+ All Categories

Download - VOIP security

Transcript
Page 1: VOIP security

Group 3

Shobhan Garg – 205113003Rajesh Sethi – 205113013Richa Choudhary – 205113023Akash Hirke – 205113033Ayaz Qureshi – 205113043Kaushal Varshney – 205113053Rohit Gurjar – 205113063Jitendra Nagar – 205113073Arun Kumar Meena - 205113077Arpit Gupta - 205113083

VoIP Security

Page 2: VOIP security

What is VoIP

Page 3: VOIP security

Voice Over Internet Protocol (VoIP)

• A methodology for the delivery of Voice Communications over Internet Protocol Networks, such as the Internet

• Also called as IP Telephony, Internet Telephony, Broadband Telephony or Broadband Phone Service

Page 4: VOIP security

Voice over Internet Protocol (VoIP)

contd…

• Similar to Traditional Digital Telephony

• Involve Signaling, Digitization of the Analog Voice Signals, and Encoding

• Traditional Digital Telephony sends the Digital Signals over a Circuit Switched Network

• In VoIP, the digital information is packetized, and transmission occurs as IP Packets over a Packet Switched Network

Page 5: VOIP security

VoIP Architectures

• PC to PC

• Phone to Phone Via Internet

• PC to Phone

Page 6: VOIP security

Session Initiation Protocol (SIP)

• Can be used for Two Party (Unicast) or Multiple Party (Multicast) Sessions

• Each resource of a SIP Network is identified by a Uniform Resource Identifier (URI)

• The URI is of the form

• sip:username:password@host:port

Page 7: VOIP security

SIP Network Elements

• User Agent

• Proxy Server

• Registrar

• Redirect Server

• Session Border Controller

• Gateway

Page 8: VOIP security

Quality of Service (QoS)

• Less Reliable as there is no mechanism to ensure that the Data Packets are not lost and are arriving in order

• A Best Effort Network

• Latency can be introduced that may exceed the permissible values

• Latency can be minimized by marking Voice Packets as being delay-sensitive

Page 9: VOIP security

PSTN vs. INTERNET

• PSTN

• Voice network use circuitswitching.

• Dedicated path betweencalling and called party.

• Bandwidth reserved in advance.

• Cost is based on distanceand time.

INTERNET

• Data network use packet switching.

• No dedicated path between sender and receiver.

• It acquires and releases bandwidth, as it needed.

• Cost is not based on distance and time.

Page 10: VOIP security

Overcoming the Challenges

Latency

Packet loss

Scalability

Jitter

Bandwidth

Reliability

Security

Interoperability

Page 11: VOIP security

Latency

Latency is the time taken for a packet to arrive at its destination

Packet switching overhead

Congestion

Latency may result in voice synchronization problems

Packet Loss

Packet loss in unavoidable

It can be minimally tolerated in voice transmission

It should not, in the first place, distort the audio

Page 12: VOIP security

ScalabilityAbility to add more telephony equipment as the company grows

Network bandwidth and other issues may have an effect on scalability

JitterJitter is the delay experienced in receiving a packet when a packet is expected to arrive at the end point at a certain time

BandwidthWhen bandwidth is shared between voice and computer data, certain bandwidth may have to be allocated for voice communication on a network

Page 13: VOIP security

Reliability

Because the computer network is used, the reliability of the network will have an impact on the telephony service

In the analog telephone industry, reliability of 99

.999 percent uptime is required

The above is known as five nines

VoIP networks can achieve over 98 percent reliability ?

Page 14: VOIP security

Security

As VoIP uses the Internet, for example, it is vulnerable to the same type as security risks

Hacking

Denial of service

Interoperability

• IP telephony equipment manufactu

red by different vendors must be ab

le to talk to each other

– Standardized protocols are needed

Page 15: VOIP security

How VoIP Works:

With VoIP, analog voice calls are converted into packets of data. The packets travel like any other type of data, such as e-mail, over the public Internet and any private Internet Protocol (IP) network.

Using a VoIP service, you can call landline or cell phones. You can also call computer-to-computer, with both parties speaking into a computer microphone and listening through computer speakers or headsets.

Page 16: VOIP security

• Converting the voice signal– ADC (analog to digital)

– DAC (digital to analog)

Voice (source) - - ADC - - - Internet - - - DAC - - Voice (dest)

• Transmission of voice traffic in packets

Page 17: VOIP security
Page 18: VOIP security

• The 1-2-3s of VoIP

• 1. Compression – voice is compressed typic

ally with one of the following codecs, G7.11 64

k, G7.29AB 8k, G723.1 6.3k

• 2. Encapsulation – the digitized voice is wra

pped in an IP packet

• 3. Routing – the voice packet is routed thru t

he network to its final destination

Page 19: VOIP security

Components

• VoIP Protocols

• VoIP Gateway

• VoIP Codecs

Page 20: VOIP security

1. VOIP Gateway

Voice over Internet Protocol (VoIP) gateway is a

device that converts analog telephony signals to

digital.

A network device that converts voice and Fax

calls, in real time, between the public switched telephone network (PSTN) and an IP network.

Page 21: VOIP security

Type of Gateway

• Analog

- FXS gateway

- FXO gateway

• Digital

Page 22: VOIP security

Features

• Call routing, packetization and control signaling management.

• Voice and fax compression/decompression.

• External controller interfaces.

Page 23: VOIP security

VOIP Codecs

• A codec, which stands for coder-decoder, converts an audio signal into compressed digital form for transmission and then back into an uncompressed audio signal for replay. It's the essence of VoIP. It converts each tiny sample into digitized data and compresses it for transmission.

• Common VoIP Codec:

• G.711 - Delivers precise speech transmission. G.711 uses a logarithmic compression. It squeezes each 16-bit sample to 8 bits, thus it achieves a compression ratio of 1:2. The resulting bitrate is 64 kbit/s for one direction, so a call consumes 128 kbit/s.

• This codec can be used freely in VoIP applications as there are no licensing fees. It works best in local area networks where we have a lot of bandwidth available.

Page 24: VOIP security

• G.722 - Adapts to varying compressions and bandwidth is conserved with network congestion.

• G.729 - G.729 is a codec that has low bandwidth requirements but provides good audio quality (MOS = 4.0). The codec encodes audio in frames, each frame is 10 milliseconds long. Given the sampling frequency of 8 kHz, the 10 ms frame contains 80 audio samples. G.729 is a licensed codec.

• G.723.1 - High compression with high quality audio. Lot of processor power. It is a licensed codec.

• G.726 – An improved version of G.721 and G.723 (different from G.723.1)

Page 25: VOIP security

PBX

Yesterday’s Networks

Circuit Switched Networks (Voice)

CO

PBX

COCO

Packet Switched Networks (Data)Router

Router

Router

Router

Router

• Separated networks

• Separated applications/services

Page 26: VOIP security

PBX

IP Phone

Converged Network

PSTN

CO

Gateway

Router

Router

Router

Router

• Converged network• Separated or integrated applications

PBX

IP Phone

Page 27: VOIP security

IP Network

Multimedia PC

Multimedia PC

Initially, PC to PC v

oice calls over the I

nternet

VoIP Architecture?

PSTN

(DC)

Gateway

PSTN

(NY)

Gateway

Public Switched Tele

phone Network

Gateways allow PCs

to also reach phone

s

…or phones to reac

h phones

Page 28: VOIP security

VoIP Network Model

SIP

RTP, RTCP, RTSP

Transport Layer (UDP, TCP)

Network Layer (IP, IP Multicast)

Data Link Layer

Physical Layer

Page 29: VOIP security

• The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging all over Internet Protocol (IP) networks.

• The Real-time Transport Protocol (RTP) is a network protocol for delivering audio and video over IP networks. RTP is used extensively in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications, television services and web-based push-to-talk features.

Page 30: VOIP security

• The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers. The protocol is used for establishing and controlling media sessions between end points.

• Higher overhead of TCP does not make sense for telephone call. Because audio must stream! No wait for missing packets. Play missing part as silence.

• UDP Offerrs best-effort delivery. to handle duplication, delay, out-of-order delivery, each RTP message contains

Page 31: VOIP security

IP Protocol Layering

Physical Transport (e.g, Cable Modem)

IP (Internet Protocol)

TCP UDP

Applications (e.g., email, web pages)

Email Data (1000 bytes)TCP Header

(20 bytes)IP Header (20 bytes)

A Typical IP Datagram

Page 32: VOIP security

VoIP SIP

Page 33: VOIP security
Page 34: VOIP security

Advantages of VoIP

• Cheaper than the Traditional Telephone System

• Calls can be made from anywhere to anywhere using the single account

• Images, Videos and Text can also be sent along with the Voice

• The Network need not be of a particular Topology

Page 35: VOIP security

Disadvantages of VoIP

• Packet Loss and Jitter can be there

• Calls cannot be made if the Internet Connection is down

• Calling Emergency Numbers using VoIP will not provide your location to the Emergency Response Services

Page 36: VOIP security

VoIP Security

Page 37: VOIP security

SECURITY BASICS

• AUTHENTICATION

• AUTHORIZATION

• AVAILABILITY (Use of different segment for VoIPs)

• ENCRYPTION

Page 38: VOIP security

ATTACK VECTORS

A local subnet, such as an internal network, where VoIP is used By

unplugging and/or sharing a VoIP hard phone’s Ethernet connection

(usually sitting on one’s desk), an attacker can connect to the voice

network.

Page 39: VOIP security

A local network that is using wireless technology with untrusted users,

such as a coffee shop, hotel room, or conference center An attacker

can simply connect to the wireless network, reroute traffic, and capture VoIP calls

Page 40: VOIP security

A public or non-trusted network, such as the Internet, where VoIP

communication is used An attacker who has access to a public network

can simply sniff the communication and capture telephone calls.

Page 41: VOIP security

• Compromising the VOIPs phone’s configuration file

• Uploading a malicious configuration file

Page 42: VOIP security

UNCONVENTIONAL VOIP SECURITY

THREATS

• VoIP Phishing

• Caller ID Spoofing

• Anonymous Eavesdropping and Call Redirection

• Spam Over Internet Telephony


Top Related