Voice over IP (VoIP)



Similar documents
22nd May 2008 GENEVA. THE NATIONAL COST OF VoIP BYPASS

BITEK INTERNATIONAL INC PRESENTS: MANAGING VOIP

BITEK INTERNATIONAL INC PRESENTS: VoIP FILTERING

NATIONAL COST OF VoIP BYPASS

NATIONAL COST OF VoIP BYPASS

Table of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall

VoIP. Overview. Jakob Aleksander Libak Introduction Pros and cons Protocols Services Conclusion

TECHNICAL CHALLENGES OF VoIP BYPASS

Three short case studies

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

Best Practices for Controlling Skype within the Enterprise > White Paper

VoIP for the Small Business

VoIP over P2P networks

VoIP. Voice over Internet Protocol Presentation to the IEE (Hong Kong) Lecture Theatre LT18, City University 22nd January 2005

Skype network has three types of machines, all running the same software and treated equally:

OVERVIEW OF ALL VOIP SOLUTIONS

AscenFlow - P2P Solution

Calling All Countries: The VoIP Revolution is Here!

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

Voice Over IP. Priscilla Oppenheimer

VoIP for the Small Business

Safe internet for business use: Getting Started Guide

VoIP for the Small Business

Alexandre Weffort Thenorio - Data. IP-Telephony

ResNet Guide. Information & Learning Services. Here to support your study and research

How To Use The Dfl-M510 On A Network With A Dfl51 On A Pc Or Mac Or Ipa (Dfl) On A Pnet 2 (Dlf51) On An Ipa 2 (Net 2) On

Voice over IP Basics for IT Technicians

Best Practices for Controlling Skype within the Enterprise. Whitepaper

PEER-TO-PEER NETWORK

Secured Voice over VPN Tunnel and QoS. Feature Paper

1. Built-In SPI Firewall to Protect Your Enterprise Network 2. Multi-Spam-Filtering Function Providing High Spam-Filtering Accuracy

How To Use A Phone Over Ip (Phyto) For A Phone Call

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

Creating a Regulatory Framework for New Technologies

Threat Mitigation for VoIP

Product Range TELES NGN

Voice over IP Networks: Ensuring quality through proactive link management

Voice over IP (VoIP) Basics for IT Technicians

Internet Security. Prof. Anja Feldmann, Ph.D.

Internet Technology Voice over IP

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

VoIP for the Small Business

DETECTION OF PEER TO PEER APPLICATIONS

Welcome to the UVU IT Help Desk

Security and Risk Analysis of VoIP Networks

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel

SIP Trunking with Microsoft Office Communication Server 2007 R2

Architecture de Réseaux et Dimensionnement du Trafic

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

How To Use Voip (Voice Over The Internet Protocol)

IxLoad-Attack: Network Security Testing

How To Get A Better Price For Your Phone In Orange (European)

VoIP: Enterprise Adoption Trends in India and Grey Market Traction in India. Shubham Jaiswal

Utimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention

Voice Over IP is it hype or can it work for me? By American Business Communication Inc.

Common P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype

1. Discuss the e-commerce benefits that Skype brings to ebay as an integrated communication tool and secondly as a stand-alone business model.

Future of VoIP. Patrik Fältström,

BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON D.C

Integrate VoIP with your existing network

Bitek Guardian System

Internet: Telephone Calls for Free with Vo I P I 19/1. Your PC can Make Telephone Calls to Anywhere in the World for Free!

VOIP Security Essentials. Jeff Waldron

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University

Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum

Safe internet: Getting Started Guide

2010 White Paper Series. Top Ten Security Issues Voice over IP (VoIP)

Why VoIP Peer to Peer and Social Networking providers cannot ignore Legacy Telecoms! Or why Peer to Peer VoIP needs Voip-Pal IP to succeed!

INTERNET USAGE GUIDE Revised 06/05/2014

Subtitle. VoIP Trends. What to Expect in VoIP 2016 Compare Business Products

MED: Voice over IP systems

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

An Introduction to VoIP Protocols

VoIP Survivor s s Guide

Controlling SSL Decryption. Overview. SSL Variability. Tech Note

Daniel-Constantin Mierla Elena-Ramona Modroiu

EXPLORER. TFT Filter CONFIGURATION

Hands on VoIP. Content. Tel +44 (0) Introduction

Peer-to-Peer Networks Organization and Introduction 1st Week

Lucent VPN Firewall Security in x Wireless Networks

Transcription:

Commission on Science and Technology for Development Eleventh session 26 30 May 2008 Voice over IP (VoIP) by Graham Butler President & C.E.O Bitek International Inc. The views expressed are those of the author and do not necessarily reflect the views of UNCTAD

Why is VoIP not considered within Cybersecurity? This one! But it s encrypted BANDWIDTH

7KH :RUOG 7RGD\ &KDQJHV DQG FKDOOHQJHV LQ FRPPXQLFDWLRQV /RFDO &DOO 9R,3 7UDIILF 3671 86$ 3671 7UDGLWLRQDO 9RLFH %\SDVV ³*UH\ WUDIILF /RVW UHYHQXH WR FRXQWU\ /DZIXO,QWHUFHSW &HOO * 86$ &HOO &HOO 9LD :L)L :L0D[ * :LUHOHVV +RW 6SRW,QWHUQHW 3DUWQHU $ 86$,QWHUQHW 3DUWQHU % :LUHOHVV +RW 6SRW %LWHN *XDUGLDQV LQYLVLEO\ GHWHFW DQG VWRS DOO XQ DXWKRUL]HG WUDIILF DQG DUH GHSOR\HG EHWZHHQ SDUWQHUV $ % 'HWHFWLRQ SRLQWV /DS 7RS 9LD :L)L 3'$ 9LD :L)L 6.<3( 9LD %URDGEDQG 6.<3(

Records and Reports Detailed records are individually searchable Actual IP address initiating the call/event Actual IP address receiving the call/event Actual Mac address initiating the call/event Actual Mac address receiving the call/event Actual telephone number initiating the call/event Actual telephone number receiving the call/event Actual email address initiating the call/event Actual email address receiving the call/event Time the call/event was initiated & disconnected Geographic location of IP addresses/suspect produced in some cases through registries Selectively filtering to allow identified as authorized and disconnect identified as un authorized VOIP traffic on a call by call basis VoIP Recording & tracking by key words? IM Traffic control

VoIP Security today In today's climate, Information & Security are critical The ability to regulate, intercept & Control VoIP technology is a key weapon against modern threats Operators, Regulators & Security organizations' need the tools to address VoIP based communications issues, such as: National Security (P2P) Lawful Intercept Grey Traffic Bypass Illegal Websites (URL Blocking) IP VPN s Encryption Growth of VoIP to create an estimated PSTN loss of $100 billion p/a

Reverse Declining Call Rates Wholesale rate decline in VoIP traffic each Country $1.00 $0.75 $0.50 $0.25 $0.10 $0.05 $0.015 Local Termination Rate Assume new rate of 10 cents New revenue to PTT For Schools & Security $0.00 2000 2003 2006 2007 2008 SKYPE Effect of Bitek Guardian THE NATIONAL COST OF VoIP BYPASS

VoIP Protocols P2P How does Skype work? Skype connects to users by randomly generated TCP or UDP ports; if one is blocked, it will find another. Even Ports 80 & 443 Skype mimics Microsoft Server exchange secure authentication, protocol making its identification almost impossible Skype is always on and continually communicates with its Super Node Skype uses considerable bandwidth regardless of call status Skype Super Nodes are deployed behind Firewalls in Locations that use the most bandwidth

VoIP Protocols Skype Skype Architecture SN SN SN Super Node Active connection Backup connection SN connection SN SN SN Skype Client Skype Client

Mobil networks are not immune Skype launches mobile app for 50 handsets Not surprisingly, having its petition dismissed by the FCC chairman is not slowing Skype's ambition in the mobile market Skype is now offering a beta client of its VoIP calling software for some 50 handsets The client will include Skype to Skype calling, Skype In, Skype out, Group chat and presence. The company is launching the service in eight initial markets (one of which is the U.K.); Australia, France and Germany However the USA, has been excluded from the beta launch so far. Mobile revenue is about to decline!

Protocols Control Plan Protocol Application Module VoIP SIP Based Vonage, MSN Messenger, WindowsLive Messenger, YahooBT Yahoo, SIP Communicator, GizmoProject, FWD.Communicator, SJPhone, Packet8, Mediaring, BuddyTalk, Dialpad Chamaleon, Lycos, SIP User Agent, X Lite, X Pro Vonage, MrTalk, PacPhone, Peerio, VoIP Buster, VoIP Cheap, PhoneGaim, sipxphone, Ekiga (old GnomeMeeting), KCall, Kphone, Linphone, Minisip, OpenWengo, Cockatoo, Freeswitch,Yate H323 based NetMeeting, SJPhone, WebTalk, Open H323, CallGen323, Ekiga (old GnomeMeeting), Freeswitch, Yate

Over 90+ P2P Services SKYPE BASED Skype SkypeIn SkypeOut GOOGLE GoogleTalk NET2PHONE Net2Phone IAX IAX Phone,Freeswitch,Yate, Kiax,Moziax MEGACO, MGCP, SCCP, SKINNY, P2P SYSTEMS BITTORRENT BitTorrent, ABC, AllPeers, Azureus, BitComet, BitLord, BitSpirit, BitTornado, Burst!, Deluge, FlashGet, G3Torrent, Halite, KTorrent, LimeWire, MLDonkey, Opera, QTorrent, rtorrent, TorrentFlux, Transmission, Tribler, Thunder, µtorrent Direct Connect Direct Connect, NeoModus, SababaDC, DC++, BCDC++, ApexDC++, StrongDC++ ARES AresGalaxy, Warez P2P, Filecroc edonkeye edonkey2000, amule, emule, emuleplus, FlashGet, Hydranode, imesh, Jubster, IMule, Lphant, MLDonkey, Morpheus, Pruna, xmule Gnutella Acquisition, BearShare, Cabos, FrostWire, Gnucleus, Grokster, gtk gnutella, imesh, Kiwi Alpha, LimeWire, MLDonkey, Morpheus, Poisoned, Swapper, XoloX Gnutella2 Adagio, Caribou, Gnucleus, imesh, Kiwi Alpha, MLDonkey, Morpheus,TrustyFiles FastTrack gift, Grokster, imesh, Kazaa, Kceasy, Mammoth, MLDonkey, Poisoned Napster Napigator, Napster Manolito Blubster, Piolet OpenNAP WinMX, Utatane, XNap, Lopster, WinLop,Napster IM CHAT SYSTEMS OSCAR (AIM/ICQ), IRC, Skype, Yahoo!Messenger, Live Messenger, XMPP/JABBER Module E Mail POP, SMTP, IMAP

VoIP Security What will change tomorrow?

VoIP Security What about access to Emergency E911 and E999 services? VoIP calls do not connect to emergency services, E911 Emergency response centers cannot track call details or caller locations Most P2P and VoIP operators today cannot comply to these requirements Security Risks Encrypted P2P is a recognized threat to National Security Major US corporations are banning P2P to protect information/illegal data transmission Many Countries want to ban illegal VoIP for its involvement in terrorism and money laundering activities

VoIP providers must give access to 999 and 112 Ofcom today confirmed that from 8th September 2008, Voice over Internet Protocol (VoIP) services that allow users to make calls to normal national phone numbers must also have the ability to connect to 999 and 112 Ofcom wants to ensure that users of mainstream VoIP services are not put in danger as a result of trying to call 999 or 112 using a service that does not offer them access. If consumers had to then locate an ordinary landline or mobile phone, they might face a delay of seconds or even minutes in getting through to the emergency services, which could prove critical The new rules follow research, where Ofcom found that as many as 78% of VoIP users who cannot currently use their service to call 999 or 112 either thought an emergency call was possible, or did not know whether or not this was the case CTO (Commonwealth Telecommunications Organization) & CANTO (Caribbean Telecommunications Organization) are both in favor of regulation for VoIP

The Telco Skype Killer AT&T, in cahoots with 10 to 15 other incumbent carriers including BT, Deutsche Telecom, and NTT, is allegedly planning to launch a Skype killer Incumbents would offer a VoIP client that will work on incumbent broadband and 3G wireless pipes, using a backend to allow people to make free phone calls to anyone logged into it, similar to AIM, Yahoo, MSN, and Google. Maybe another way to think of this, is this would be the VSTN (VoIP standard telephone network) to the PSTN Anyway, the crystal ball says Skype Killer will be launched in 2009, run on broadband connections and on top of 3G/4G wireless connections (which are, after all, broadband), extended to other mobile phones eventually, and be used as a hook to sell other services such as video By Doug Mohney

COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT INTERNATIONAL TELECOMMUNICATIONS UNION UNDESA GLOBAL ALLIANCE FOR ICT AND DEVELOPMENT Multi Stakeholder Panels on Broadband Technologies and Cybersecurity 27th May 2008 GENEVA Thank you, any questions? VOICE OVER IP (VoIP) Presented by Graham Butler President & C.E.O Bitek International Inc www.bitek.com World Summit on the Information Society THE NATIONAL COST OF VoIP BYPASS