Detecting Spam in VoIP Networks. Ram Dantu Prakash Kolan



Similar documents
Ram Dantu. VOIP: Are We Secured?

Detecting Spam in VoIP networks

Detecting Spam in VoIP Networks

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

SIP : Session Initiation Protocol

An outline of the security threats that face SIP based VoIP and other real-time applications

SIP Essentials Training

VIDEOCONFERENCING. Video class

Chapter 2 PSTN and VoIP Services Context

SIP Service Providers and The Spam Problem

White paper. SIP An introduction

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

Introduction to VoIP Technology

A Study on Countering VoIP Spam using RBL

Basic Vulnerability Issues for SIP Security

A Phased Framework for Countering VoIP SPAM

A Model-based Methodology for Developing Secure VoIP Systems

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

Security issues in Voice over IP: A Review

(Refer Slide Time: 6:17)

Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)

Prevention of Spam over IP Telephony (SPIT)

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

Application Note. Onsight Connect Network Requirements V6.1

Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)

TECHNICAL CHALLENGES OF VoIP BYPASS

Understanding Voice over IP Protocols

Unit 23. RTP, VoIP. Shyam Parekh

VoIP technology employs several network protocols such as MGCP, SDP, H323, SIP.

SIP Trunking and Voice over IP

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

Contents. Specialty Answering Service. All rights reserved.

SIP A Technology Deep Dive

AdvOSS Session Border Controller

Overview of Voice Over Internet Protocol

Integrating Voice over IP services in IPv4 and IPv6 networks

Ingate Firewall/SIParator SIP Security for the Enterprise

A Comparative Study of Signalling Protocols Used In VoIP

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Sangheon Pack, EunKyoung Paik, and Yanghee Choi

Spam Detection in Voice-over-IP Calls through Semi-Supervised Clustering

VoIP. Overview. Jakob Aleksander Libak Introduction Pros and cons Protocols Services Conclusion

Security & Reliability in VoIP Solution

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)

FortiMail Filtering Course 221-v2.2 Course Overview

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf (Team Lead) Imran Bashir Khadija Akram

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

TSIN02 - Internetworking

SIP, Session Initiation Protocol used in VoIP

Formación en Tecnologías Avanzadas

Implementing SIP and H.323 Signalling as Web Services

How To Implement A Cisco Vip From Scratch

NAT TCP SIP ALG Support

EE4607 Session Initiation Protocol

IP Telephony and Network Convergence

SIP (Session Initiation Protocol) Technical Overview. Presentation by: Kevin M. Johnson VP Engineering & Ops

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

Prevention of Anomalous SIP Messages

Customize Approach for Detection and Prevention of Unsolicited Call in VoIP Scenario: A Review

Securing SIP Trunks APPLICATION NOTE.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Mixer/Translator VOIP/SIP. Translator. Mixer

SIP Trunking Manual Technical Support Web Site: (registration is required)

802.11: Mobility Within Same Subnet

Media Gateway Controller RTP

Vega 100G and Vega 200G Gamma Config Guide

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, Eschborn, Germany

Online course syllabus. MAB: Voice over IP

User authentication in SIP

Session Border Controller

Open IMS Core with VoIP Quality Adaptation

How to make free phone calls and influence people by the grugq

SHORT DESCRIPTION OF THE PROJECT...3 INTRODUCTION...4 MOTIVATION...4 Session Initiation Protocol (SIP)...5 Java Media Framework (JMF)...

SIP: Ringing Timer Support for INVITE Client Transaction

SIP Trunking Quick Reference Document

The use of IP networks, namely the LAN and WAN, to carry voice. Voice was originally carried over circuit switched networks

Architecture of End-to-End QoS for VoIP Call Processing in the MPLS Network

How To Support An Ip Trunking Service

The SIP School- 'Mitel Style'

Best Practices for Securing IP Telephony

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Recommended IP Telephony Architecture

Configuring MDaemon for Centralized Spam Blocking and Filtering

CommuniGate Pro Real-Time Features. CommuniGate Pro Internet Communications VoIP, , Collaboration, IM

Packetized Telephony Networks

SIP.edu Project. CSG VoIP Workshop. Dennis Baron January 5, Dennis Baron, January 5,2005 Page 1. np120

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

Transcription:

Detecting Spam in VoIP Networks Ram Dantu Prakash Kolan

More Multimedia Features Cost Why use VOIP? support for video-conferencing and video-phones Easier integration of voice with applications and databases Convergence of voice and data communications Long distance phone call costs virtually eliminated PC + headset + software = telephone Gartner: 90% of new corporate phones VOIP by 2008 TeleGeography 2005 52% of online households said they were likely to subscribe to a flat-rate VoIP service package if it was priced at $30 per month

Overview of VoIP

SIP based VoIP Architecture I N T E L L I G E N T email LDAP Oracle XML SIP Proxy, Registrar & Redirect Servers SIP CPL 3pcc Application Services S E R V I C E S SIP SIP SIP User Agents (UA) RTP (Media) Legacy PBX PSTN CAS or PRI

Basic SIP Call-Flow SIP UA1 SIP UA2 INVITE w/ SDP for Media Negotiation 100 Trying 180/183 Ringing w/ SDP for Media Negotiation MEDIA 200 OK ACK MEDIA BYE 200 OK

SIP Call Flow with Proxy Server Proxy Server Register OK (200) Invite Trying (100) Ringing (180) OK (200) ACK Register OK (200) Invite Ringing (180) OK (200) ACK RTP/RTCP media channels

Issues VoIP is going to be a critical infrastructure for the nation Reliability and availability important for E911 VoIP is real-time traffic. So QoS must be maintained VoIP inherits all properties of the IP protocol including security weaknesses Separate signaling and media require different protection mechanisms thus complicating solutions FW and NAT traversal New/Changing Standards VoIP over WiFi/Cellular phones and mobility introduces new threats VoIP protocols/infrastructure used for IM, Multimedia, and Video Convergence of two global and structurally different networks (PSTN and VoIP) introduces new security weaknesses Threats like DDOS and Spamming are more damaging to voice compared to data networks Attack propagation; Threats and vulnerabilities will evolve and it is expected that they will impact (directly or indirectly) the existing PSTN. Attacks affect subscribers, service providers and carriers who are considered part of the National Critical Infrastructure

VoIP Security Workshops 1 st VoIP Security workshop was held in Dallas, Texas as part of IEEE Globecom during December, 2004 (http://www.cs.unt.edu/~rdantu/voipsecurityworkshop.htm) 2 nd VoIP Security workshop was held in Washington DC during June, 2005 (https://www.csialliance.org/news/events/voip/voip_agenda.pdf) More than 260 people have participated in these workshops. The participants include representatives from Department of Homeland Security, Department of Defense, the FBI, NSA, NIST, FCC, industry consortiums such as the International Packet Communications Consortium (IPCC) and SIP.EDU in Internet2, VoPSF, VoIPSA, and several telecommunications service providers, vendors and universities.

Voice Spam Voice Spam is different from E-mail Spam Voice Spam at 2am E-Mail Spam at 2am

Email vs. Voice Mail Indirect (Un-intrusive) Email Internet Local SMTP Server Remote SMTP Server * Email server access is protected through series of mail servers and relays Direct (Intrusive) Voice Mail Network Voice Mail Server Would you allow un-trusted person to save directly on your system? * Voice mail has less barrier than data

Spamming Different from e-mail spam At 2AM, Received a junk e-mail sitting in Inbox. But, a junk voice call is a real nuisance. Most E-mail filters rely on content analysis. But in Voice calls, it is too late to analyze media for spamming Voice Spam Detection difficult Headers for voice spam detection : from, contact. Are these enough? Detection in real time before the media arrives Spam is basically an unwanted call!!!!!

Solution

Functional Elements Elements in Spam Detection Black and White Lists Database of wanted and unwanted callers- Black & White Lists Preference based on domains and contacts. Bayesian Learning Learning based on past history Past history specifies spam or valid behavior about the caller Update the learning based on past history, new evidence like feedback from end users.

Inference Trust Trust is a a derived entity. Depends on Caller s past behavior with callee Spam and valid calls from the caller The identifiers having extreme values of Trust can be added to Black and White lists. This is time bound as few spam calls after a good behavior might go unnoticed, or vice versa. Trust grows slowly with time for a valid behavior and drops fast for a spam behavior. Additive growth and multiplicative descent.

Functional Elements Contd.. Inference Inference from trusted neighbors Reputation coefficient for each neighbor Bayesian Inference of reputation for known proxy/neighbor topology Update Trust and Reputation coefficients based on calling patterns Presence Called party preferences and interests Presence of situation State of mind and mood of called party

Functional Elements of VSD

Experimental Setup Domain A Proxy Voice Spam Detector Proxy Domain B Proxy Proxy Proxy Proxy Domain E Domain C Domain D

Traffic Profile Five domains, 35 hosts per each domain and 100 users for each host Average rate of 8 calls per minute Neither the VSD nor the called-users have any idea regarding the call generation process. Randomly select a set of users, hosts and domains as spammers before the start of the experiment A button called SPAM included in each hard phone in the receiving domain for giving feedback to the VSD. Randomly select a set of users, hosts and domains as spammers before the start of the experiment

Trust Computation History regarding participating entities x 1, x 2, x n p t = P( C = spam) i= 1.. n P( C = k) P( x k= spam, valid i= 1.. n i = spam) P( x i = k) x 1, x 2, x n are updated after every call Trust of Initial Values Threshold x 1, x 2, x n p t

Reputation Inference Reputation Coefficient R(a,b) - Reputation of b on a In the above figure R(a,c) = Θ (R(a,b),R(b,c)) for all b in trusted neighbors of a Θ represents the Bayesian Inference function. This inference is carried out using inference graph as shown below. Call from a host in Domain D to a host in Domain A. Domain Proxies D Reputation Inference C D A B C A Inference Graph of Network topology B AP, BP, CP and DP are the proxies of domains A,B,C and D respectively

Reputation Inference For a call from a domain The reputation is updated after every call based on user feedback. The update is positive for a valid call and negative for a spam call. Initial Values Threshold Reputation of B,C,D p r All the generating and intermediate domains routing the call are updated based on their respective learning.

Message Probability Message Probability p = f(p t,p r ) If p>t, call = spam else call = not spam Threshold p t Call accepted or Rejected p r

Results

Collaboration between different methodologies in the architecture 1200 160 No of Calls Generated/ Filtered 1000 800 600 400 200 0 0 5 10 15 20 Time(1 unit = 65 call durations) Filtered Calls 140 120 100 80 60 40 20 0 Actual Spam generated Black Listing Black Listing With Trust Black Listing With Trust & Reputation Total Calls Total Spam Calls 0 5 10 15 20 Filtered Calls Time(1 unit = 65 call durations)

Accuracy of VSD during learning and lock-in period No of Spam Calls generated/filtered 200 150 100 50 0 0 5 10 15 20 Time(1 unit = 65 total call durations) Rate of Spam//Filtered Calls 12 10 8 6 4 2 0 0 5 10 15 20 Time(1 unit = 65 call durations) Total Spam Calls Filtered Calls Rate of Spam Calls Rate of Filtered Calls Accuracy of VSD During Learning Period Accuracy of VSD During Lock-In Period

Sensitivity Analysis 1 % of False Alarms 0.8 0.6 0.4 0.2 0 0 10 20 30 40 50 Percentage of spam generated 2500 Total Calls 3500 Total Calls 4500 Total Calls Accuracy of VSD Spam Volume Vs. Accuracy

Sensitivity Analysis 60 50 Filtered Spam Calls 40 30 20 10 0 0-10 10 20 30 40 50 60 70 80 Time(1 unit = 65 call durations) 5 Domains 15 Domains 25 Domains Percentage of False Alarms 0.04 0.03 0.02 0.01 0 False Alarms 0 10 20 30 Network Size(No of Domains) Network Size Vs. Accuracy Network Size Vs. False Alarms

Using Domain-specific knowledge 250 Filtered Spam Calls 200 150 100 50 0-50 0 2 4 6 8 10 12 Time(1 unit = 65 call durations) Without Domain Knowledge With Domain Knowledge Learning From Others Experience

Opt-In σ / σ max Opt-Out Opt-In Spammers Phisher Telemarketer Unsolicited Bulk Calls Spam Spammer Correlation Spammer Classification based on their correlation and spam distribution

Conclusions An architecture based on collaboration between different functional elements is proposed We have used open source proxy server, soft clients and hard phones for the experiments A combinations of black/white lists, trust and reputation functions and media quarantining are used Spammer classification technique is developed and supplemented with the above results From our observation of the logs it takes 3 spam calls to confirm it is a spam and the 4th call can be accurately identified as the spam.