Multi-layered Security Solutions for VoIP Protection


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Multi-layered Security Solutions for VoIP Protection

  1. 1. Multi-layered Security Solutions for VoIP Protection Copyright© 2005 internet Security Systems, Inc. All rights reserved worldwide Ahead of the threat.™
  2. 2. Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper 1 INTRODUCTION The Benefits of VoIP Voice over Internet Protocol (Voice over IP or VoIP) allows users to make phone calls over the Internet, or any other IP network, using the packet switched network as a transmission medium rather than the traditional circuit transmissions of the Public Switched Telephone Network (PSTN). As the technology has become more reliable in recent years, companies have been moving to VoIP for a number of reasons. Consolidation of voice and data on one network reduces costs and results in a lower network total cost of ownership (TCO). Operating expense savings include lower long distance charges, reduced support costs and savings via workforce virtualization. Companies also use the migration to VoIP as an opportunity to replace aging telephony equipment with feature-rich technology like teleconferencing and collaboration/multimedia applications. VoIP supports increased mobility, since remote workers have the same access to voice features as corporate office employees. Research organization Gartner Inc. recently reported that spending by US companies and public-sector organizations on VoIP systems is on track to grow to $903 million in 2005 (up from the $686 million in 2004). By 2007, Gartner expects 97 percent of new phone systems installed in North America to be VoIP or hybrids1. Planning and Implementing VoIP Security While it is true that Voice over IP can provide savings over traditional telephony solutions, there are security risks associated with this technology that need to be addressed. Risks include denial of service (DoS), service theft, unauthorized call monitoring, call routing manipulation, identity theft and impersonation, among others. Not only does VoIP inherit all data network security risks, but it introduces new vectors for threats related to the emerging and untested technology and protocols associated with VoIP. These new threat vectors in turn increase the risk to the data network. Companies may spend $100,000 or more on network upgrades required to support a VoIP implementation, yet they may overlook VoIP security during their network assessment. Many enterprises assume that their existing security policies are adequate. And in many cases, executives do not include security managers in the decision-making process (either for purchase or deployment of VoIP). The technology behind VoIP is a complex collection of protocols, applications and appliances that all require attention when planning a new implementation or conducting risk assessments of existing technology. An ideal VoIP security solution provides multi-layered, preemptive protection from threats affecting both traditional data-driven network traffic and the underlying infrastructure, devices and protocols that support VoIP data transmissions, all without interrupting Quality of Service. 1. (February 22, 2005). Ahead of the threat.™
  3. 3. Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper 2 ISSUES ASSOCIATED WITH VoIP SECURITY The biggest threats associated with VoIP are service disruption or degradation (DoS) and remote compromise that can lead to unfettered access to an enterprise's critical systems and the confidential information stored on those systems. Attack prevention and the preservation of Quality of Service are the key requirements for a VoIP protection system. Qua lity of Ser vice (QoS ) VoIP requires higher standards of Quality of Service and availability than are accepted on worldwide data networks. The degree of latency that may be acceptable for data traffic cannot be tolerated for voice transmissions. Any threat that disrupts service, even slightly, or compromises call integrity could result in a service outage. Executives contemplating or undergoing the switch to VoIP need to consider how an outage might impact their business. A prime example of VoIP risk is a business call center undergoing a denial of service attack. The “lines” would be flooded; no calls could get through. The cost of network cleanup and recovery may be substantial, but that pales in comparison to the cost of lost business opportunities while the network is down. Fortune magazine data shows that Fortune 1000 companies earn revenues per minute ranging from $9,000 to $258 million, with an average of $62,000 per minute2. Such financial losses from VoIP network downtime are unrecoverable. Integrated VoIP technology assures Quality of Service through multiple devices including routers, VoIP-specific servers, the virtual private networks (VPNs) across which the traffic might travel, and third party products. Security solutions protecting the VoIP network should honor QoS and protect against Denial of Service in order to assure the network's quality and reliability. Exp loita ti on of V u l n e r a b i l i t i e s A security concern regarding VoIP technology is that all vulnerabilities inherent in IP networks will also affect VoIP on the converged network, presenting new risks to an enterprise's voice services. Vulnerabilities in the network infrastructure can affect the security and availability of the VoIP network. For example, products from certain switch and router makers have fatal flaws that could let hackers craft Denial of Service attacks to disrupt enterprise networks. VoIP systems are also vulnerable due to weaknesses in the operating systems on which the VoIP servers are running. In addition to these operating system and data network security risks, VoIP specific threats increase an organization's risk as the voice and data networks converge. Further security measures are needed to manage this added risk. 2. Source: Fortune magazine. For further discussion of this topic, refer to the Internet Security Systems white paper, “Risk Management & Productivity - Addressing the Business Value of Security,” Ahead of the threat.™
  4. 4. Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper 3 SECURITY BEST PRACTICES FOR VOIP PROTECTION Potentially, every component of a VoIP system may be vulnerable. These include the protocols, IP infrastructure (routers, switches), IP/PBXs (private branch exchanges), VoIP-specific servers, and individual phones or “soft phones” (a PC with a headset). Careful network design and deployment of the VoIP network coupled with the implementation of specific security technologies will ensure quality, reliability and security for VoIP traffic. Protection Technologies MINIMAL STEPS FOR SECURING VOIP NETWORKS: While standard network security policies and procedures such as encryption, access control and logical separation of the voice network do Separate voice and data on different provide some protection for VoIP, these measures alone will not provide logical networks (VLANs) adequate attack prevention, given the potential for unauthorized access or attacks that easily bypass traditional security mechanisms. Separate DHCP servers Use strong authentication and access control Further, protocol-specific vulnerabilities and flaws within the VoIP on the voice gateway system applications themselves may leave VoIP systems vulnerable to attack in the absence of a vendor-supplied patch. According to a Forrester Research Incorporate “VoIP-aware” application layer study, “It is up to companies to provide the added security measures gateways (ALGs) and firewalls required for IP [Telephony]: Don't assume that vendors will respond to each Use IPsec or SSH for remote management and every risk that appears with patches for installed products3.” Encryption for VoIP traffic offers some protection from eavesdropping and other call compromises. But it must be backed up with strong protections not only at the gateway but at the network and host as well. A multi-layered security solution must provide attack prevention for the following: TCP/UDP based attacks, operating system vulnerability attacks, protocol flaws, device configuration flaws and VoIP application flaws. A robust solution should allow for deep packet inspection of the packet payload to recognize known attacks, anomalies or suspected attacks based on known vulnerabilities. 3. “Resolving Security Risks for IP Telephony,” by Elizabeth Herrell; Forrester Research, © 2004.
  5. 5. Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper 4 VULNERABLE VOIP COMPONENTS Vulnerable VoIP Components Threats against VoIP infrastructure VoIP Protection Technology Protocols (IP, H.323, SIP, SCCP) DoS Network Infrastructure DoS (Routers, Switches, Firewalls) Remote Compromise Worms Underlying OS (Windows, Linux, AIX) DoS Remote Compromise Worms Viruses IP PBX / Management Server DoS Remote Compromise Worms Viruses IP Phones DoS Remote Compromise Worms Soft Phones DoS Remote Compromise Worms Viruses NIPS HIPS Firewall Network Intrusion Prevention System Host Intrusion Prevention System Further details about VoIP vulnerability exploitation can be found in the ISS white paper, “VoIP: The Evolving Solution and the Evolving Threat4.” 4. Ahead of the threat.™
  6. 6. Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper 5 INTERNET SECURITY SYSTEMS' (ISS) MULTI-LAYERED VOIP SECURITY SOLUTION The ISS Proventia® intrusion prevention solution is an essential element of a multi-layered VoIP security solution providing intrusion prevention at the gateway, on the network and at the host. Proventia products block threats that can bypass even a VoIP-aware firewall, and provide added protection to VLANs and VPNs dedicated to voice traffic. ISS' method of analyzing VoIP traffic differentiates its Voice over IP protection from other methods on the market. ISS' Proventia products parse and analyze the underlying VoIP family of protocols, including SIP, MGCP, H.323, SCCP and many others. Because Proventia intrusion prevention technology recognizes and parses these VoIP protocols, it is able to properly identify VoIP traffic and analyze the payload for known or suspected attacks. Proventia can recognize traffic that does not fit or follow the rules of the protocol and can alert administrators to anomalous traffic or block it outright. The use of protocol analysis techniques also means that when variant attacks are released, Proventia will still block them without needing a pattern matching signature update. By parsing and analyzing VoIP protocols and providing preemptive vulnerability protection via ISS' Virtual Patch™ technology, which preemptively protects vulnerable systems without a vendor-supplied patch, Proventia security products identify and protect an enterprise's VoIP systems against known and unknown threats-before they impact the network. The combination of ISS' Internet Scanner® vulnerability assessment solutions and Proventia's Virtual Patch technology, powered by X-Force® security intelligence, make vulnerability management on the voice network easy to maintain. CONCLUSION Many companies are migrating to IP telephony without fully investigating or understanding the security risks involved. VoIP is subject to all the risks and vulnerabilities that affect Internet data networks. In addition, there are several VoIP-specific vulnerabilities related to VoIP protocols and specific components of VoIP technology. Since VoIP has a lower tolerance for service disruption or degradation than would be acceptable on a data network, careful security planning is essential for maintaining availability and quality on a VoIP network. Enterprises must put in place a VoIP security solution that preserves Quality of Service by protecting against service disruption and provides protection against attacks that exploit VoIP-specific flaws and vulnerabilities and attacks against supporting operating systems and devices. A multi-layered security solution that includes intrusion prevention and preemptive shielding of vulnerabilities is essential to keep the voice network secure. VoIP vendors and standards bodies have the opportunity to make telephone communication more secure than even traditional PSTN, however, security is traditionally not a priority when new emerging technology is being developed. Even as vendors make security improvements over time, it is important for an enterprise to implement a complete, multi-layered security solution from a VoIP-aware security vendor to ensure its combined voice and data network is fully protected. Ahead of the threat.™
  7. 7. GLOBAL HEADQUARTERS 6303 Barfield Road Atlanta, GA 30328 United States Phone: (404) 236-2600 e-mail: REGIONAL HEADQUARTERS Australia and New Zealand Internet Security Systems Pty Ltd. Level 6, 15 Astor Terrace Spring Hill Queensland 4000 Australia Phone: +61 (0)7 3838 1555 Fax: +61 (0)7 3832 4756 e-mail: Asia Pacific Internet Security Systems K. K. JR Tokyu Meguro Bldg. 3-1-1 Kami-Osaki, Shinagawa-ku Tokyo 141-0021 Japan Phone: +81 (3) 5740-4050 Fax: +81 (3) 5487-0711 e-mail: Europe, Middle East and Africa Ringlaan 39 bus 5 1853 Strombeek-Bever Belgium Phone: +32 (2) 479 67 97 Fax: +32 (2) 479 75 18 e-mail: Latin America 6303 Barfield Road Atlanta, GA 30328 United States Phone: (404) 236-2709 Fax: (509) 756-5406 e-mail: Copyright© 2005 Internet Security Systems, Inc. All rights reserved worldwide. Internet Security Systems, Virtual Patch and Ahead of the Threat are trademarks, the Internet Security Systems logo, Proventia, Internet scanner and X-Force are registered trademarks of Internet Security Systems, Inc. Other marks and trade names mentioned are the property of their owners, as indicated. All marks are the property of their respective owner and used in an editorial context without intent of infringement. Specifications and content Ahead of the threat.™ are subject to change without notice. Distribution: General PM-MLVOIPWP-0805 6303 BARFIELD ROAD l ATLANTA, GA 30328 l 800.776.2362 l FAX 1.404.236.2626