecting SIP Proxy Servers from Ringing-based Denial-of-Service Attacks
Protecting SIP Proxy Servers from Ringing-based Denial-of-Service Attacks William Conner and Klara Nahrstedt Department of Computer Science, University of Illinois at Urbana-Champaign {wconner,klara}@uiuc.edu
Unit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
VOIP TELEPHONY: CURRENT SECURITY ISSUES
VOIP TELEPHONY: CURRENT SECURITY ISSUES Authors: Valeriu IONESCU 1, Florin SMARANDA 2, Emil SOFRON 3 Keywords: VoIP, SIP, security University of Pitesti Abstract: Session Initiation Protocol (SIP) is the
Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
Open IMS Core with VoIP Quality Adaptation
Open IMS Core with VoIP Quality Adaptation Is-Haka Mkwawa, Emmanuel Jammeh, Lingfen Sun, Asiya Khan and Emmanuel Ifeachor Centre for Signal Processing and Multimedia Communication School of Computing,Communication
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University
Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
SIP Trunking and Voice over IP
SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential
A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack
A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack Abhishek Kumar Department of Computer Science and Engineering-Information Security NITK Surathkal-575025, India Dr. P. Santhi
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA What is ReporterAnalyzer? ReporterAnalyzer gives network professionals insight into how application traffic is impacting network performance.
Prevention of Anomalous SIP Messages
International Journal of Future Computer and Communication, Vol., No., October 03 Prevention of Anomalous SIP Messages Ming-Yang Su and Chung-Chun Chen Abstract Voice over internet protocol (VoIP) communication
Firewall Support for SIP
Firewall Support for SIP The Firewall Support for SIP feature integrates Cisco IOS firewalls, Voice over IP (VoIP) protocol, and Session Initiation Protocol (SIP) within a Cisco IOS-based platform, enabling
IPFIX IE Extensions for DDoS Attack Detection draft-fu-dots-ipfix-extension-01
IPFIX IE Extensions for DDoS Attack Detection draft-fu-dots-ipfix-extension-01 Tianfu Fu [email protected] Dacheng Zhang [email protected] Liang Xia (Frank) [email protected] Min Li
Application Latency Monitoring using nprobe
Application Latency Monitoring using nprobe Luca Deri Problem Statement Users demand services measurements. Network boxes provide simple, aggregated network measurements. You cannot always
Architecture of End-to-End QoS for VoIP Call Processing in the MPLS Network
1/18 Fifth International Workshop on Quality of future Internet Service(QofIS 04) Architecture of End-to-End QoS for VoIP Call Processing in the MPLS Network 2004. 9. 29 National Computerization Agency
Simulation of SIP-Based VoIP for Mosul University Communication Network
Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication
Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005
15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars
MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 11, No 4 Sofia 2011 MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks N.
AN APPROACH TOWARDS THE LOAD BALANCING STRATEGY FOR WEB SERVER CLUSTERS
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS THE LOAD BALANCING STRATEGY FOR WEB SERVER CLUSTERS B.Divya Bharathi 1, N.A. Muneer 2, Ch.Srinivasulu 3 1
SIP Trunking Quick Reference Document
SIP Trunking Quick Reference Document Publication Information SAMSUNG TELECOMMUNICATIONS AMERICA reserves the right without prior notice to revise information in this publication for any reason. SAMSUNG
Application Note. Onsight Connect Network Requirements V6.1
Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
SIP-based VoIP Traffic Behavior Profiling and Its Applications
SIP-based VoIP Traffic Behavior Profiling and Its Applications Hun Jeong Kang, Zhi-Li Zhang University of Minnesota Email: {hkang, zhzhang}@cs.umn.edu Supranamaya Ranjan, and Antonio Nucci NARUS Email:
OpenDaylight Project Proposal Dynamic Flow Management
OpenDaylight Project Proposal Dynamic Flow Management Ram (Ramki) Krishnan, Varma Bhupatiraju et al. (Brocade Communications) Sriganesh Kini et al. (Ericsson) Debo~ Dutta, Yathiraj Udupi (Cisco) 1 Table
NetFlow: What is it, why and how to use it? Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow: What is it, why and how to use it?, [email protected] Soneco d.o.o. Serbia Agenda What is NetFlow? What are the benefits? How to deploy NetFlow? Questions 2 / 22 What is NetFlow? NetFlow
Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date: 2014. 09.29
Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date: 2014. 09.29 http://www.dinstar.com 1 / 9 Contents Chapter 1: Authors and changes logs... 3 Chapter
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
A Phased Framework for Countering VoIP SPAM
International Journal of Advanced Science and Technology 21 A Phased Framework for Countering VoIP SPAM Jongil Jeong 1, Taijin Lee 1, Seokung Yoon 1, Hyuncheol Jeong 1, Yoojae Won 1, Myuhngjoo Kim 2 1
Network Monitoring Based on IP Data Flows
Network Monitoring Based on IP Data Flows Best Practice Document Produced by CESNET led working group on Network monitoring (CBPD131) Author:MartinŽádník March2010 TERENA 2010. All rights reserved. Document
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
Network Convergence and the NAT/Firewall Problems
Network Convergence and the NAT/Firewall Problems Victor Paulsamy Zapex Technologies, Inc. Mountain View, CA 94043 Samir Chatterjee School of Information Science Claremont Graduate University Claremont,
Detecting Spam in VoIP Networks. Ram Dantu Prakash Kolan
Detecting Spam in VoIP Networks Ram Dantu Prakash Kolan More Multimedia Features Cost Why use VOIP? support for video-conferencing and video-phones Easier integration of voice with applications and databases
Measurement of IP Transport Parameters for IP Telephony
Measurement of IP Transport Parameters for IP Telephony B.V.Ghita, S.M.Furnell, B.M.Lines, E.C.Ifeachor Centre for Communications, Networks and Information Systems, Department of Communication and Electronic
Network Monitoring Based on IP Data Flows Best Practice Document
Network Monitoring Based on IP Data Flows Best Practice Document Produced by CESNET led working group on Network monitoring (CBPD131) Authors: Martin Žádník March 2010 TERENA 2010. All rights reserved.
Voice over IP Probe! for Network Operators and! Internet Service Providers
Voice over IP Probe! for Network Operators and! Internet Service Providers Product Presentation September 2011 2011 ADVENAGE GmbH Agenda Voice over IP Probe Key Facts VoIP Probe in a Nutshell Use Cases
Network Performance Monitoring at Minimal Capex
Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer About ManageEngine Network Servers
Deployment of Snort IDS in SIP based VoIP environments
Deployment of Snort IDS in SIP based VoIP environments Jiří Markl, Jaroslav Dočkal [email protected] K-209 Univerzita obrany Kounicova 65, 612 00 Brno Czech Republic Abstract This paper describes
159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)
Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Basic IP phone set up The SIP protocol Computer Networks - 1/2 Learning Objectives
