Rajeev Bevara CS-555 Security Threats in VoIP. What is VoIP ? ➔ VOIP - Voice Over Internet Protocol. ➔ Delivery of voice communications and multimedia.

Slides:



Advertisements
Similar presentations
Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Advertisements

Voice Security Interop 2009 Mark D. Collier SecureLogix Corporation
Presented By:- Yash Jariwala Paras Patel Deep Amrutiya.
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
1 MITP 458 : Information Security and Assurance VOIP Xeon Group Rohit Bhat Ryan Hannan Alan Mui Irfan Siddiqui.
The study and demonstration on SIP security vulnerabilities Mahidhar Penigi Vamsi Krishna Karnati.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Voice over IP and IP telephony Network convergence – Telephone and IT – PoE (Power over Ethernet) Mobility and Roaming Telco – Switched -> Packet (IP)
STIR Secure Telephone Identity. Context and drivers STIR Working Group Charter Problem Statement Threats Status of work Related work and links Introduction.
Securing Unified Communications Mor Hezi VP Unified Communications AudioCodes.
September 19, 2006speermint interim1 VoIP Threats and Attacks Alan Johnston.
Presented by Kathleen Ritchie COMP 1631 – Winter 2011 Mount Allison University.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
1 VOIP Network Threats Let the subscribers beware Gerard Wilkes October 24, 2006.
Security in IP telephony (VoIP) David Andersson Erik Martinsson.
October 6 University Faculty of Information Systems & Computer Science.
Chapter Threats in Networks Network Security / G. Steffen.
Blue Swann Technologies. Blue Swann is the Future The critical success factor for business is “reach” and not size. Blue Swann is specifically designed.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Common Misconceptions Alan D. Percy Director of Market Development The Truth of Enterprise SIP Security.
Web2forDev Learning Opportunity [venue], [date] CTA is an ACP-EU institution working in the field of information for development. It operates under the.
The Voice Security Company Kirk Vaughan Product Director –VoIP SIP Application Security.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
VOIP (Voice Over Internet Protocol) CDA 4527 Fall 2006.
Presenters :Deepak Yadav Voice Over Internet Protocol.
Agenda Voice Security Architecture VoIP Risk VoIP threats Service disruption Design Consideration Attacks.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
VoIP Voice over Internet Protocol
Basics of IP Telephony Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Protecting VoIP networks against denial of service and service theft Henning Schulzrinne with Gaston Ormazabal (Verizon) and IRT graduate students Dept.
VoIP Security Assessment: Methods and Tools H. Abdelnur, V. Cridlig, R. State and O. Festor Madynes, LORIA-INRIA.
1 A high grade secure VoIP using the TEA Encryption Algorithm By Ashraf D. Elbayoumy 2005 International Symposium on Advanced Radio Technologies Boulder,
 he_shape_shifting_future_of_the_mobile_pho ne.html he_shape_shifting_future_of_the_mobile_pho.
DUE Voice over IP (VoIP) Linksys Ernie Friend- FSCJ.
By Will Peeden.  Voice over Internet Protocol  A way to make phone calls over the internet.  A way to bypass the standard phone company and their charges.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Voice over IP Are we there yet ? Presented by: Mark Caswell, Empire Technologies, LLC. Voice over IP.
Telephony Natalie LeCompte Kara Oliver Emily Taylor Joe Thrower.
Critical Danger: An Introduction to Cross Site Scripting Attacks for People Who Do not Know what Cross Site Scripting Attacks Are.
Chapter 4 Application Level Security in Cellular Networks.
IP Telephony
David Byrd VP Marketing and Product Management January 23, 2007 David Byrd VP Marketing and Product Management January 23, 2007 Assessing SIP Trunking.
Voice over IP by Rahul varikuti course instructor: Vicky Hsu.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
VoIP Privacy April ©2007 BroadSoft®, Inc. Proprietary and Confidential; Do Not Copy, Duplicate, or Distribute 2 About BroadSoft Market Leader Market.
ISACA – Charlotte Chapter June 3, 2014 Mark Krawczyk, CISA, CISSP, CCNA.
VoIP -Voice over Internet Protocol COE 341 Self-Learning Assignment By: Ayman Al-Bassam Amar Farouk Merah
Voice Over IP (VoIP): Internet Telephony Dr. Najla Al-nabhan 1.
Chapter 6 Remote Connectivity and VoIP Hacking Last modified
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 1 – Introduction to VoIP.
Analysis of SIP security Ashwini Sanap ( ) Deepti Agashe ( )
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
Voice Over IP (VoIP): Internet Telephony. Chapter Objectives.
Strand 3 Maya Mangindin 3.5 Public and Personal Communications.
A Listener Among the Static: Christian Prescott Gabriel Fair Security and Voice over IP.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
MISY 3312: Introduction to Telecommunications Summer 2012 VoIP
Some Important Network Characteristics for Security
Deploying IP Telephony
The study and demonstration on SIP security vulnerabilities
موسسه آموزش عالی علمی صنعتی خراسان دانشگاه جامع علمی کاربردی
26/03/1388.
Threats in Networks Jagdish S. Gangolly School of Business
VoIP
Presentation transcript:

Rajeev Bevara CS-555 Security Threats in VoIP

What is VoIP ? ➔ VOIP - Voice Over Internet Protocol. ➔ Delivery of voice communications and multimedia sessions over Internet. ➔ It is also referred as IP telephony, Internet telephony. ➔ The first ever internet VoIP program was released in February 1995 by VocalTec Communications. ➔ As the years passed VOIP has gained substantial popularity.

Highlights of VOIP ★ Cheaper when compared to that of POTS - Plain Old Telephone Service. ★ We get a lot of other features with NO EXTRA COST. ○Unlimited long Distances ○Caller ID ○Voic ○conferencing

Types of VOIP services ➔ Computer-Based VOIP Service ➔ Residential VOIP Service ➔ Mobile VOIP Service ➔ Business VOIP Service and Solutions

Problems of VOIP VOIP phone service is less reliable and most importantly less secure when compared with ordinary phone service. ❖ Voice Quality ❖ Bandwidth Dependency ❖ Power Dependency ❖ Emergency Calls ❖ SECURITY

Security threats in VOIP Voice over IP Security a book published by Cisco Press identifies 4 main categories of security threats. ➢ Threats against availability ➢ Threats against confidentiality ➢ Threats against integrity ➢ Threats against social context

Security threats in VOIP ★ Threats against availability ○These threats aim at VOIP service interruption, typically in the form of Denial of Service (DOS). ■Call flooding ■Protocol Fuzzing ■Call hijacking ■Spoofed messages ■Server impersonating

Security threats in VOIP ★ Threats against confidentiality ○These threats provide unauthorized means of capturing identities, patterns and credentials ■Eavesdropping ■Call Pattern Tracking ■Data Mining ■Reconstruction

Security threats in VOIP ★ Threats against integrity ○These threats allow alteration of initial message and medias in the middle of the network ■Message Alteration ●Call rerouting ●Call Black holing ■Media Alteration ●Media Injection ●Media Degrading

Security threats in VOIP ★ Threats against social context ○These threat allow attackers to misrepresent himself as a trusted entity ■VOIP Phishing aka Vishing ■Registration hijacking ■SPIT (Spam over Internet Telephony)

Summary VoIP is a relatively new technology. It is still considerably insecure than ordinary phone services. It has to deal with all the security problems of traditional data network plus the new security problem caused by new protocols and components. Businesses and individuals need to take necessary precautions when using this technology.

Questions ???

References ➔ employees_and_offices/what_voip_can_do_for_you/index.html employees_and_offices/what_voip_can_do_for_you/index.html ➔ ➔ ➔ ➔ ➔ Patrick Park, (2008)Voice over IP Security. Security best practices derived from deep analysis of the latest network threats, Cisco Press.