Govt. Engineering College Bikaner
A SEMINAR Presentation
ON

SECURITY CHALLENGE
AND DEFENSE IN VOIP
INFRASTRUCTURE

Presentation By:
Deepak Kumar Mishra
Information Technology
FINAL YEAR
WHAT IS VOIP
 Voice over internet protocol : Allows user to to make calls using
broadband internet Connection instead of analog phone line.
 Uses packet-switched network replace circuit switched network.
VOIP DATA PROCESSING
 SIGNALING (H.323 , SIP )
 ENCODING AND TRANSPORT (analog to digital , RTP , UDP)
 GATEWAY CONTROL (format conversion )
Seminar on Voip Challenges and Countermeasures
Fig. 1. (a) Typical VoIP network structure. (b) Voice data processing of the VoIP.
OVERVIEW OF SECURITY CONCERNS AND
IMPACTS IN A VOIP SYSTEM
GENERIC SECURITY CONCERNS IN VOIP

 DOS- Availability.
 Eavesdropping – confidentiality.
 Alteration of voice stream – confidentiality and Integrity .

 Toll fraud – Integrity .
 Redirection of call – Integrity and confidentiality.
 Accounting Data Manipulation – Integrity and Confidentiality.
 Caller Identification Impersonation – Integrity
OCCURRENCE POSITION AND IMPACT OF POTENTIAL ATTACKS TO A VOIP SYSTEM
ATTACK VECTORS IN VOIP AND CRITICAL CHALLENGES

The threats to the VOIP system can be further broken down
into specific attack vectors to disrupt the system and
summarized by the system layer where the attacks occur .

 SIP Registration Hijacking
 SIP Message Modification
 SIP cancel / bye attack
 Malformed SIP Command
 SIP Redirect
 RTP Payload
 RTP Tampering
SIP REGISTRATION HIJACKING
Registration hijacking occurs when an attacker
impersonates a valid UA to a registrar and replaces the
legitimate registration with its own address .
TLS can protect this.
SIP MESSAGE MODIFICATION
Have no Built in integrity ,by Man in middle attacks
an attacker can intercept and modify SIP messages .
TLS can protect from reading it.
Seminar on Voip Challenges and Countermeasures
SIP CANCEL /BYE ATTACK
The attacker can create an SIP message with the Cancel or
Bye command in its payload and send it to an end node to
terminate ongoing conversation .
Strong Authentication can control this attack.
MALFORMED SIP COMMAND
SIP uses HTML to carry command information , it becomes
difficult to test the SIP parser with possible inputs.
Strong Authentication and Dictionary test of cases for parser
can save network.
Seminar on Voip Challenges and Countermeasures
SIP REDIRECT
By attacking REDIRECT SERVER and commanding it to redirect
the victim’s call to specific number can redirect to null type device .
TLS with strong password can eliminate this.
RTP PAYLOAD
RTP carries actual encoded messages b/w two callers , adds
sequencing information .

MITM attack can gain access to the RTP media stream b/w two
nodes and can inspect and modify the data
RTP TAMPERING
By manipulation of the sequence number and timestamp fields
in the header of the RTP packet , the packets can be re
sequenced or made unusable.
SRTP can determine the modification of packet.
POSITION AND IMPACT OF POTENTIALATTACKS IN VOIP
 Other Attacks General to IP Data Networks.
1. Physical Attack
2. Address Resolution Protocol
3. MAC Spoofing
4. IP Spoofing
5. Malformed Packet
6. TCP or UDP Replay
7. Dynamic Host Configuration Protocol
8. Internet Control Message Protocol
9. Buffer Overflow Attack
10.OS Attack
11.Virus and Malware
12.CIDR Database Attack
Seminar on Voip Challenges and Countermeasures
Seminar on Voip Challenges and Countermeasures
DEFENSE VECTORS IN VOIP

 Separation of VOIP and Data Traffic
Similar to port Authentication , separating voice and data traffic is a key
enabler to overall security. VLAN technology (802.1q) is applied along with
voice mail servers and SIP aware firewalls.

 Configuration Authentication
VOIP phones need basic config. Information to get into VOIP system ,public
key or shared secret keys can help in the authenticated configuration of the
phone .Along with TLS it becomes more secure.
Signaling Authentication
The IP Security(IP Sec ) protocol provides mechanisms for both authentication
and encryption .
Provides DNS Secure , Authentication Header protocol . Controls Replay Attacks.

Media Encryption
SRTP protocol minimizes the number of keys that must be shared b/w two
nodes , MIKEY(multimedia Keying Protocol) capable of handing keys in adhoc
environment .
SECURITY MECHANISMS AGAINST ATTACKS
SEGMENTATION OF VOIP VOICE AND DATA
Queries ??
THANK you 

More Related Content

PDF
Askozia VoIP Security white paper - 2017, English
DOC
Sudheer tech seminor
PDF
The known unknowns of SS7 and beyond
PPT
Voice Over IP Overview w/Secuirty
PPTX
Spoofing Techniques
PPTX
VPN presentation
PDF
Ip spoofing attacks
PPTX
Ip Spoofing
Askozia VoIP Security white paper - 2017, English
Sudheer tech seminor
The known unknowns of SS7 and beyond
Voice Over IP Overview w/Secuirty
Spoofing Techniques
VPN presentation
Ip spoofing attacks
Ip Spoofing

What's hot (19)

PPT
I P S P O O F I N G
PDF
Ip spoofing & types of attachs using it
PDF
Proposed Methods of IP Spoofing Detection & Prevention
PPT
Presentation To Vo Ip Round Table V2
PDF
Current trends and innovations in voice over IP
PPTX
Presentation1
PPTX
ip spoofing
PDF
Wpa too-hole196-defcon18-presentation
PPTX
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
PPTX
Ip spoofing ppt
PPT
Himanshupptx
PDF
4G LTE Security - What hackers know?
PPTX
Bluetooth network-security-seminar-report
PPT
Vpn networks kami
PPT
Ip Spoofing
PPTX
Wifi- technology_moni
PPT
Windows Mobile Enterprise Security Best Practices
PDF
Wpa2 hole196-vulnerability
I P S P O O F I N G
Ip spoofing & types of attachs using it
Proposed Methods of IP Spoofing Detection & Prevention
Presentation To Vo Ip Round Table V2
Current trends and innovations in voice over IP
Presentation1
ip spoofing
Wpa too-hole196-defcon18-presentation
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Ip spoofing ppt
Himanshupptx
4G LTE Security - What hackers know?
Bluetooth network-security-seminar-report
Vpn networks kami
Ip Spoofing
Wifi- technology_moni
Windows Mobile Enterprise Security Best Practices
Wpa2 hole196-vulnerability
Ad

Viewers also liked (15)

PPTX
Equilibrum
PPTX
Proyecto tecnologico
PPT
PPT
chap010
PDF
Cattle services - turn key projects (English)
PDF
ZMAN Accentuatios Article
PPTX
Evaluation 2
PDF
Mbeki Overview_Copy
PPTX
Louisiana Purchase Cypress Legacy-- What we're all about
PDF
Oasis clubhouse - color boards
DOCX
Evaluation
PDF
Game Nation - Introduction
PPT
Metpen hasil penelitian
PPTX
Mgt 301 ppt sample 2
Equilibrum
Proyecto tecnologico
chap010
Cattle services - turn key projects (English)
ZMAN Accentuatios Article
Evaluation 2
Mbeki Overview_Copy
Louisiana Purchase Cypress Legacy-- What we're all about
Oasis clubhouse - color boards
Evaluation
Game Nation - Introduction
Metpen hasil penelitian
Mgt 301 ppt sample 2
Ad

Similar to Seminar on Voip Challenges and Countermeasures (20)

PPTX
Voip security
PDF
Voice over IP
PPT
VoIP Security
PPTX
Positive Hack Days. Gritsai. VOIP insecurities workshop
PDF
1, prevalent network threats and telecommunication security challenges and co...
PPT
Voippresentation
PPT
Common VoIP Security Issues and Solutions
PPT
Meletis Belsis - Voip security
PDF
Securing Voice Communication
PDF
Security Issues In Voip
PDF
Voice over IP (VOIP) Security Research- A Research
DOCX
VoIP Research Paper
PPTX
VOIP - Pankaj Karande
PPTX
Voice over internet protocol (voip)3
PPT
Network Security Virtual Private Network.ppt
PPTX
An approach to mitigate DDoS attacks on SIP.pptx
PPT
cs522_presentation.ppt
PPTX
VOIP security
PDF
VoIP security: Implementation and Protocol Problems
PDF
Securing voip communications in an open network
Voip security
Voice over IP
VoIP Security
Positive Hack Days. Gritsai. VOIP insecurities workshop
1, prevalent network threats and telecommunication security challenges and co...
Voippresentation
Common VoIP Security Issues and Solutions
Meletis Belsis - Voip security
Securing Voice Communication
Security Issues In Voip
Voice over IP (VOIP) Security Research- A Research
VoIP Research Paper
VOIP - Pankaj Karande
Voice over internet protocol (voip)3
Network Security Virtual Private Network.ppt
An approach to mitigate DDoS attacks on SIP.pptx
cs522_presentation.ppt
VOIP security
VoIP security: Implementation and Protocol Problems
Securing voip communications in an open network

Recently uploaded (20)

PPTX
Climate Change and Its Global Impact.pptx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
My India Quiz Book_20210205121199924.pdf
PPTX
Computer Architecture Input Output Memory.pptx
PDF
English Textual Question & Ans (12th Class).pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
semiconductor packaging in vlsi design fab
PDF
Literature_Review_methods_ BRACU_MKT426 course material
Climate Change and Its Global Impact.pptx
Unit 4 Computer Architecture Multicore Processor.pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Journal of Dental Science - UDMY (2022).pdf
Environmental Education MCQ BD2EE - Share Source.pdf
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
My India Quiz Book_20210205121199924.pdf
Computer Architecture Input Output Memory.pptx
English Textual Question & Ans (12th Class).pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Core Concepts of Personalized Learning and Virtual Learning Environments
semiconductor packaging in vlsi design fab
Literature_Review_methods_ BRACU_MKT426 course material

Seminar on Voip Challenges and Countermeasures

  • 1. Govt. Engineering College Bikaner A SEMINAR Presentation ON SECURITY CHALLENGE AND DEFENSE IN VOIP INFRASTRUCTURE Presentation By: Deepak Kumar Mishra Information Technology FINAL YEAR
  • 2. WHAT IS VOIP  Voice over internet protocol : Allows user to to make calls using broadband internet Connection instead of analog phone line.  Uses packet-switched network replace circuit switched network. VOIP DATA PROCESSING  SIGNALING (H.323 , SIP )  ENCODING AND TRANSPORT (analog to digital , RTP , UDP)  GATEWAY CONTROL (format conversion )
  • 4. Fig. 1. (a) Typical VoIP network structure. (b) Voice data processing of the VoIP.
  • 5. OVERVIEW OF SECURITY CONCERNS AND IMPACTS IN A VOIP SYSTEM
  • 6. GENERIC SECURITY CONCERNS IN VOIP  DOS- Availability.  Eavesdropping – confidentiality.  Alteration of voice stream – confidentiality and Integrity .  Toll fraud – Integrity .  Redirection of call – Integrity and confidentiality.  Accounting Data Manipulation – Integrity and Confidentiality.  Caller Identification Impersonation – Integrity
  • 7. OCCURRENCE POSITION AND IMPACT OF POTENTIAL ATTACKS TO A VOIP SYSTEM
  • 8. ATTACK VECTORS IN VOIP AND CRITICAL CHALLENGES The threats to the VOIP system can be further broken down into specific attack vectors to disrupt the system and summarized by the system layer where the attacks occur .  SIP Registration Hijacking  SIP Message Modification  SIP cancel / bye attack  Malformed SIP Command  SIP Redirect  RTP Payload  RTP Tampering
  • 9. SIP REGISTRATION HIJACKING Registration hijacking occurs when an attacker impersonates a valid UA to a registrar and replaces the legitimate registration with its own address . TLS can protect this. SIP MESSAGE MODIFICATION Have no Built in integrity ,by Man in middle attacks an attacker can intercept and modify SIP messages . TLS can protect from reading it.
  • 11. SIP CANCEL /BYE ATTACK The attacker can create an SIP message with the Cancel or Bye command in its payload and send it to an end node to terminate ongoing conversation . Strong Authentication can control this attack. MALFORMED SIP COMMAND SIP uses HTML to carry command information , it becomes difficult to test the SIP parser with possible inputs. Strong Authentication and Dictionary test of cases for parser can save network.
  • 13. SIP REDIRECT By attacking REDIRECT SERVER and commanding it to redirect the victim’s call to specific number can redirect to null type device . TLS with strong password can eliminate this. RTP PAYLOAD RTP carries actual encoded messages b/w two callers , adds sequencing information . MITM attack can gain access to the RTP media stream b/w two nodes and can inspect and modify the data
  • 14. RTP TAMPERING By manipulation of the sequence number and timestamp fields in the header of the RTP packet , the packets can be re sequenced or made unusable. SRTP can determine the modification of packet.
  • 15. POSITION AND IMPACT OF POTENTIALATTACKS IN VOIP
  • 16.  Other Attacks General to IP Data Networks. 1. Physical Attack 2. Address Resolution Protocol 3. MAC Spoofing 4. IP Spoofing 5. Malformed Packet 6. TCP or UDP Replay 7. Dynamic Host Configuration Protocol 8. Internet Control Message Protocol 9. Buffer Overflow Attack 10.OS Attack 11.Virus and Malware 12.CIDR Database Attack
  • 19. DEFENSE VECTORS IN VOIP  Separation of VOIP and Data Traffic Similar to port Authentication , separating voice and data traffic is a key enabler to overall security. VLAN technology (802.1q) is applied along with voice mail servers and SIP aware firewalls.  Configuration Authentication VOIP phones need basic config. Information to get into VOIP system ,public key or shared secret keys can help in the authenticated configuration of the phone .Along with TLS it becomes more secure.
  • 20. Signaling Authentication The IP Security(IP Sec ) protocol provides mechanisms for both authentication and encryption . Provides DNS Secure , Authentication Header protocol . Controls Replay Attacks. Media Encryption SRTP protocol minimizes the number of keys that must be shared b/w two nodes , MIKEY(multimedia Keying Protocol) capable of handing keys in adhoc environment .
  • 22. SEGMENTATION OF VOIP VOICE AND DATA