Students: Yuri Manusov, Boris Umansky, Yevgeni Fishman Academic Advisor: Prof. Yuval Alovich Industry Advisor: Yuri Granovski With Motorola, Israel.

Slides:



Advertisements
Similar presentations
SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Advertisements

Click to continue Network Protocols. Click to continue Networking Protocols A protocol defines the rules of procedures, which computers must obey when.
Client Server. Server Client Model Servers- Wait for requests from clients - Sends requested data to client - May have to communicate with other servers.
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
CCNA – Network Fundamentals
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Voice over IP Skype.
VoIP Voice Over IP Group 1: Mero Avanessian Tenghan Jiang Wendy Tran.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin APPENDIX B NETWORKS AND TELECOMMUNI CATIONS APPENDIX B NETWORKS.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Secure VoIP based mobile communication for Android™ phones
Network Layer and Transport Layer.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Academic Advisor: Dr. Yuval Elovici Professional Advisor: Yuri Granovsky Team: Yuri Manusov Yevgeny Fishman Boris Umansky.
Application Design. Academic Advisor: Dr. Yuval Elovici Professional Advisor: Yuri Granovsky Team: Yuri Manusov Yevgeny Fishman Boris Umansky.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Asterisk based web real time communication Advisor : Lian-Jou Tsai Student : Jhe-Yu Wu.
TCP/IP Web Design & Layout January 23, TCP/IP For Dummies  The guts and the rules of the Internet and World Wide Web. A set of protocols, services,
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Network Technology Associate v2.0.
Presenters :Deepak Yadav Voice Over Internet Protocol.
Human-Computer Interface Course 5. ISPs and Internet connection.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
VoIP Voice over Internet Protocol H.323 SIP RTP SDP IAX SRTP Skype And a lot more…
COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
Network Services Networking for Home & Small Business.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Version 3.0 Module 11 TCP Application and Transport.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Asterisk based web real time communication Advisor : Lian-Jou Tsai Student : Jhe-Yu Wu.
H.323 An International Telecommunications Union (ITU) standard. Architecture consisting of several protocols oG.711: Encoding and decoding of speech (other.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
A ISP free video conferencing application for mobile devices using wireless and VoIP Technology.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Internet Architecture and Governance
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
浩 揚 網 通 HW Internet Telephone & Telecommunication Co., Ltd. SIP (Session Initiation Protocol) VoIP solution (ATA)
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
E.S. Cherdyntsev MULTIMEDIA NETWORKS. Enhancing the TCP/IP Protocol Stack to Support Functional Requirements of Distributed Multimedia Applications Chapter.
IP Telephony (VoIP).
WebRTC enabled multimedia conferencing and collaboration solution
Module 8: Securing Network Traffic by Using IPSec and Certificates
Some bits on how it works
Client-Server Interaction
Net 431: ADVANCED COMPUTER NETWORKS
Chapter 3: Windows7 Part 4.
RTP and RTSP Realtime Transport Protocol
Lecture 2: Overview of TCP/IP protocol
Module 8: Securing Network Traffic by Using IPSec and Certificates
Unit 8 Network Security.
Computer Networks Protocols
Presentation transcript:

Students: Yuri Manusov, Boris Umansky, Yevgeni Fishman Academic Advisor: Prof. Yuval Alovich Industry Advisor: Yuri Granovski With Motorola, Israel

Problem definition: More and more telecommunication providers use VoIP infrastructure. Eavesdropping to someone conversation is very simple (requires connection to internet and packet capture software). Spam over the phone becomes more and more popular. Business clients are interested in more secured telecommunication services. Telecommunication providers interested to supply them with these services.

Available Solutions: Nowadays SIP(Session Initiation Protocol) is widely used for VoIP. The caller sends a request to SIP server with the callees nickname, receives its IP as a response and establishes P2P communication between two hosts. Callees nickname Callees IP Conversation

Available Solutions(cont.): There are couple solutions for VoIP security available nowadays. SRTP and ZRTP protocols are both secured type of RTP (Real-time Transport Protocol), which is the 4 th layer in VoIP. Main problems of these protocols: Clients shall perform initial master key exchange. Not all SIP clients supports these protocols. Special hardware for every client required to create strong master key. There is no well known service for communication control management.

Project Requirements [R1]Rule Based Authorization The system shall provide specified authorization of users according to the rules kept in the configuration storage. Rules shall be user based or time based. [R2]Security The system shall provide clients with the ability to establish IPSec secured session, or an unsecured session, according to the rules kept in the configuration storage.

Project Requirements(cont.) [R3]Dynamic Configuration The system shall provide users with the ability to control their own configurations, more specifically, the rules of the authorization, and the rules of the security. The system shall provide the users with GUI in order to do that. [R4] Communication History Storage: The system shall store all the history of the communications that took place.

Telecommunication Provider Server Our Project: JBOSS Server JSLEE Server SIP Resource Adapter Communication Control Application IP Host 1 SIP ClientEnabler IPSec Module IP Host 2 SIP ClientEnabler IPSec Module Data Storage Control Rules Manager SIP Request SIP Request Event Pre-shared Key Host 2 IP Configuration HTTP IPSec Communication

Our Project(cont.) Project Scope: Communication Control Application: JSLEE service that provides Rules Based authorization and communication history storage as described in requirements [R1],[R4]. Enabler: Application, running on the host station, that will configure IPSec communication between clients [R2]. Data Storage: SQL based DB to store all the required data [R3],[R4]. GUI for Configuration Control Application [R3]. Project uses: SIP client, SIP RA and SLEE server provided by Mobicents, IPSec module provided by OS. Out of Scope: Registration of users. Communication between SIP Server and Communication Control Application.