Columbia - Verizon Research Securing SIP: Scalable Mechanisms For Protecting SIP-Based Systems



Similar documents
Verizon Columbia Research on VoIP Security A Model Academia/Industry Collaboration. Gaston Ormazabal. Verizon Laboratories.

Large Scale SIP-aware Application Layer Firewall

Columbia - Verizon Research Secure SIP: Scalable DoS Prevention Mechanisms for SIP- based VoIP Systems, and Validation Test Tools

Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems

Basic Vulnerability Issues for SIP Security

Voice Over IP (VoIP) Denial of Service (DoS)

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Recommended IP Telephony Architecture

Best Practices for Securing IP Telephony

Ram Dantu. VOIP: Are We Secured?

A Model-based Methodology for Developing Secure VoIP Systems

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

Radware s Behavioral Server Cracking Protection

TLS and SRTP for Skype Connect. Technical Datasheet

ETM System SIP Trunk Support Technical Discussion

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information

A S B

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Chapter 9 Firewalls and Intrusion Prevention Systems

DoS/DDoS Attacks and Protection on VoIP/UC

SIP Trunking Configuration with

Overview - Using ADAMS With a Firewall

Securing SIP Trunks APPLICATION NOTE.

Voice Over IP and Firewalls

Overview - Using ADAMS With a Firewall

A Lightweight Countermeasure to Cope with Flooding Attacks Against Session Initiation Protocol

Firewalls, Tunnels, and Network Intrusion Detection

Implementing VoIP support in a VSAT network based on SoftSwitch integration

Sonus Networks engaged Miercom to evaluate the call handling

Next Generation. VoIP Application Firewall.

Voice over IP Security

TDC s perspective on DDoS threats

Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8

How To Implement A Cisco Vip From Scratch

VoIP Security. Threats and Countermeasures. Eric Chen NTT Information Sharing Platform Laboratories & VOIPSA Technical Board of Advisors

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Building A Secure Microsoft Exchange Continuity Appliance

Firewalls and Intrusion Detection

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Security Technology White Paper

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

A VoIP Traffic Monitoring System based on NetFlow v9

Networking for Caribbean Development

NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist David Schwartz Director, Telephony Research

CS5008: Internet Computing

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

SIP Trunking The Provider s Perspective

Threat Mitigation for VoIP

Ingate Firewall/SIParator SIP Security for the Enterprise

Deployment of Snort IDS in SIP based VoIP environments

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

Stateful Firewalls. Hank and Foo

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Overview. Firewall Security. Perimeter Security Devices. Routers

SIP Security Controllers. Product Overview

CSCI 4250/6250 Fall 2015 Computer and Networks Security

IP Phone Security: Packet Filtering Protection Against Attacks. Introduction. Abstract. IP Phone Vulnerabliities

Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology

BEng (Hons) Telecommunications. Examinations for / Semester 1

On-Premises DDoS Mitigation for the Enterprise

Firewall Design Principles

VoIP Trunking with Session Border Controllers

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios

Chapter 8 Security Pt 2

Second-generation (GenII) honeypots

Session Border Controllers in Enterprise

Evaluation of Security and Countermeasures for a SIP-based VoIP Architecture

SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.

One Server Per City: C Using TCP for Very Large SIP Servers. Kumiko Ono Henning Schulzrinne {kumiko, hgs}@cs.columbia.edu

VOICE OVER IP SECURITY

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Strategies to Protect Against Distributed Denial of Service (DD

TECHNICAL CHALLENGES OF VoIP BYPASS

FortKnox Personal Firewall

FIREWALLS IN NETWORK SECURITY

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Radware s Attack Mitigation Solution On-line Business Protection

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

PROFESSIONAL SECURITY SYSTEMS

UK Interconnect White Paper

Securing Business-Critical Network and Application Infrastructure NET&COM Feb 2006 Gopala Tumuluri Foundry Networks

Complete Protection against Evolving DDoS Threats

Network Simulation Traffic, Paths and Impairment

BlackRidge Technology Transport Access Control: Overview

Network Defense Tools

CS 356 Lecture 16 Denial of Service. Spring 2013

SecurityDAM On-demand, Cloud-based DDoS Mitigation

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

How to make free phone calls and influence people by the grugq

OpenScape Session Border Controller V7

EarthLink Business SIP Trunking. NEC SV8100 IP PBX Customer Configuration Guide

SIP Intrusion Detection and Response Architecture for Protecting SIP-based Services

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Transcription:

Columbia - Verizon Research Securing SIP: Scalable Mechanisms For Protecting SIP-Based Systems Henning Schulzrinne Eilon Yardeni Somdutt Patnaik Columbia University CS Department Gaston Ormazabal Verizon Labs David Helms CloudShield Copyright Verizon Laboratories 2006 All Rights Reserved

Agenda Denial of service threats: RTP & SIP Pinhole filtering SIP DOS detection and mitigation strategy Implementation: CloudShield Testing methodology and results 2

Background Telephony services migrating to IP becoming attractive DoS targets Attack traffic traversing the perimeter reduces availability of signaling and media for VoIP service Attack targets: SIP infrastructure elements (proxy, softswitch, SBC) End-points (SIP phones) Supporting services (e.g., DNS) Carriers need to solve perimeter protection problem for security of VoIP services Protocol-aware application layer gateway SIP DoS/DDoS attack detection and prevention Test tools verify performance & scalability 3

Goals Build a prototype of the fastest dynamic pinhole filter firewall for RTP media Study VoIP DoS for SIP signalling Definition define SIP specific threats Detection how do we detect an attack? Mitigation defense strategy and implementation Validation validate our defense strategy Generate requirements for future security network elements Generate the test tools and methodology strategies for their validation 4

Problem Overview Untrusted Trusted Filter I DPPM Filter II sipd SIP SIP SIP VoIP Traffic Attack Traffic RTP RTP 5

Scope of Our Research Scope of current work 6

Basic Strategy and Motivation Implementation flaws are easier to deal with: Systems can be tested before used in production Systems can be patched when a new flaw is discovered Attack signatures could be integrated with a firewall Protocol & flooding attacks are harder to defend against Commercially available solutions for general UDP/SYN flooding, but none for SIP address protocol and flooding attacks specifically for SIP 7

Main Focus of our Strategy VULNERABILITY: SIP over UDP spoofing SIP requests Registration/call hijacking Modification of media sessions Session teardown Request flooding Error message flooding SIP Method vulnerabilities STRATEGY: Two detection and mitigation filters Media: SIP-aware dynamic pinhole filtering SIP: Rule-based detection and mitigation filters 8

Media Filters Implemented large scale SIP-aware firewall using dynamic pinhole filtering Media filter as first-line of defense against DoS attacks: Only signaled media channels can traverse the perimeter End systems are protected against flooding by random RTP The RTP pinhole filtering approach is a good first-line of defense, but Signaling port is subject to attack 9

Ongoing - SIP DoS Detection and Mitigation Filters Authentication based - Return Routability Check For UDP use SIP's built-in digest authentication mechanism Use null-authentication when no shared secret is established Filter out spoofed sources Rate limiting Transaction based Thresholding of message rates INVITE Errors State Machine sequencing Filter out-of-state messages Allow in-state messages Dialog based Maintain a database of INVITE sources (Contacts) to verify and accept a BYE message only from legitimate source addresses Method vulnerability based 10

Mitigation Solution Overview Untrusted Trusted Filter I DPPM Filter II Filter II sipd SIP SIP SIP VoIP Traffic Attack Traffic RTP RTP 11

CloudShield CS-2000 10/100/1000 10/100 0 1 2 System Level Port Distribution Application Server Module Pentium 1GHz 1000 1000 3 4 ASM Backplane Gigabit Ethernet Interconnects D 0 DPPM D 1 P 0 E P 0 E D 0 D 1 DPPM Intel IXP 2800 1 E 2 1 E 2 Intel IXP 2800 12

CS-2000 Processing Pipeline Management Plane Functions Management; Visualization; Collaboration Control Plane Functions Data APIs; Reporting; Provisioning Data Plane Packet Operations Program Execution Silicon Database Pattern Matching Protocol Engines Stream Assembly Application Logic PKT PKT PKT PKT PKT PKT PKT PKT PKT PKT 13

Prototype Implementation Use network processor to filter RTP media and SIP authentication attempts to the proxy and rate-limit messages based on particular heuristics: Utilize wire-speed deep packet inspection Thresholds are kept internal in the DPPM State is only kept at CloudShield in CAM tables Use the firewall controlling proxy model for media filtering and the authentication filter Columbia's SIP Proxy sipd controls the CloudShield Deep Packet Inspection Server Utilize the Firewall Control Protocol to establish filters in real time Insert filters for Media Ports and SIP UAs that are being challenged 14

Pinhole Firewall Components Static Filtering Filtering of pre-defined ports (e.g., SIP, ssh) Dynamic Filtering Filtering of dynamically opened ports (e.g., RTP) Switching Layer Perform switching between the input ports Firewall Control Module Intercept SIP call setup messages Get RTP ports from the SDP Maintain call state Firewall Control Protocol The way the Firewall Control Module talks with the CloudShield Push dynamic table updates to the data plane Could be used by multiple SIP Proxies that control one or more CloudShield firewalls CS-2000 Data Plane Execution Part of SIP-proxy Executed in the Linux Control Plane 15

Integrated DDOS and Dynamic Pinhole Filter ASM sipd Linux server FCP/UDP CAM DDOS Table DPPM SIP CAM Static Table SIP DDOS CAM Dynamic Table Inbound Lookup Switch Outbound Drop 16

Integrated Testing and Analysis Tool Pinhole Filter Integrated End Point Tool Components SIPUA Test Suite Loader/Handler Establishes calls using SIP Sends 160 byte RTP packets every 20ms Settable to shorter interval if needed for granularity Starts RTP sequence numbers from zero Dumps call number, sequence number, current timestamp and port numbers to a file Scanning Probes nmap Automated Script based Control Software Timing Devices Data Analysis Module Analyze handler s file for initial and teardown call delays, Number of packets dropped before pinhole opening Number of packets crossing after pinhole closing Scan results for pinhole coverage Protocol Analyzer SNORT Graphical Displays 17

Integrated End Point Untrusted Trusted IEP Traffic Generator Control and Analysis SUT IEP Traffic Analyzer Port Scanning Probes Traffic Passed SNORT SIPUA Loader Signaling and Media Generation Media Port Scanning/Probing Traffic through Pinholes 4 SIPUA Handler Signaling and Media Generation Timing Synchronization 18

Testbed Architecture External Loaders (SIPUA) External Handlers (SIPUA) GigE Switch GigE Switch Controller Loader IEP Handler IEP SIP Proxy 19

Testing And Analysis Methodology Problem parameterized along two independent vectors Call Rate (calls/sec) Related to performance of SIP Proxy in Pentium Concurrent Calls Related to performance of table lookup in IXP 2800 Generate external load on the firewall SIPUA Loader/Handler in external load mode Generates thousands of concurrent RTP sessions For 30K concurrent calls have 120K open pinholes CAM table length is 120K entries Search algorithm finds match in one cycle When external load is established, run the IEP analysis SIPUA Loader/Handler in internal load mode Port scanning and Protocol analyzer Increment calls/sec rate Measure pinhole opening and closing delays Opening delay data provided in units of 20 ms packets Closing delay data provided in units of 10 ms packets Detect pinholes extraneously open 20

Pinhole Filter Data Results Concurrent calls Calls/Sec SIP Proxy SIP RAVE Open delay Close delay Open delay Close delay 10K 300 0.75 0 0.25 0 15K 300 0.74 0 0.33 0 20K 300 0.73 0 0.34 0 25K 300 0.75 0 0.26 0 30K 300 0.8 15.51 0.26 0 30K 200 0.83 0.02 21

Conclusions Demonstrated SIP vulnerabilities in media and signaling Implemented some carrier-class mitigation strategies Built a validation testbed to measure performance Need to generalize methodology to cover a broader range of cases and apply anomaly detection, pattern recognition and learning systems 22

Thank You! Henning Schulzrinne Eilon Yardeni Somdutt Patnaik Columbia University CS Department Gaston Ormazabal Verizon Labs David Helms CloudShield Copyright Verizon Laboratories 2006 All Rights Reserved