By: Christopher Henderson.  What is VoIP?  How is it being used?  VoIP’s main Security Threats.  Availability of Service  Integrity of Service 

Slides:



Advertisements
Similar presentations
Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Advertisements

Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
1 Voice over Internet Protocol (VoIP) Security Affects on the IP Network Architecture Conference ICS – Wireless Group Meeting Tempe, Arizona.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Secure VoIP. Outline Who? CUBE Members Why? Motivation What? Project Description How? Design and Implementation.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
1 VOIP Network Threats Let the subscribers beware Gerard Wilkes October 24, 2006.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
Security in IP telephony (VoIP) David Andersson Erik Martinsson.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Deployment of the VoIP Servers BY: Syed khaja Najmuddin Ahmed Anil Kumar Marikukala.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
VoIP Security Sanjay Kalra Juniper Networks September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 3 VoIP Issues.
Joel Maloff Phone.com February, 2012.
1 Wireless LAN Security Kim W. Tracy NEIU, University Computing
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
VOIP ENGR 475 – Telecommunications Harding University November 16, 2006 Jonathan White.
Voice & Data Convergence Network Services January 11, 2001.
Securing your IP based Phone System By Kevin Moroz VP Technology Snom Inc.
Saumil Shah IEOR 190G 3/19/08.  Vonage is a VoIP(voice over IP) company that provides telephone service via a broadband connection.  In order to use.
October 10-13, 2006 San Diego Convention Center, San Diego California Taking IP Security to the Next Level Real-time threat mitigation.
VOIP (Voice Over Internet Protocol) CDA 4527 Fall 2006.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
VoIP Voice over Internet Protocol
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Voice over IP in the Enterprise. What is VOIP? The use of data networks to carry voice without a loss of sound quality The use of data networks to carry.
By Will Peeden.  Voice over Internet Protocol  A way to make phone calls over the internet.  A way to bypass the standard phone company and their charges.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
IP Telephony
Voice over IP by Rahul varikuti course instructor: Vicky Hsu.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
March 2003 Slide Security (Again, Sorry) Darrin Miller
Enterprise-Class Telephony on Wireless LANs Tom Alexander CTO VeriWave, Inc.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
Voice Over Internet Protocol
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
Voice over Internet Protocol Presenter: Devesh Patidar Arunjay Singh August 2, 2009.
Track A: Network Security 9AM-10AM May 6, 2004 Security And Next Generation VoIP George G. McBride Senior Manager, Security Practice Lucent Technologies.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 11 – VoIP Hardware.
Voice over IP. ECE 499VoIP2 Introduction Basics of VoIP Comparisons with current phone systems VoIP Protocols VoIP Issues Telephone Regulation Future.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
Presented by Maria Shah. Road Map  VoIP Benefits  VoIP Protocols  VoIP Analysis  Advantages  Disadvantages  Implementing  Security  Summary.
A Listener Among the Static: Christian Prescott Gabriel Fair Security and Voice over IP.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Voice Over Internet Protocol Nelson Kattula Computer Science, Masters.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Presentation transcript:

By: Christopher Henderson

 What is VoIP?  How is it being used?  VoIP’s main Security Threats.  Availability of Service  Integrity of Service  Eavesdropping  Securing VoIP and The 5 Simple Steps.  Questions and Comments.

 VoIP stands for Voice-over IP  VoIP “is the routing of voice conversations over the Internet or through any other IP-based network.” (Wikipedia)  Implemented over WLAN using soft phones.  At its core VoIP is a Data Network.

 Many companies are starting to adopt VoIP services because of the reduced cost – no telephone system needed.  Services such as T-Mobile’s Hotspots. Wireless Phones using VoIP from WLAN access points – allows use of phone without using minutes.  Computer services such as Skype allow free Internet Phone Calls across the world using VoIP.

With VoIP being essentially a data network many of the security threats for the service are classic network security threats that have been modified to take advantage of the VoIP specific applications and protocols.  Availability of Service  Integrity of Service  Eavesdropping

 VoIP requires a high Quality of Service (QoS).  Basic Denial of Service (DoS) attacks can cripple a VoIP service.  DoS attacks can be centered around VoIP protocols or applications. A simple attack consists of an attacker setting multiple phones to forward a single request message until all the phones system resources are used.

 VoIP requires a secure connection between users.  VoIP protocols (SIP and RTP) have weak end- to-end user authentication.  Attackers can exploit this by hacking guest or user accounts. Using these hacked accounts, attackers can commit ‘toll fraud’ by placing a call on the account’s expense and ‘identity fraud’ by using the account’s phone number impersonating that user.

 Eavesdropping consists of two steps:  Intercepting protocol (SIP or RTP) packets  Translation into plain speech  Protocol packets can easily be intercepted with a packet sniffer.  VoIP protocols does not have encryption. Thus allowing easy translation into real speech.

Since VoIP is essentially a data network many of the easiest ways of securing the service include securing the network, just aimed specifically at VoIP. John Edwards outlined 5 simple steps in his article “Secure Your Wireless VoIP System”

1. Look for equipment that uses newer wireless security standards. Wi-Fi Protected Access (WPA), WPA2, and IEEE i have met many powerful security benchmarks. 2. WPA, WPA2, and i have authentication and encryption built in. WPA2 and i support the Advanced Encryption Standard (AES). 3. Use Multilevel Protection Embed. Have a hand set encrypt audio while i authenticates and encrypts wireless connections. 4. Use a VoIP firewall. 5. Train employees how to use VoIP technologies, and the security threats.

Edwards, John. “A Guide to Understanding the VoIP Security Threat.” VoIP- News. February 14, Tippit, Inc. December 1, Edwards, John. “Secure Your Wireless VoIP System.” VoIP-News. February 14, Tippit, Inc. December 1, news.com/feature/ways-secure-wireless-voip / news.com/feature/ways-secure-wireless-voip / Materna, Bogdan. “Making Sense of VoIP Security Threats.” TMCnet. November 22, Technology Marketing Corporation. November 29, Piscitello, David. “How to protect your VoIP network.” NETWORKWORLD. May 15, Network World, Inc. November 28, security.html?page=1 security.html?page=1 VoIP Security Alliance.