+ All Categories
Home > Documents > Analysis of SIP security

Analysis of SIP security

Date post: 07-Jan-2016
Category:
Upload: candie
View: 28 times
Download: 2 times
Share this document with a friend
Description:
Analysis of SIP security. Ashwini Sanap (006312787) Deepti Agashe (006331234). Agenda. Introduction SIP Entities and messages Security Mechanism Security Attacks Conclusion. Introduction. Session Initiation Protocol (SIP) Application Layer Signaling Protocol - PowerPoint PPT Presentation
16
Analysis of SIP security Ashwini Sanap (006312787) Deepti Agashe (006331234)
Transcript
Page 1: Analysis of SIP security

Analysis of SIP security

Ashwini Sanap (006312787)

Deepti Agashe (006331234)

Page 2: Analysis of SIP security

Agenda

Introduction SIP Entities and messages Security Mechanism Security Attacks Conclusion

Page 3: Analysis of SIP security

Introduction

Session Initiation Protocol (SIP)

Application Layer Signaling Protocol

Create, Terminate and Manage Session

Similar to HTTP (Request/Response)

SIP Identity (URI)

Page 4: Analysis of SIP security

SIP Entities and Messages

Page 5: Analysis of SIP security

Security Mechanisms

SIP Security

Application Layer Transport Layer Network Layer

HTTP Basic Authentication

Secure MIMEHTTP Digest Authentication

TLS IPSec

Page 6: Analysis of SIP security

Digest Authentication

Challenge based AuthenticationEncryption

not provided

Confidentiality lost

Page 7: Analysis of SIP security

Secure MIME

Multipurpose Internet Mail Extension End to End security Encrypts MIME body using public key of

receiver PK Exchanged thru Certificates Entity Authentication

Page 8: Analysis of SIP security

Transport Layer Security (TLS)

TCP->TLS SIPS (Similar to HTTPS) SIPS ensures parameters passed

securely SRTP ensures media is also secured SIPS+SRTP = Protection

Page 9: Analysis of SIP security

IPSec

Network Layer Security Hop by Hop Creates VPN between sites Provides Encryption (DES,IDEA), Authentication and

Integrity(MD5, SHA)

Page 10: Analysis of SIP security

SIP Based network attacks

Registration Hijacking Authenticate originators of requests

Page 11: Analysis of SIP security

SIP Based network attacks

Session Hijacking

Page 12: Analysis of SIP security

SIP Based network attacks

Impersonating a Server

Page 13: Analysis of SIP security

SIP Based network attacks :

Tearing Down Sessions

Page 14: Analysis of SIP security

SIP Based network attacks :

Other attacks include :

Tampering with Message Bodies

Denial of Service and Amplification

Bots and DDOS Attacks

Page 15: Analysis of SIP security

Conclusion

SIP is expected to be the future VoIP protocol of choice.

Use SIP-optimized firewalls, which both support use of standards-based security and provide the best possible protection where system-wide standards-based security is not possible.

Page 16: Analysis of SIP security

Recommended