September 19, 2006speermint interim1 VoIP Threats and Attacks Alan Johnston.

Slides:



Advertisements
Similar presentations
Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Advertisements

Voice Security Interop 2009 Mark D. Collier SecureLogix Corporation
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
CANTO – 2006 Information Security and Voice over IP (VoIP) Robert Potvin, CISSP VP - Strategic Consulting June 21st, 2006.
Voice over IP Fundamentals
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP)
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
The study and demonstration on SIP security vulnerabilities Mahidhar Penigi Vamsi Krishna Karnati.
Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven.
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 5 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
RSVP Cryptographic Authentication "...RSVP requires the ability to protect its messages against corruption and spoofing. This document defines a mechanism.
1 © 2004, Cisco Systems, Inc. All rights reserved IP Telephony Security Cisco Systems.
SIP Security Issues: The SIP Authentication Procedure and its Processing Load Stefano Salsano, DIE — Universit à di Roma “ Tor Vergata ” Luca Veltri, and.
Voice over IP and IP telephony Network convergence – Telephone and IT – PoE (Power over Ethernet) Mobility and Roaming Telco – Switched -> Packet (IP)
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
Securing Unified Communications Mor Hezi VP Unified Communications AudioCodes.
© 2006 Solegy LLC Internal Use Only Getting Connected with SIP Encryption _______________________________ By Eric Hernaez Solegy LLC May 16, 2007.
Session Initiation Protocol (SIP) By: Zhixin Chen.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
SIP Security Matt Hsu.
1 VOIP Network Threats Let the subscribers beware Gerard Wilkes October 24, 2006.
Presented by: Shivanagouda Biradar Yousof Pakzad This presentation is submitted to Prof. El Saddik in partial fulfillment of the requirements for the course.
Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen Dr. Mark Stamp SJSU - CS 265 Spring 2003 STEM is proposed as a solution to network vulnerabilities,
Rajeev Bevara CS-555 Security Threats in VoIP. What is VoIP ? ➔ VOIP - Voice Over Internet Protocol. ➔ Delivery of voice communications and multimedia.
SIP Greg Nelson Duc Pham. SIP Introduction Application-layer (signaling) control protocol for initiating a session among users Application-layer (signaling)
VoIP Security Sanjay Kalra Juniper Networks September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 3 VoIP Issues.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Common Misconceptions Alan D. Percy Director of Market Development The Truth of Enterprise SIP Security.
ECRIT interim meeting - May Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats Hannes Tschofenig Henning.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Agenda Voice Security Architecture VoIP Risk VoIP threats Service disruption Design Consideration Attacks.
IIT Indore © Neminath Hubballi
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Session Initiation Protocol Team Members: Manjiri Ayyar Pallavi Murudkar Sriusha Kottalanka Vamsi Ambati Girish Satya LeeAnn Tam.
Voice over Internet Services and Privacy. Agenda Problem Description Scope Recommendations.
4 Intrusion Detection Systems in VoIP Selected Topics in Information Security – Bazara Barry.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
VoIP Security Assessment: Methods and Tools H. Abdelnur, V. Cridlig, R. State and O. Festor Madynes, LORIA-INRIA.
1 A high grade secure VoIP using the TEA Encryption Algorithm By Ashraf D. Elbayoumy 2005 International Symposium on Advanced Radio Technologies Boulder,
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Introduction to SIP Based ENUM IP Telephony Infrastructure 資策會 網路及通訊實驗室 Conference over IP Team 楊政遠 博士
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Critical Danger: An Introduction to Cross Site Scripting Attacks for People Who Do not Know what Cross Site Scripting Attacks Are.
CS426Network Security1 Computer Security CS 426 Network Security (1)
Presented By Team Netgeeks SIP Session Initiation Protocol.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
7/6/20061 Speermint Use Case for Cable IETF 66 Yiu L. Lee JULY 2006.
1 SPEERMINT Use Cases for Cable IETF 66 Montreal 11 JULY 2006 Presented by Yiu L. Lee.
Deployment of Snort IDS in SIP based VoIP environments Jiří Markl Jaroslav Dočkal.
Design and implementation of SIP-aware DDoS attack detection system By: Arif Iqbal.
Voice over IP B 林與絜.
ISACA – Charlotte Chapter June 3, 2014 Mark Krawczyk, CISA, CISSP, CCNA.
Lesson 7: Network Security and Attacks. Computer Security Operational Model Protection = Prevention+ (Detection + Response) Access Controls Encryption.
CSE5803 Advanced Internet Protocols and Applications (14) Introduction Developed in recent years, for low cost phone calls (long distance in particular).
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
17 February 2016 SIPPING - IEPREP Joint Meeting Fred Baker - IEPREP co-chair Rohan Mahy - SIPPING co-chair.
The Session Initiation Protocol - SIP
Analysis of SIP security Ashwini Sanap ( ) Deepti Agashe ( )
1 Personal Mobility Management for SIP-based VoIP Services 王讚彬 國立台中教育大學資訊工程學系
IP Telephony (VoIP).
The study and demonstration on SIP security vulnerabilities
Remote Connectivity and VoIP Hacking
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
Henning Schulzrinne Columbia University
Presentation transcript:

September 19, 2006speermint interim1 VoIP Threats and Attacks Alan Johnston

September 19, 2006speermint interim2 VoIP as an Application VoIP is an Internet Application Subject to both voice specific AND Internet attacks –E.g. flooding DoS attack could be INVITEs or TCP SYN packets Need to secure each layer independently –Defense in Depth This Presentation uses VOIPSA ( “VoIP Security and Privacy Threat Taxonomy” as outline

September 19, 2006speermint interim3 Eavesdropping Threats Call Pattern Tracking –Besides signaling, DNS queries can reveal information Traffic Capture –Number Harvesting E.g. ENUM with Contact URIs or AORs with identifying information –Conversation Reconstruction If Perfect Forward Secrecy (PFS) is not used, content can be stored for later decryption –Voic Reconstruction Current low levels of authentication –Fax Reconstruction –Video Reconstruction –Text Reconstruction

September 19, 2006speermint interim4 Interception and Modification Call Black Holing –Authentication of responses critical Call Rerouting –How many intermediaries Fax Alteration Conversation Alteration –Authentication of RFC 2833 DTMF tones Conversation Degrading –RTCP protection as well as RTP Conversation Impersonation and Hijacking –Human to human authentication a la ZRTP False Caller Identification –Trivial in PSTN today, commonplace in –Who is asserting identity as important as what identity is being asserted See RFC 4474 to see how to do this correctly

September 19, 2006speermint interim5 Intentional Interruption of Service Denial of Service –Centralized servers make for better DoS targets (e.g. SBCs) –Request Flooding User Call Flooding User Call Flooding Overflowing to Other Devices –Overload voice mail storage Endpoint Request Flooding Endpoint Request Flooding after Call Setup Call Controller Flooding Request Looping –Setting Max-Forwards to 69 Directory Service Flooding –DNS and ARP poisoning

September 19, 2006speermint interim6 Interruption of Service Continued –Malformed Requests and Messages Disabling Endpoints with Invalid Requests Injecting Invalid Media into Call Processor Malformed Protocol Messages –For SIP, see RFC 4475 Torture Tests –QoS Abuse QoS can easily work both ways… –Spoofed Messages Faked Call Teardown Message Faked Response –Call Hijacking Registration Hijacking –Digest does not provide registration authentication Media Session Hijacking Server Masquerading

September 19, 2006speermint interim7 –Network Services DoS –Underlying Operating System/Firmware DoS –Distributed Denial of Service Use ICE for media authorization to avoid accidental media DoS Other Interruptions of Service –Loss of Power –Resource Exhaustion –Performance Latency and Metrics Interruption of Service Continued

September 19, 2006speermint interim8 Non-Technical Threats Social Threats –Misrepresentation Misrepresenting Identity Misrepresenting Authority Misrepresenting Rights Misrepresenting Content –Theft of Services –Unwanted Contact Harrassment Extortion Unwanted Lawful Content Including VoIP SPAM and Other Subjectively Offensive Content Service Abuse Physical Intrusion

September 19, 2006speermint interim9 Selected SIP Specific Topics ACK and CANCEL can not be authenticated by challenge –Require Offer/Answer in INVITE/200 OK –Ignore CANCELs Non-symmetric routing makes response authentication extremely difficult –Use rport or connection-reuse Certificates are good unless –Not properly validated –Not properly correlated to host names

September 19, 2006speermint interim10 Summary VoIP is a new application –New is not good in security terms… VoIP devices and software are new Security standards are still being developed in IETF –Secure RTP media –Usage of Secure SIP and TLS VoIP threats are much more Internet than PSTN