SlideShare a Scribd company logo
1 of 68
Download to read offline
Applying a Systems Approach to Security in a Voice Over IP System
Case Study: IP PBX System in a Small Company
Antti Halla
Helsinki University of Technology
Supervisor: Professor N. Asokan
Instructor: M.Sc. Juha Sääskilahti
10th
August 2006
Applying a Systems Approach to Security in a Voice Over IP System
HELSINKI UNIVERSITY OF TECHNOLOGY
Department of Computer Science and
Engineering
ABSTRACT OF
MASTER’S THESIS
Author Date
10th August 2006
Antti Halla Pages
68
Title of thesis
Applying a Systems Approach to Security in a Voice over IP System
Professorship Professorship Code
Telecommunications Software T-110
Supervisor
Professor N. Asokan
Instructor
M.Sc. Juha Sääskilahti
The objective of this work is to evaluate security in parts of a system in
relation to security of a whole system. The focus is on Voice over IP (VoIP)
systems. VoIP systems have recently been discussed widely, and their
security aspects have received much of criticism.
This work is also an attempt to combine different areas of security into a
coherent whole. The method of research used is systems methodology.
Systems approach itself is directed towards entities, which might make it
useful for studying security of a whole system.
In this thesis a method for studying security in a system is outlined. A case
study about security in a VoIP system of a small company applies this
method, and at the same time demonstrates VoIP and security concepts.
Systems methodology is a general methodology for understanding specific
systems in a specific environment. It begins to look at a system with little or
no assumptions at all. In security context this means that there are no
assumptions for example about security requirements for the system, but
they are discovered through the process of systematic inquiry.
Keywords:
Security, Voice over IP, Systems Methodology, Risk Management, System
Development
TEKNILLINEN KORKEAKOULU DIPLOMITYÖN TIIVISTELMÄ
2
Applying a Systems Approach to Security in a Voice Over IP System
Tietotekniikan osasto
Tekijä Päiväys
10.8.2006
Antti Halla Sivumäärä
68
Työn nimi
Applying a Systems Approach to Security in a Voice over IP System
Professuuri Koodi
Tietoliikenneohjelmistot T-110
Työn valvoja
Professori N. Asokan
Työn ohjaaja
DI Juha Sääskilahti
Työn tavoitteena on järjestelmän yksittäisten osien turvallisuuden arvioiminen
osana systeemin kokonaisturvallisuutta. Tarkastelun kohteena on Voice Over
IP (VoIP) systeemit. Ne ovat olleet viimeaikoina keskustelun kohteena, ja
niiden turvallisuusominaisuudet ovat saaneet osakseen arvostelua.
Tämä työ on samalla myös yritys yhdistää eri tietoturvallisuuden osa-alueita
yhteen yhtenäiseksi kokonaisuudeksi. Tutkimuskeinona on käytetty
systeemimetodologiaa. Systeemilähestymistapa jo itsessään korostaa
kokonaisuuksia, joten se voisi soveltua myös kokonaistietoturvan
tutkimiseen.
Tutkimuksessa hahmotellaan metodi järjestelmän tietoturvan
analysoimiseksi. Tapaustutkimus turvallisuudesta pienyrityksen VoIP-
järjestelmästä soveltaa hahmoteltua metodia ja kokoaa samalla yhteen Voice
over IP:n ja tietoturvallisuuden käsitteitä.
Systeemimetodologia on yleinen methodologia yksittäisten systeemien
ymmärtämiseen yksittäisessä ympäristössä. Se lähtee tutkimaan
järjestelmää mahdollisiman vähin alkuoletuksin. Turvallisuuskontekstissa
tämä tarkoittaa, että esimerkiksi turvallisuusvaatimuksia ei oleteta, vaan ne
etsitään systemaattisen tutkimusmetodin avulla.
Avainsanat
Turvallisuus, Voice over IP, Systeemiajattelu, Riskinhallinta,
Järjestelmäkehitys
3
Applying a Systems Approach to Security in a Voice Over IP System
Contents
Contents...................................................................................4
List of Figures..........................................................................6
List of Tables...........................................................................7
Glossary of Terms...................................................................8
Acknowledgements...............................................................10
1 Introduction..................................................................11
1.1 Motivation..............................................................11
1.2 Research Question...............................................12
1.3 Structure of the Thesis..........................................12
2 Voice Over IP Systems.................................................13
2.1 VoIP and Network Convergence...........................13
2.2 Applications of Voice over IP.................................14
2.3 Common Functionality in Voice over IP Systems. .15
2.4 Technological Basis of Voice over IP Systems......16
3 Security.........................................................................21
3.1 Computer Security................................................21
3.2 Risk Management.................................................25
3.3 Security Mechanisms............................................25
4 Voice over IP Security..................................................28
5 Systems Methodology.................................................30
5.1 Systems Theories.................................................31
5.2 System and its Environment..................................31
5.3 Systems Thinking..................................................33
5.4 Systems Approach to Problem Solving.................33
6 Method for Studying Security Aspects of a System..36
6.1 Overview of the Method........................................36
6.1 Iteration 1: System Model.....................................38
6.2 Iteration 2: Security Analysis.................................40
6.3 Further Iterations...................................................42
7 Case Study: IP PBX System Security.........................43
7.1 VoIP System Model...............................................44
7.2 Communication System Model..............................47
7.3 Communication System Security Analysis............49
7.4 VoIP System Security Analysis..............................51
7.5 Intranet Model.......................................................52
7.6 Intranet Security Analysis......................................54
7.7 Home Network Model............................................55
7.8 Home Network Security Analysis..........................56
7.9 Internet Model.......................................................57
7.10 Internet Security Analysis......................................58
7.11 User Terminal Mode..............................................58
7.12 User Terminal Security Analysis............................60
7.13 Case Study Summary...........................................61
4
Applying a Systems Approach to Security in a Voice Over IP System
8 Conclusions..................................................................62
8.1 Evaluation of Systems Methodology.....................62
8.2 Further study.........................................................63
9 Summary.......................................................................65
10 References....................................................................66
5
Applying a Systems Approach to Security in a Voice Over IP System
List of Figures
Figure 1: Migration from vertical to horizontal service architecture (source[12])13
Figure 2: Simplified network overview.................................................................17
Figure 3: TCP/IP protocol stack.............................................................................18
Figure 4: Simple VoIP call sequence......................................................................19
Figure 5: Media transfer.........................................................................................20
Figure 6: Security threats (source [22] )................................................................22
Figure 7: Waterfall development model.................................................................23
Figure 8: Security concepts....................................................................................23
Figure 9: Testing in waterfall model......................................................................24
Figure 10: Security division...................................................................................26
Figure 11: System in its environment....................................................................32
Figure 12: Black-box and white-box models.........................................................35
Figure 13: Method overview..................................................................................37
Figure 14: Recursions of the method.....................................................................37
Figure 15: Function model.....................................................................................38
Figure 16: Context model......................................................................................39
Figure 17: Structure model....................................................................................40
Figure 18: Process model.......................................................................................40
Figure 19: IP PBX system overview......................................................................43
Figure 20:Company system hierarchy...................................................................44
Figure 21: VoIP system function............................................................................44
Figure 22: VoIP system context.............................................................................45
Figure 23: VoIP system structure...........................................................................45
Figure 24: System in its physical environment......................................................46
Figure 25: VoIP system process.............................................................................47
Figure 26: Communication system function..........................................................47
Figure 27: Communication system in its organizational environment..................48
Figure 28: Communication system structure.........................................................48
Figure 29: Intranet structure...................................................................................53
Figure 30: Intranet process.....................................................................................53
Figure 31: Home network structure.......................................................................55
Figure 32: Home network process.........................................................................56
Figure 33: Internet function...................................................................................57
Figure 34:User terminal function...........................................................................58
Figure 35: User terminal structure.........................................................................59
Figure 36: User terminal process...........................................................................60
6
Applying a Systems Approach to Security in a Voice Over IP System
List of Tables
Table 1: VoIP system reference points...................................................................46
Table 2: VoIP system process descriptions.............................................................47
Table 3: Communication system process model....................................................49
Table 4: Threats to communication function.........................................................49
Table 5: Threats in communication context...........................................................50
Table 6: Threats to communication system structure.............................................50
Table 7: Threats to VoIP system function...............................................................51
Table 8: Threats to VoIP system context................................................................51
Table 9: Threats to VoIP system structure..............................................................51
Table 10: Interception of VoIP system process......................................................52
Table 11: Intranet reference point descriptions......................................................53
Table 12: Intranet process......................................................................................54
Table 13: Threats to intranet function....................................................................54
Table 14: Intranet threats in context.......................................................................54
Table 15: Intranet threats to structure....................................................................54
Table 16: Intranet, causes of interception..............................................................54
Table 17: Home network reference points.............................................................56
Table 18: Home network process model................................................................56
Table 19: Threats to home network function.........................................................56
Table 20: Home network threats in context...........................................................56
Table 21: Threats to home network structure.........................................................56
Table 22: Home network, causes of interception...................................................57
Table 23: Threats to internet function....................................................................58
Table 24: Internet threats in context.......................................................................58
Table 25: User terminal reference point descriptions............................................60
Table 26: User terminal process descriptions.........................................................60
Table 27: Threats to user terminal function...........................................................60
Table 28: User terminal threats in context.............................................................61
Table 29: Threats to user terminal structure...........................................................61
Table 30: User terminal process interruption.........................................................61
7
Applying a Systems Approach to Security in a Voice Over IP System
Glossary of Terms
ADSL Asymmetric Digital Subscriber Line
Availability The property of a system or a system resource being
accessible and usable upon demand by an
authorized system entity, according to performance
specifications for the system. [4]
Data confidentiality The property that information is not made available
or disclosed to unauthorized individuals, entities, or
processes. [4]
Data integrity The property that information has not been changed,
destroyed, or lost in an unauthorized or accidental
manner. [4]
DMZ DeMilitarized Zone
DNS Domain Name Service
DoS Denial of Service
Environment of a
System
A set of elements and their relevant properties, which
elements are not part of the system, but a change in
any of which can cause or produce a change in the
state of the system. [8]
GPRS General Packet Radio Service
IDS Intrusion Detection System
IMS IP Multimedia Subsystem
IP Internet Protocol
ISDN Integrated Services Digital Network
LAN Local Area Network
NIDS Network Intrusion Detection System
PBX Private Branch Exchange
PSTN Public Switched Telephone Network
RTCP Real-Time Control Protocol
RTP Real-Time Transport Protocol
SDP Session Description Protocol
SIP Session Initiation Protocol
System A set of interrelated elements, each of which is
related directly or indirectly to every other element,
and no subset of which is unrelated to any other
subset. [8]
8
Applying a Systems Approach to Security in a Voice Over IP System
System integrity The quality that a system has when it can perform its
intended function in an unimpaired manner, free from
deliberate or inadvertent unauthorized manipulation.
[4]
TCP Transmission Control Protocol
TLS Transport Layer Security
UDP User Datagram Protocol
UMTS Universal Mobile Telecommunications System
VLAN Virtual Local Area Network
VoIP Voice over IP
WLAN Wireless Local Area Network
9
Applying a Systems Approach to Security in a Voice Over IP System
Acknowledgements
I want to thank my supervisor professor N. Asokan for advice and
encouragement, and my instructor Juha Sääskilahti for guiding me through
the whole work. Thanks to Antti Alinen for review and professor
Teemupekka Virtanen for instructions in the beginning of the work.
Thanks to my employer Ericsson for making this thesis work possible, and
especially all the people at NetworkSecurity department. Finally thanks to
each and all of you who supported me along the way in any way.
10
Applying a Systems Approach to Security in a Voice Over IP System
1 Introduction
1.1 Motivation
Security as a basic need has always been there. In contrast, security as a
field of study has got a new dimension during the last few decades along
with new technological innovations. The number and the capacity of
computers and networks has been growing rapidly, and at the same time
people are learning more about using, and abusing these new
technologies.
One of the current trends in technology is called network convergence. A
main technological aspect of this course of development is that the
traditional telephone networks, mobile telephone networks and the Internet
are gradually merging into one global communication system.
The Internet was mainly designed for data transfer. It is now facing new
challenges, especially regarding availability and quality of service, as it is
required to provide increased support for transport of real-time media such
as audio and video. The traditional telephone networks are also facing
new challenges as they are migrating into using Internet technologies.
Assuring high level of quality and availability in the telephone service is
one issue. Another major issue is security. The internet is notorious for its
security problems. Virus attacks, unauthorized use of computer systems,
denial of service attacks and website incidents have become a
commonplace in the internet today [11]. Voice over IP (VoIP) systems
have to be prepared to meet these threats.
Security in communication networks is a complex issue. There are large
numbers of interconnected networks that are owned and controlled by
different parties. These networks often span large areas and connect large
numbers of computers and other network nodes together. In principle, a
security breach in any part of the network could endanger the security of
the whole network.
The field of computer security began with a focus on single computer
systems. Over time the focus shifted from individual computers to
computer networks [1]. Focusing only on either one will not bring us
secure communication systems. We need to develop the security in both
of them and to understand how they are interrelated to each other.
Systems methodologies give us conceptual tools for understanding
systems in relationship with their environment. They help us to understand
and to improve existing systems and to develop altogether new systems
that are better adapted for specific purposes and specific environments.
They help us first to find, and then to concentrate on the most essential
aspects of systems while avoiding unnecessary details, depending on the
situation and the environment.
11
Applying a Systems Approach to Security in a Voice Over IP System
1.2 Research Question
The main research question of this thesis is:
What are the main benefits of systems methodology in
studying security aspects of Voice over IP systems?
We start with the hypothesis that systems methodology will help us to
combine different aspects of a VoIP system, and the security in them
together in a way that would provide practical information for developing
security in real-world VoIP systems. We expect the systems approach to
provide us with means to find a balance that optimizes the cost of security
measures and achieved decrease of risk in the whole system. The
resulting method should include both technological and social dimensions
to the VoIP system. It should also provide a high-level conceptual
framework for managers with sufficient details for engineers to facilitate
understanding and communication of security aspects of VoIP systems.
To answer the research question we first need to gather some background
knowledge on the subject. The background study tries to answer the
following five questions:
What are VoIP systems? What is their technological basis?
What are the security aspects of a system in general?
What are the security aspects of VoIP systems in particular?
What is systems methodology?
How to apply systems methodology in practice?
Each of these five questions is discussed in their own chapters. A case
study is then performed to provide a basis for evaluating the methodology,
whether it is feasible for this purpose, and whether it brings new aspects to
security in Voice over IP systems.
1.3 Structure of the Thesis
Chapter 2 gives an overview of Voice over IP Systems and their
technological basis.
Chapter 3 discusses computer security in the context of risk management
and system development.
Chapter 4 discusses security aspects of VoIP systems.
Chapter 5 is an introduction to systems thinking and systems
methodology.
Chapter 6 describes a method for studying security aspects of a system.
Chapter 7 demonstrates the use of the method that is described in
Chapter 6. The method is applied to an VoIP system of a small company.
12
Applying a Systems Approach to Security in a Voice Over IP System
2 Voice Over IP Systems
In this chapter we will look at the general overview of Voice over IP and its
uses. We will discuss example applications of VoIP and the common
functionality in them. Finally we will look at the basics of Voice over IP
technology.
2.1 VoIP and Network Convergence
The technology environment in the Internet is very different from that of the
traditionally closed telephone systems. Traditional telephone companies
used to have separate networks for fixed, mobile, and data
communication, each of which had their own set of services. The
architecture of the internet is fundamentally different. Internet technology
supports provision of both data and voice services. It does that
independent of access method, whether one connects from a fixed or
mobile terminal. In traditional networks the operator could control the
provision of services, in the internet basically anyone can set up a service
for anyone else to use. This difference between traditional vertical
architecture and internet technology’s horizontal architecture is illustrated
in Figure 1 [12].
Figure 1: Migration from vertical to horizontal service architecture (source[12])
In general, Voice over IP means transmitting telephone calls using internet
technologies. The current trend is to replace the traditional circuit switched
telephone networks with more general purpose and relatively low cost
packet switched infrastructure. As with traditional telephone networks VoIP
consists of technologies for signaling and transfer of voice. In the case of
VoIP, the voice might be combined with video or data transfer as well.
VoIP can be found in many different kinds of applications. Internet access
providers and independent service providers have offerings for VoIP
services. Corporations are migrating to VoIP in their internal telephone
systems. VoIP is also used in the internal networks of the operators. [9]
Users can access VoIP applications from fixed, wireless or mobile
terminals. Most of the VoIP terminals today are fixed, but the number of
mobile and wireless terminals is increasing. Although mobility is a trend in
13
Applying a Systems Approach to Security in a Voice Over IP System
user terminals and on the last mile of the connection, practically all the
transport networks use fixed lines. [12]
The overall trend is for the current circuit switched, fixed telephone
network, the mobile networks and the Internet to merge into a single global
communication system, which is built mostly upon internet technologies.
2.2 Applications of Voice over IP
IP Multimedia Subsystem – IMS
IMS is a standardized platform for multimedia services that has been
developed as a joint effort of various technology vendors, tele operators
and public representatives. It is planned to gradually replace the current
circuit switched telephone systems. The architecture has been designed
for multiple access methods, that is, it can be accessed from any access
network, either fixed or mobile. The IMS is a way to gradually execute a
controlled migration from vertical service architecture to a horizontal one
by those who own the physical networks.
Service providers in IMS systems can be independent third parties. The
platform has defined interfaces to facilitate fast development of value-
added services. IMS provides users with multimedia calls and multimedia
services. IMS provides operators a means to charge the users for
services using different charging schemes. This is a feature that Internet
has been lacking. IMS also facilitates roaming, quality of service, and
interconnection with PSTN. Having support for legacy networks, the
services developed for GSM and PSTN networks are compatible with the
IMS system. [2]
VoIP as Extension to Instant Messaging
Instant messaging systems like MSN Messenger, Yahoo Messenger,
Google Talk or online-gaming systems have added voice capability to their
chat services. Registered users can set up a voice connection with other
users of the system. The service is essentially free of charge for the users.
Services typically facilitate user mobility: a person can log in to the system
from any terminal connected to the Internet. Other services include
presence service and directory service. The caller finds the network
address of the callee through the system, after which a point-to-point call
connection is created between the caller and the callee.
Skype
Skype is a VoIP application that has become very popular in a very short
time. Skype users can call other Skype users in the internet as well as
make calls to PSTN and receive calls from PSTN to their terminal in the
internet. The protocols used are proprietary, and there is little information
available of the actual implementation details of Skype.
The idea behind Skype is very different from that of the traditional
telephone networks. It uses peer-to-peer networks in routing the calls.
14
Applying a Systems Approach to Security in a Voice Over IP System
Central servers are used for users to initiate and authenticate their client
software. Supernodes are used by clients to bypass network devices that
limit connectivity, such as Network Address Translators (NAT) and
firewalls. Skype traffic is encrypted in some unknown way and the route
through network to reach other clients in the P2P network is unspecified.
[20]
IP Private Branch Exchange – PBX
Large organizations often have their own internal telephone networks that
are implemented using a Private Branch Exchange system. These
systems are typically connected to the PSTN to allow calls to and from
other telephone networks. The main reason for PBX deployment is cost
savings for the company. [13]
IP PBX systems that use VoIP technologies are gradually widening their
user base. The IP based PBX systems can utilize the often already
existing IP network infrastructure resulting in cost savings. This makes it
attractive for both new customers and existing owners of circuit switched
PBX systems that want to migrate into IP based systems.
In addition to phone calls, a PBX might provide additional services such as
call forwarding, voice-mail or teleconferencing. The service can also be
centralized and operated by an external service provider. It is then called a
centrex service.
2.3 Common Functionality in Voice over IP Systems
The different types of VoIP systems have their own special characteristics,
and they are used for many different purposes. They still have much in
common and often need to address same kinds of needs of the users.
Incoming and Outgoing Calls
The most basic service is of course the phone call. It still is also the most
important one. In addition to stand-alone calls, the call service is becoming
more often integrated into computer applications such as instant
messaging applications and computer games. From the user point of view,
incoming and outgoing calls function as in traditional telephone systems.
From the network point of view the Internet, for example, brings special
asymmetry to VoIP systems. Some solution is needed to contact network
nodes and user terminals that reside behind restricting firewalls or
Network Address Translators (NAT).
Mobility
Mobility in communication systems can be divided into three categories:
user mobility, terminal mobility, and service mobility. User mobility is the
user’s capability to connect to the services from any terminal connected to
the system. Terminal mobility is the mobile user terminal that allows the
user to move around freely. When a user of a mobile phone uses a
network of another service provider, for example in a foreign country, it is
15
Applying a Systems Approach to Security in a Voice Over IP System
called roaming. If the user is then able to utilize the same services as in
the home network, it is called service mobility. [14]
Interworking
There is a need for communication between networks that use different
technologies. Interworking refers to the case where for example a call is
made from the Internet to a phone in the public switched telephone
network (PSTN). It requires technical arrangements for converting the
signaling data and the media stream to a suitable form for the other
network. Standardized and open protocols, and interfaces have been
developed to facilitate interworking. It also often requires special
arrangements and contracts to be made between the network operators or
owners.
Other Services and Functionality
Other services that VoIP systems might provide are services such as the
value-added services in the traditional telephone networks: voice-mail,
call-forwarding, and conference calls. One service that has been common
for instant messaging applications in the Internet is the presence service.
It provides real-time information about the current availability status of the
system users.
2.4 Technological Basis of Voice over IP Systems
The technological basis of VoIP systems is that of the internet and
telephone networks. Figure 2 shows a simplified example of a network. A
user can connect to the network using different kinds of equipment. The
service network can provide routing of a phone-call to the receiver
somewhere in the network, or there can be a voice-mail box for the user.
Transport networks mediate the traffic between users, and between users
and services.
16
Applying a Systems Approach to Security in a Voice Over IP System
Figure 2: Simplified network overview
User Terminals
A user terminal is the physical device that the user needs to connect to the
network. The terminals are often divided into softphones and hardphones.
Softphone is basically a PC installed with VoIP software, and a hardphone
is a piece of hardware dedicated to be used in a VoIP network. At the
moment most of the terminals use fixed line connections, but the number
of terminals with mobile or wireless access is increasing. The terminals are
used both to connect with people and to access various information
resources.
Service Infrastructure
Service infrastructure is often built on PC platforms, using common
operating systems like Windows, Linux, Unix or Solaris. There are servers
for handling the call logic, subscriber databases, gateways that handle
connectivity with neighboring networks, proxies and relay servers to
facilitate routing of the calls, operation and management nodes and
security related components. In large networks the functionality is
distributed across many network nodes, but in a small office setup a single
node can perform most of the required functionality.
17
Applying a Systems Approach to Security in a Voice Over IP System
Transport Networks
Transport networks can be dived into access and trunk networks [23].
User terminals, home networks, or company intranets connect to access
networks. Connection can be fixed, as in a modem, ISDN, ADSL or cable
modem connection. It can use wireless links such as WLAN, or mobile
connection such as GPRS or UMTS. Different connection types have
different characteristics regarding bandwidth, response time, cost, and
terminal mobility.
Trunk networks connect access networks and other trunk networks
together. They often span large geographical distances and transport large
amounts of data. This is the least visible part of the network to the users.
Internet Technology
VoIP applications utilize the same technologies that are commonly used in
the Internet. The networks are built using Ethernets, switches, routers,
Domain Name Servers (DNS), firewalls that are the building blocks in any
IP network. They are used in a same way as in data communication,
although VoIP might bring some additional requirements to them
concerning quality of service, connectivity and security.
TCP/IP protocol suite is the core of the Internet technology. The
characteristics of TCP/IP give raise to many of the issues in VoIP. TCP/IP
was originally designed for data transmission in packed switched
networks. Transmission of real-time media on the other hand has been
found out to be a challenge in the Internet.
Figure 3: TCP/IP protocol stack
The layer model in Figure 3 depicts how the protocols in TCP/IP are build
one on another to form a stack. For example, a computer application can
send audio signal to another application on a different computer over the
network. This signal can be transported inside Real-time Transport
Protocol (RTP) packets. These RTP packets are then encapsulated inside
18
Applying a Systems Approach to Security in a Voice Over IP System
a User Datagram Protocol (UDP) packet that in turn is encapsulated inside
an IP packet. The IP (Internet Protocol) packets can be transported over a
variety of different networks such as local area networks (LAN), wireless
LANs (WLANS) or Universal Mobile Telecommunication System (UMTS)
that have utilize some specific data link protocols. There the information is
carried in electric, electromagnetic or optical form to the receiver.
TCP/IP provides two protocols for applications to use at transport layer:
TCP and UDP. TCP is used to establish reliable connections between
applications in separate network nodes. UDP on the other hand is a
connectionless protocol. The packets travel independent of each other and
there is no guarantee for their delivery. [18]
In principle, both UDP and TCP can be used to deliver signaling and
media in VoIP applications. TCP is often used in session management and
UDP in transferring real-time media because of their different
characteristics.
VoIP Protocols
VoIP systems can utilize many different protocols as any application in the
internet does today. By VoIP protocols we mean the protocols that are
common and specific to all VoIP applications. The protocols can be divided
into signaling protocols and media transfer protocols.
Session Management.
Signaling protocols are needed to set up and manage call sessions and
other VoIP services. The most significant signaling protocol in the Internet
today is Session Initiation Protocol (SIP) that is defined in RFC 3261 [3]. It
is accompanied with Session Description Protocol (SDP) that is used to
actually describe the content of SIP communication. SDP is defined in
RFC 2327 [6].
RTP Traffic
BYE
OK
INVITE
ACK
OK
Figure 4: Simple VoIP call sequence
19
Applying a Systems Approach to Security in a Voice Over IP System
Figure 4 shows a simplified phone call using SIP and RTP. Alice calls Bob
by sending him a SIP INVITE message. Bob answers the call by replying
with an OK message. Alice confirms by sending and ACK message. Now
the session is open and the conversation is transferred using RTP
protocol. After the conversation is over, Alice hangs up by sending a BYE
message, and Bob confirms with an OK message. In practice there is
likely to be other nodes in between facilitating the call process.
Media Transfer
SIP and SDP are first used to set up the sessions. The media protocols
are then used to transport the actual content of the communication in the
networks. The most used of these is Real-time Transport Protocol (RTP)
that is defined in RFC 3550 [5]. RTP is a connectionless protocol that is
carried on top of the UDP protocol.
Figure 5: Media transfer
The phases of the media transfer are illustrated in Figure 5. The speaker
talks to a microphone that is connected to an analogue to digital converter
such as a sound-card in a computer. The digital audio signal is then
encoded and compressed before it is encapsulated into RTP packets for
transport in the IP network. The receiving end then has to decode the
media signal back to digital waveform, convert it back to analogue signal
and finally in a loudspeaker into sound waves that the receiver can hear.
20
Applying a Systems Approach to Security in a Voice Over IP System
3 Security
Security is a broad subject that encompasses all the different aspects of a
system, both technological and social. Our concentration here is on
securing communication systems, such as a Voice over IP system, and the
information transferred over them.
We will look at the security from point of view of system development, how
we build secure systems and how can we be sure that they really are
secure. Then we consider the security in a larger context, as part of risk
management: how much security do we need and how much we are ready
to pay for it? Finally we discuss some security mechanisms that ensure
that the system fulfills their security requirements.
3.1 Computer Security
Confidentiality, Integrity, Availability
There are three aspects that are commonly used to describe computer
security: confidentiality, integrity and availability. Confidentiality refers to
protecting from unauthorized access to information. Integrity refers to
protecting the information from unauthorized modification. Availability is
about assuring authorized parties access to information or services. [1]
Access control mechanisms and cryptography are typically used to protect
confidentiality and integrity in computer systems. The information is made
unreadable by unauthorized users by encrypting it. The integrity of
information can be verified utilizing cryptographic signatures. Availability in
general is often improved designing systems according to statistical
models of user traffic. [1]
Threats to Communication
Threats can be seen from the point of view of information flow between
two communicating entities. Instead of a desired normal flow,
communication can be interrupted, intercepted, modified or fabricated
(Figure 6). Interrupted flow means that the message that is sent is not
delivered to the recipient, interception means that the message is
delivered to a third party in addition to the legitimate recipient. Modification
refers to a case where a third party is able to get a hold on the message
and modify its content before it is delivered to the recipient. Fabrication
means that a third party is able to act on behalf of a legitimate message
sender. [22]
21
Applying a Systems Approach to Security in a Voice Over IP System
Figure 6: Security threats (source [22] )
System Development
System development is a large subject containing all the phases in the life
cycle of a system, from the drawing board to eventual disposal. We need
to know what kind of a system we need, to know how to build it, and then
build it.
The waterfall model (Figure 7) is a top-down model of system
development. It defines seven development phases: requirements,
specifications, design, implementation, integration, and operation and
maintenance. Requirements define what is wanted from the system, and
they are typically defined by the customer. Specification defines the
system in more technical terms and in detail. Design phase describes how
the system is going to be built. In the implementation phase the
components of the systems are built based on the design, and in the
integration phase the single components are combined together to form
the complete system. The system can then be deployed and put into use
in the maintenance phase. [33]
22
Applying a Systems Approach to Security in a Voice Over IP System
Figure 7: Waterfall development model
The waterfall model is selected here for simplicity. It is only one of many
different development models, but it presents the essential aspects of
development and it suffices for our study.
Building Secure Systems
It is one thing to build systems that work. The next level is to build systems
that are reliable in case of accidents and unexpected events. Building
secure systems means the system can defend against malicious attacks
that are intended to cause the system to behave in unexpected ways. [16]
Figure 8: Security concepts
23
Applying a Systems Approach to Security in a Voice Over IP System
Figure 8 illustrates some essential security concepts. Secure systems
have protection for the information and services that are valued, assets.
The attacks, and accidents as well, that might happen in the future are
called threats. A security policy defines requirements for protection of the
assets against the threats. [1]
Security mechanisms enforce the security policy of a system in practice.
The functions of security mechanisms can be divided into three classes:
prevention, detection, and recovery. Prevented attacks never succeed in a
first place. Those attacks that get through have to be detected, before
actions to recover from the situation can be taken. [1]
Security mechanisms may also have other functions as side effects. One
that is not that desirable is the effect of the mechanisms to reduce the
usability of the system. On the other hand, in a business context security
mechanisms can also be used as competitive advantage, and to build trust
with customers.
Testing and Assurance
Testing is an essential part of system development. By testing we build
assurance for the quality of the system. To do that properly in the waterfall
model, we need to test the whole chain of development phases.
Verification refers to finding out whether we are building the system right,
and validation to the process of finding out whether we are building the
right system [33]. The implementation is verified against the design, and
design is validated against the system specifications. If the specification is
an accurate description of the implemented system, the system satisfies
the specification [1].
Figure 9: Testing in waterfall model
Security assurance in turn refers to the testing of security aspects of the
system. Its objective is to determine how much we can trust the system
[1]. Security development of a system can be treated analogously to
functional development. Security policy defines the requirements, and the
24
Applying a Systems Approach to Security in a Voice Over IP System
other phases are related to development of the security mechanisms in
the system.
Specifications can be validated against the requirements defined by the
customer. This applies both for functional and security requirements. How
do we validate these requirements? The requirements, define what the
customer wants, but it often fail to define what the customer really
needs[33]. We will present some perspectives into solving this problem
when developing our method in Chapter 6 and Chapter 7.
3.2 Risk Management
Security in a company is essentially part of the risk management process.
In risk management the protected assets are identified and their value
estimated, and the probability and potential damages of threats are
estimated. Some of the identified risks can then be eliminated, some can
be minimized, and the rest of them have to be accepted. From risk
management point of view, the security mechanisms are justified only to
the degree that the costs of implementing them is lower than the expected
loss through realized threats [16].
Risks related to computer security are just one aspect of risk
management. There are also other risks such as accidents, violence, and
natural disasters. When looking at an organization as a whole, we have to
evaluate the risks to information in the context of the other risks. To be
able to compare the risks they need to be quantified first. A simplistic way
to do this is to define a probability for a threat to actualize and the impact
of exploited vulnerability. By multiplying these together we get an expected
value for the loss. Probability of threat x Impact Value = Risk. This
way we can compare different threats decide which ones demand the
most attention. In practice the task of determining the probability and the
impact value is often far from trivial.
3.3 Security Mechanisms
Security mechanisms are the means to fulfill the security requirements for
a system by enforcing the security policy. We have divided the
mechanisms in four groups. The first three groups, network, network node,
and application security, discuss mechanisms on different scales of
computer systems. The fourth, communication security, discusses
mechanisms to protect the communication process between two end-
points, as it starts from one application on one network node and travels
through the network to another application on another node. The division
is illustrated in Figure 10.
25
Applying a Systems Approach to Security in a Voice Over IP System
Application
1
Network Node 1
Network 1
Application
2
Network Node 2
Network 2
Communication
Figure 10: Security division
The following is not an exhaustive listing of existing security mechanisms,
but it rather gives examples of them.
Network Security
Network level security mechanisms protect whole networks or parts of
them. Security mechanisms are built on the border of the network where it
connects to external networks through gateways. The first protection is
typically a firewall that filters incoming and outgoing traffic.
The topology of the network is designed to support security, and often
special security zones with different levels of protection are defined. One
such a zone is De-Militarized Zone (DMZ) that is used for services that
are provided to the external network. This arrangement allows stronger
protection for other nodes such as user terminals or intranet servers.
Other mechanisms include virus protection, Network Intrusion Detection
systems (NIDS) that monitor network traffic for suspicious patterns of
behavior, and NAT that effectively hides the topology of the internal
network and prevents incoming access requests.
Network Node Security
Node level security protects individual computers or other network
elements.
In addition to firewalls protecting whole networks, individual nodes can
also have a firewall, and they can filter incoming and outgoing traffic. They
have different types of access control mechanisms depending on whether
they are mainly designed to be client or server nodes and whether they
are single-user or multi-user systems.
In multi-user and multi-application systems access to data of other users is
limited with access control mechanisms. Applications also need to be
protected from each other as well. Especially the integrity of the operating
system is important as all the applications in the system rely on its
functionality.
Node level Intrusion Detection Systems (IDS) typically monitor and detect
abnormal user behavior and changes in important files. Other mechanisms
include for example virus protection and log files.
26
Applying a Systems Approach to Security in a Voice Over IP System
Application Security
Applications have certain access rights to resources such as files or data
in the memory of the computer they are running on. With communication
applications the application actually has two users: the one who owns the
computer and the person at the other end of the communication.
Local user can often send files or other information from the computer to
the remote party for example during a conversation. The communication
application is rarely intended to allow the remote party access to the local
resources unless the local user explicitly wants that to happen. Poorly
written applications can be tricked to malfunction and allow a remote party
access to confidential data. In a conversation between two mobile phones
this could mean that the other person could get access to the telephone
directory or text message storage of the other person.
Communication Security
Communication security here means the protection of connections, and
the data transferred between two end-points. Protection of
communications can happen at different layers of the TCP/IP protocol
stack (see subsection ). Examples of security mechanisms at different
layers are S/MIME[31] at application layer, Transport Layer Security
TLS[29], and IPSec[30] at network layer, and VLANs[32] at data link layer.
Cryptography is a typical means to protect data. It can protect the
confidentiality of the data, and detect a breach of integrity in it. It also
provides means for authentication of the end-points of the communication,
whether they are computers or people.
Other Aspects
In addition to securing the software side of the information systems, there
is a need for physical protection as well. Physical security is protection of
physical assets with locks, walls, doors, buildings, surveillance cameras,
alarms, guards and other physical means. If we consider computer
security as a whole we have to take into account also the physical space
around the computers and networks. Even though the access controls and
firewalls in software would be in good condition, someone might just steal
the computer and the valuable information in it. Cryptography might
protect voice communication between two terminals, but it does little to
counter eavesdropping of the physical space around the terminal.
In order to get the define security policies and implement security
mechanisms that enforce them in practice, we need an organization that
manages and coordinates the security processes. Important questions to
take into account include division of power and responsibilities, and
allocation of resources [1].
27
Applying a Systems Approach to Security in a Voice Over IP System
4 Voice over IP Security
In this chapter we will look at security from the point of view of VoIP
systems, and consider expectations towards security in VoIP systems. The
presentation in this section is brief and general. The case study in Chapter
7 will give us deeper understanding of security in a VoIP system.
VoIP systems are computer communication systems, so basically all the
security principles presented in Chapter 3 apply to VoIP systems as well.
The function of security is to prevent, detect, and recover from attacks
against the VoIP system.
Voice over IP security alliance has divided threats to VoIP security and
privacy into six categories in its threat taxonomy. Social threats include
threats such as misrepresentation, theft of services, and unwanted
contact. Eavesdropping threats target the signaling and media, and
includes traffic capture, number harvesting, and call pattern tracking.
Interception and modification threats are those where the attacker has
access to complete control or media stream and is able to alter it. Service
abuse category includes different forms of identity theft, methods for
concealing fraud, and methods to bypass billing functions of a system. All
the forms of denial of service attacks are included in intentional
interruptions of service. There are also other interruptions such as power
outages and resource exhaustion. [34]
The security mechanisms for VoIP systems are mostly the same ones that
can be used to protect any computer system. Special attention is required
in any case. VoIP systems place additional requirements for the
components regarding performance and security. Performance
requirements might restrict the use of some security mechanisms as well.
[17]
As we saw in Chapter 2, there are many different types of applications of
VoIP. In these different systems, the technology, and security mechanisms
are similar to each other. The purposes of these systems vary from
application to application. What actually makes the difference from the
security viewpoint is the difference in requirements and expectations for
the security of these systems. These are defined by the different parties
that are affected by the level of security of the system.
There are many different parties that have a stake in the quality of VoIP
Systems. Depending on their interests, they in general value different
security aspects of the system more than others. These interests then
have to be combined together to satisfy all the parties. We now look at the
expectations of some of the main interest groups, namely the users, the
service providers, and the governments.
Users are the main target group of VoIP services. After all, a service
without users does not make much sense. Users can roughly be divided
into home users, business users, and government users. Home users
main security interest is typically availability of service. Privacy is another
28
Applying a Systems Approach to Security in a Voice Over IP System
issue of concern for many people. The integrity of call detail records
collected by a service provider is important if the services are charged for.
Governments, in the user role, often have strict requirements for
confidentiality in their activities (military, health care). Public services such
as police and fire departments may have their own dedicated
communication networks which are separate from the ones open for
public. Business organizations utilize public communication networks in
the same manner as home users, while they often have higher
requirements for confidentiality. They may have their own internal
communication networks.
Service providers’ main interest is in protecting the integrity and availability
of the service system. The service system produces value to the owners
and users only when it is available and working. The systems also contain
sensitive data such as subscriber information, charging information, and
details about made calls that need to be protected from unauthorized
access. Service providers typically have to fulfill various amounts of
regulatory requirements, the extent of which depends on the type of the
provided service.
In addition to the user role, governments participate in many ways in VoIP
system development. They pose regulatory requirements, which try to
balance between needs of society, needs of business, and political
agendas. The regulations are not very negotiable after they have been set
and therefore usually have to be taken as given. Lawful interception,
emergency calls, privacy protection, and retention and protection of call
detail records are examples of such regulatory requirements. Some
requirements are conflicting. For example the requirement for lawful
interception is based on public or national safety, and it actually restricts
the amount of privacy and confidentiality protection that is allowed for the
users. The national public communication systems are in the main interest
of governments. On the other hand, the regulators have little interest in
PBX systems used inside companies, and VoIP systems that are used
internally in transport networks of the operators.
29
Applying a Systems Approach to Security in a Voice Over IP System
5 Systems Methodology
Systems methodology is a means to generate understanding on existing
systems and to design new systems. Systems methodology gives tools for
simplifying the emerging complexities and interdependencies between and
within technological and social systems. This chapter presents background
for systems methodology, and defines and describes essential concepts
related to it.
We will use the systems methodology as the basis for a specific method
that will be described in Chapter 6. We can use this method to build
various kinds of system models. A model of an existing system can be
used for analyzing that system, for example to discover problems in it. We
can also design new models that we can later implement into reality.
The term system is used very broadly here. Basically it can mean any
subject under study. For example our system can be a network of
computers. If we need to look into the details, a single specific computer in
that network can be seen as subsystem that we can concentrate on and
take as the new system under study. On the other hand we can look at the
bigger picture and see how the network is a subsystem of an even larger
system such as a business organization or a society.
Systems methodology is very general in the sense that it basically can be
applied to any problem. The target in contrast is specific. Every situation is
regarded as more or less unique. This allows for customized treatment for
each problem that in systems perspective appears to become a set of
interrelated problems. Even with an initial focus on a technical system,
systems methodology draws the attention quickly towards organizational
and human issues. Systems methodology measures the technological
system by the value it produces to the people in its environment. In this
way systems methodology is beneficial in filling the gap between technical
and management issues in security.
The method begins with as little assumptions about the system under
study as possible. In the security context this means that for example the
security requirements of the systems are not given, but they should be
discovered through the process of inquiry. This would mean discussions
and interviews with different stakeholders about their security
requirements for the specific system in questions whenever it is possible.
In principle systems methodology allows examining systems on different
scales using the same concepts and methods. The same iterative
approach can be repeated for subsystems as for the larger whole. The
results differ from each other because on different levels of the system and
in different parts of the system different aspects and properties are
relevant. The organizational, physical, and software dimensions to
systems and security can be treated analogously too. The methodology
facilitates structuring of knowledge. We can explicitly define different levels
of system abstraction which helps us to effectively hide unnecessary
30
Applying a Systems Approach to Security in a Voice Over IP System
details out of the way. Still it allows maintaining of clear connections
vertically between the different abstraction levels.
The methodology enables us to build system models that quickly show us
how different details of the system are linked together in the big picture. It
enables us to spot the places where security breaches might occur. It
facilitates understanding both the user end-to-end perspective and the
technological end-to-end perspective to the system. In the user
perspective we can leave out all the technical details of the system and
consider what the system and its security aspects look like from the user
perspective. On the other hand we can build models that span the whole
communication path through the network from node to node.
5.1 Systems Theories
Systems theories are a relatively new addition to our body of knowledge.
Although their roots date back millennia, the systematic formalization
started in the beginning of the 20th
century[28]. The theories and
methodologies are constantly evolving and there is not any single right
systems approach. Systems approach has been used in fields such as
physics[25] biology[25], cybernetics[27], social sciences[8], and
organizational management & development[24].
While there are many different schools of systems thinking around, we will
mostly follow a systems methodology called interactive management,
using its terminology and concepts related to systems. Interactive
management aims to understanding of purposeful systems such as
business companies and the society. Computer systems can be
considered as subsystems for them, as we are going to see in the case
study in Chapter 7.
In this study we concentrate on technological systems. But while the
system itself is technological, people form an essential part of its
environment. Technological systems don’t have purpose of their own but
they serve the purposes of their environment.
5.2 System and its Environment
First we have to define two important concepts: system and its
environment.
- System: a set of interrelated elements, each of which is related
directly or indirectly to every other element, and no subset of which
is unrelated to any other subset. [8]
The definition of system implies that one cannot fully understand the
behavior of one part of the system without understanding of the whole
system since all parts of a system are interrelated. A change in one part of
the system can affect any other part of that system.
- Environment of a system: a set of elements and their relevant
properties, which elements are not part of the system, but a change
31
Applying a Systems Approach to Security in a Voice Over IP System
in any of which can cause or produce a change in the state of the
system. [8]
In order to understand behavior of a system, one needs to understand its
relationship with the environment too. Systems do not exist in isolation:
they are inseparable from their environment. Every system is here
considered to be an open system.
System’s Environment
System
Figure 11: System in its environment
Figure 11 shows a system, its environment, and interactions between
them. The arrows going into the system are its inputs, and the arrows
coming from the system are its outputs. The relationship between the
inputs and the outputs define the function of the system, and the
relationship between the function and the environment defines the
system’s purpose in that environment.
We can identify different dimensions in a system and its environment. For
example a computer system may be seen from the point of view of the
software system, the physical system (hardware) and the organizational
system.
Organizational dimension defines the main purpose or purposes of the
system. For example a communication system can be part of
organization’s support functions, or it can be a product or service that a
company is providing. Typical terminology for organizational context might
include value, responsibility, power, influence, control, ownership, trust,
agreement, and other concepts describing social relationships.
The software dimension looks at the system from the point of view of
computer networks and software. The starting point is the software
communication channel and related applications such as operating
systems, databases, and network protocols. Typical terminology for
describing network context includes connection, interface, node,
application, data, access, throughput, response time and other computer
software related terminology.
The physical dimension looks at the physical objects, and space, and their
mechanics. In a communication system its starting point is the physical
communication channel and related equipment such as the computers,
network cables and radio links. Typical terminology might include location,
32
Applying a Systems Approach to Security in a Voice Over IP System
distance, movement, speed, weight, material, and other mechanical
concepts.
5.3 Systems Thinking
If we look inside a system we will find it is composed of components and
their relationships: the system has an internal structure. There is also a
specific way, a process, how the system converts the inputs into outputs.
This output is the function of the structure and the process.
Each of these concepts, function, process, and structure, has been
considered to be the most important aspect of a system by different people
at different times. People who stress analysis are been concerned with the
structure, those who stress synthesis with the function and process
orientated people with the process of a system. In systems thinking each
of the three concepts are considered equally essential, and inseparable of
each other. They are basically different views to the same system. [21]
According to Ackoff[19] a main difference between analytical and systemic
approach is the concept of interdependence. In analytical approach it is
assumed that one can understand a system as a whole by taking it to
parts and analyzing these parts independently. It is therefore a
reductionistic approach. In systems approach, we assume that we can
understand the parts of the system only by understanding their
relationships to the whole. All the parts of a system are considered to be
interdependent of each other.
Another difference between analytical and systemic approach is the
starting point of inquiry. If analytical approach to understand computers
starts from dividing it to parts and analyzing them, systems approach
starts from looking at the networks the computers are part of and the
individuals who use them. Analytical approach to studying human behavior
would start from finding out what can be found inside human beings,
systemic approach would first look at their relationships with other people
and the society. Analytical thinking begins by looking into the system.
Systems thinking begins by looking out of the system. [19]
5.4 Systems Approach to Problem Solving
Systemic Problems and Their Treatment
An aim of systems methodology is problem solving. We encounter
problems, and try to look solutions to them. We can develop new systems
to solve problem, or we can change and develop the existing ones.
Systemic problems are problems that require systemic treatment, that is, a
view on the larger whole and understanding of the interrelationships of the
system with its environment. A typical example of systemic problem is the
tragedy of commons.
33
Applying a Systems Approach to Security in a Voice Over IP System
Tragedy of commons means a situation where many parties compete over
a limited amount of shared resources. In addition, every party’s own
interest is to consume as much resources as possible, but everyone’s
consuming as much as possible results in a disaster for everyone. [16],
[24]
These kinds of situations are unlikely to be solved without a systemic
approach that can appreciate the situation as a part of a larger whole.
Problem treatments can be divided into four classes: absolution,
resolution, and dissolution. We can ignore, or absolve, the problem. We
can resolve a problem by finding something that works. We can solve the
problem by finding an optimal answer to the problem. Finally we can
dissolve the problem by redesigning the system so that the original
problem disappears. Dissolving problems is a target of systems approach.
[19]
Context, Problem, Ideal, and Solution
Ackoff and Gharajedaghi suggest making a clear separation between the
problem, the ideal, and the solution. Most importantly, the problem that
describes the current state of affairs should be separated from the ideal
that describes our wanted ideal state of affairs. The actual solution that is
to be implemented is then designed based finding a practical solution
between the problem system and the ideal system. [19], [21]
Defining problems and designing solutions are core targets of systems
methodology. It proposes an alternative way for approaching these
activities. Defining problems in terms of existing solutions is very common
in other approaches. This is typical for disciplinary approach, where
problems are called for example technical, social, economic or political
problems, often depending on the field of expertise of the person solving
the problem. [21]
For example a company might have a problem with employees visiting
suspicious websites and increasing the risk of computer virus infections.
One person says it is a firewall problem and is resolved with a more
restrictive firewall, while another says it is a leadership problem and is
resolved by giving the employees more motivating tasks to direct their
attention elsewhere. By defining problems in terms of existing solutions
poses unnecessary limitations on our choices to solve that problem.
On the other hand, defining solutions based only on the current reality, i.e.
the problem, readily defines unnecessary constraints for the possible
solutions. Designing an ideal design from the scratch, thinking out of the
box, allows for much greater creativity and increases our possibilities.
Defining the problem gives us understanding on the current reality. An
ideal gives us something we can move towards. Based on these models
we can then proceed by planning and implementing changes and
improvements to the current system that in an ideal case dissolves the
original problems altogether.
34
Applying a Systems Approach to Security in a Voice Over IP System
Black-Box and White-Box
An approach to gaining understanding on a system can be described as
either a black-box or a white-box approach. In black-box approach, we
consider only inputs and outputs of a system and hide the details about
the internal structures and processes of a system. Black-box approach
can be used to simplify complex systems and allows us to study ever
larger systems. The white-box approach on the other hand inspects the
internal parts of the system. We need white-box approach to simulate
behavior of real-world systems. These two views are complementary to
each other, and are both useful in understanding systems. [15]
Figure 12: Black-box and white-box models
In practice, a white-box model contains black-box models inside it. The
model is an approximation of the reality. We can look deeper and deeper
into the system by continuing to look inside the black-box models. This
way we can develop more and more accurate approximations of the
system under study. In addition to going deeper into details we can also
continue looking out of the system at ever larger entities that the system is
part of.
35
Applying a Systems Approach to Security in a Voice Over IP System
6 Method for Studying Security Aspects of a
System
This chapter describes a method for studying security of a system. It is
built based on the concepts presented in the previous chapter. It both
combines different systems approaches and simplifies them to better suit
the scope of this study. In the next chapter, a case study is presented
which demonstrates the use of this method in practice.
Systems methodology draws attention to the security in the system as a
whole. The security in subsystems is only secondary. A secure system can
be built with components that would be described insecure if analyzed
independently. The security is not treated as an absolute, but it is rather
evaluated relative to the environment and other parts of the system.
The systems methodology enables us to systematically build models from
many different perspectives at many different levels of scale and detail.
This kind of systematic inquiry enables us to point out those things about
the system that we have too little knowledge about. Executing the inquiry
to ever smaller subsystems while at the same time keeping the models of
different subsystem synchronized is tedious, but at the same time it forces
us to understand the system better. The model grows only by linking
different levels and parts of the system together incrementally. That means
the result is a whole body of interlinked knowledge rather than individual
snapshots of the system. This makes the resulting models also attractive
for use in education and explaining large complex systems to others.
6.1 Overview of the Method
We will concentrate on security evaluation, but the method is also a logical
part of developing security of a system in a given environment (Figure 13).
The method is targeted for an existing real-world system in a specific
environment. An assumption is that a statement about the security of a
system is meaningful only when its environment is defined (section 5.2).
Figure 13: Method overview
36
Applying a Systems Approach to Security in a Voice Over IP System
In a broader context we can see the study method as part of risk
management of an organization or part of a method for system
development. The need and benefits for improving security in different
parts of the system is first identified relative to all the other risks in an
organization. After that improvements to the system are designed and
implemented in the development process.
The method has two main dimensions: recursion and iteration. Recursion
is used to create a hierarchy of systems, to chunk the problem up to larger
supersystems and down to smaller subsystems that are easier to manage
(Figure 14). Each of these subsystems is treated in analogous, iterative
way. Iterative approach is practical for gathering information in cases,
where there is a high level of interconnection between systems. Studying
one part often results in knowledge about other parts. Each of the
successive iterations develops our models and understanding of part of
the system further.
Figure 14: Recursions of the method
Each of the iterations considers four dimensions of the subsystem under
study: function, context, structure and process. Function looks at the
system as a black box, context is about the environment or environments
of the system, structure deals with components, and process with their
interactions (see 5.3).
The first iteration identifies the system and builds a model out of it. The
second iteration is a security analysis, and it utilizes the information
gathered during the first iteration. In third iteration an ideal model of the
subsystem is designed and in fourth it is implemented in practice. We
consider here the two first iterations due to time constraints. Each of the
iterations can be repeated as well. As we study the details or the context
of a subsystem further, we are likely to encounter new information that
affects our models of other parts of the whole system.
Recursion takes a component of the system, and considers it as the new
subsystem under study. The same iterative process is applied for each
subsystem. By recursion we will create a hierarchy of system models,
each of which is directly or indirectly related to each other. A system is
related vertically to the containing larger systems through its context and
to its subsystems through its structure. It is also related horizontally to
systems in the same hierarchical level through its context. (Figure 14)
37
Applying a Systems Approach to Security in a Voice Over IP System
The gathering of information about the system can have many forms,
depending on the level of detail and part of the system, or whether we are
interested for example in the organizational, physical or software
dimension of the system. Ways to get organizational information include
interviews and surveys. Information about software can be achieved by
studying documentation such as technical specifications and design
documents, and source code. In some cases black-box testing is the only
way of inquiry. Physical dimension can be studied from documentation
such as floor plans and by visiting the actual sites.
It is worthwhile to notice that we don’t assume much about the system we
are studying. We for example do not assume any certain set of (security)
requirements, but they should be discovered during the process of inquiry
as we consider the role of the system relative to its context. The case
study in Chapter 7 provides examples for understanding the following
description of the method.
6.1 Iteration 1: System Model
System Model – Function
The functional view is a general description what the system does.
Basically only the the inputs and outputs of the system are identified as in
Figure 15 that corresponds to a black-box model of a system (Section )
The details about internal structures and processes of the system are left
out. The system is also studied out of context. The result might even be
trivial, but the functional view is often the most relevant one when
considering the relationship of the system to its larger containing system. A
system may have multiple functions. Functions can be found by
considering different combinations of inputs and outputs of the system.
Figure 15: Function model
System Model – Context
If the function describes in general what the system does, the context
explains why the system does that. The context looks out of the system
under study. The containing larger system is identified as well as other
interrelating systems as in Figure 16. In the recursive hierarchy these
systems typically are on the same level or above as the system under
study. We then consider the objectives of that containing system as the
reason why the system should perform in a certain way or have certain
38
Applying a Systems Approach to Security in a Voice Over IP System
properties. The context can be looked from the organizational, physical,
and software perspectives (see section 5.2).
Figure 16: Context model
As we consider the organizational dimension of the system and its
environment we reach the actual stakeholders, individual persons and
organizations, for whom the system is built and who are affected by it.
When studying a technological system, context inquiry is therefore also a
link between the functionality of the system, and the purposes of the
people using it. In a communication system context also defines the
content of the information passed through it.
The stakeholders define the expectations and requirements for the system
based on their understanding of the environment and the importance of
the system. The interests of the stakeholders regarding the system under
study may not be aligned, in fact, they may well be contradictory. The
same goes for security related requirements.
System Model – Structure
Structure describes the internal static organization of the system.
Identifying system components means defining a partitioning of the
system, and boundaries of components. Figure 17 that illustrates the
structural view corresponds to a white-box model of a system (Section ),
and is also similar to the context view. The components can be software
structures, mechanical objects, or people, and they are related to each
other through an interface. We can define reference points in between the
components. In these points we can take snapshot views of the processes
of the system. The information might include the interaction medium, the
structure of the information, and amount of traffic. A single structure can be
associated with multiple processes resulting in multiple functions.
39
Applying a Systems Approach to Security in a Voice Over IP System
Figure 17: Structure model
The structures are considered as static components. We don’t assume
anything of their inner workings, but rather treat them functionally,
considering only their inputs and outputs. If we want to gain more
knowledge of the inner structures and processes of a specific component,
we consider it as a subsystem, and then execute the iterative process on
that subsystem again. The other components then become as part of the
context of the new subsystem.
System Model – Process
The process is the dynamic part of the system model. It describes how the
different structures are combined together in order to produce the desired
total function. They describe the interactions of the system components.
Processes combine components through interfaces.
Figure 18: Process model
We can describe the processes with the use of the reference points that
are defined in the structural view. The process has a path through the
system structure where it passes different reference points in some order.
As it moves from one point to another it passes components and results in
a function.
6.2 Iteration 2: Security Analysis
Security analysis uses the system model and analyzes it from the security
perspective. To do that we need a threat model. The choice of the model
should reflect the security requirements for the system. For example in a
40
Applying a Systems Approach to Security in a Voice Over IP System
communication system the information flow can bee seen as a main asset.
The requirements might then be stated in terms of confidentiality, integrity
and availability of this flow. The threat model containing the generic threats
of interruption, interception, modification, and fabrication described in
section corresponds to these requirements.
Security Analysis – Function
The first iteration identified the functionality of the system. That
functionality of the system under study is now analyzed against the threat
model. The result is a general description of the possible malfunctions of
the system. This in practice is a list of potential vulnerabilities in the input
or output dimensions. There might for example be illegitimate inputs or
outputs to the system or the input or output might be modified.
In this phase the details about how exactly the system can be broken is
irrelevant. These aspects are considered later in the structural and
process views to security. The further implications of the malfunctions are
irrelevant as well. They are considered in the context view.
Security Analysis – Context
The functional view on security considered the ways in which the system
in general might malfunction. In contextual view these malfunctions are
then considered in relation to the environment of the system. In this phase
we come up with a list of implications of possible malfunctions to the larger
system, and we can evaluate the severity of their impact. By looking at the
environment we can identify possible sources of attacks too.
One of our aims is to connect together different system levels from the
smallest details to the big picture. This would ideally allow for example to
explain why a software fault in a certain part of a communication system is
harmful for customer relationships of a company. Context is the link
between the system under study and the larger system also in security
aspects.
Security Analysis – Structure
In the structural view the static properties, and logical, physical, and social
relationships are in focus. We try to find out where the security breaches
could occur on the basis of the structural model of the system.
Complementarities and redundancies in structure often provide useful
information when considering the impact of an attack against a specific
component.
Security Analysis – Process
For a single process we can consider how the process can be attacked in
different reference points. If we have multiple processes, we can consider
their interrelationships, such as how a failure in one process could lead to
a failure in another process.
41
Applying a Systems Approach to Security in a Voice Over IP System
6.3 Further Iterations
We could still go further and start planning changes for improvement of the
system under study, and actually start implementing these plans. We limit
our study into the first two iterations. The last two iterations are shortly
introduced but their development is left for further study.
Idealized design is designing a system from the scratch, based on the
requirements defined by the context. The objective is a model of the
system that would best serve the interests of the environment. This phase
is executed independent of the analysis of the existing system. That is, the
design of the current system is not taken as a starting point.
Successive approximation takes the results of system analysis and
idealized design, to combine them into a real world solution. Here the
limitations of the current reality are taken into account and compromises
between the ideal and actual improvements are made. We can decide to
run all the improvements we can at once, or decide to have a continuous,
iterative process, where we gradually approach the ideal we have defined
in the idealized design phase.
42
Applying a Systems Approach to Security in a Voice Over IP System
7 Case Study: IP PBX System Security
A study of VoIP System security is described in this chapter. It is based on
a scenario rather than an existing real-world situation. The used method is
described in detail in the previous chapter. We are going to show
examples of execution of the first two iterations of the method, the system
model and the security analysis, on different levels of recursion. The
models we build are not going to be complete, and in many cases they
wouldn’t pass critical inspection. Their primary function is to demonstrate
the use of the methodology and to show what kinds of results would be
expected from its applications.
Figure 19: IP PBX system overview
Figure 19 shows an overview of the situation. A company has an intranet
that provides access to internet and to services such as VoIP calls, e-mail,
and world wide web. Users connect to the network using laptop
computers. Some users access the company intranet from their homes
using encrypted virtual private network connections directly from their
laptop to the intranet firewall.
43
Applying a Systems Approach to Security in a Voice Over IP System
Figure 20:Company system hierarchy
Figure 20 shows an overview of the system hierarchy related to the Voice
over IP system under study. Our study first begins from the VoIP system
(4b in the figure), then looks out at the larger system, the communication
system, and then goes on to study the details of the VoIP system. The
above figure is a result of the study, not a starting point. It is presented
here as a map for the following case study.
7.1 VoIP System Model
VoIP System Function Model
VoIP system is an audio communication channel. It basically allows talking
and exchange of information over a distance. Figure 21 shows the
simplified function of the system. In practice the system usually is
bidirectional, but we only consider one direction here.
Figure 21: VoIP system function
The control of the system and feedback from the system are omitted as
well for simplicity in this demonstration as they can be considered as
means to achieve the function.
44
Applying a Systems Approach to Security in a Voice Over IP System
VoIP System Context Model
The VoIP system is considered to be a part of the communication systems
for the company. A main purpose of the system is to support business by
improving communication inside the company. The cost for maintenance
of the intranet infrastructure and for the internet connection is fixed. The
system allows essentially free phone calls inside the company building
and with a remote location through Internet.
Figure 22: VoIP system context
Figure 22 depicts the four main communication channels in the company.
People either communicate directly by meeting each other, through
internet using VoIP or e-mail, or by mobile phones. These channels have
their own distinct security, usability, and cost properties.
VoIP System Structure Model
VoIP system consists of three essential components, the company
intranet, the internet and a home network (Figure 23). The reference point
A and D are user interfaces, B and C are network interfaces. These are
described in Table 1. Figure 24 shows the physical view of the system that
depicts the physical network cable connection between the intranet and
the home network. The reference point X is a potential unknown entry
point to the network.
Figure 23: VoIP system structure
45
Applying a Systems Approach to Security in a Voice Over IP System
Figure 24: System in its physical environment
The exact path of TCP/IP communication through the network is
unspecified. Two consecutive IP packets might in fact take a different
route. The path shown in Figure 24 is therefore merely suggestive. The
main idea in the physical model is to show that the VoIP traffic travels
through networks owned and controlled by unknown third parties.
Reference
point
Description
A User interface(s) in company intranet, air, audible
sound waves.
B Network-network connection. Electric signal. Encoded
audio signal carried in encrypted IP packets.
C As in B.
D User interface in home network, air, audible sound
waves.
X Additional unknown interfaces to the network.
Table 1: VoIP system reference points
VoIP System Process Model
Figure 25 shows a direct end-to-end media transfer process. The phases
are described in Table 2.
46
Applying a Systems Approach to Security in a Voice Over IP System
Figure 25: VoIP system process
Process Description
1. Sound to VoIP
over IPSec
conversion
Audible sound waves are converted into VoIP stream. The
content is encrypted.
2. Routing The VoIP stream is routed through the network to the
correct recipient based on the IP address in the packets.
3. VoIP over
IPSec to sound
conversion
The procedure 1 is done in reverse.
Table 2: VoIP system process descriptions
7.2 Communication System Model
We found out in VoIP system model, that the system is a part of a larger
communication system inside the company. In risk management
perspective the threats against the VoIP system are very closely related to
the other communication systems. Therefore we take a closer look at the
context of the VoIP system to gain better understanding about why we
need protection and what we actually are protecting in the end.
Communication System Function Model
The communication system basically allows exchange of information over
a distance. Figure 26 shows the simplified function of the communication
system. In practice the system usually is bidirectional, but we only
consider one direction here.
Figure 26: Communication system function
The content of the communication can be for example data, audio or video
stream depending on the specific communication system.
Communication System Context Model
The communication systems are seen as being part of support functions of
the company (Figure 27). They bring value to the company indirectly
47
Applying a Systems Approach to Security in a Voice Over IP System
through the business functions. And finally, the company’s value is defined
by its stakeholders who have different interests and value different kinds of
results.
Figure 27: Communication system in its organizational environment
The communication system is considered to be successful to the degree in
which it is able to provide the right and only the right people with right
information when they need it.
Communication System Structure Model
Figure 28 depicts a simplified high-level model of the communication
system. The picture is the same as in the context view of VoIP system
(Figure 22). A user of the system has four primary choices of
communication channels for delivering a message to a specific
destination: a meeting, VoIP, E-mail, and mobile phone. The delivered
information or parts of it has been received from some source, and the
receiver can send the information forward.
Figure 28: Communication system structure
48
Applying a Systems Approach to Security in a Voice Over IP System
Communication System Process Model
Communication processes are described in Table 3.
Process Description
1. Selection of
party
The user selects the person or system she wants to contact.
2. Selection of
method
The user selects the communication system she wants to
use.
3. Message
passing
The user sends a message to the other party.
Table 3: Communication system process model
7.3 Communication System Security Analysis
We could continue looking out of the system or traverse up the system
hierarchy in Figure 20. Due to limited time frame we have to limit the
expansion of the model. The security analysis of the communication
system is expected to give us direction and a reference frame for further
analysis of the VoIP system.
The main asset in the system is the information flow. The general security
requirements for the flow are confidentiality, integrity and availability. The
analysis of the threats of interruption, interception, and fabrication to the
information flow is considered sufficient to evaluate the system’s ability to
fulfill these requirements.
Communication System Function – Security
The malfunctions to the communication system are identified in Table 4.
Threat Description
Interruption A message sent through the system is not received in the
other end.
Interception There are other recipients to the information flow in
addition to the legitimate recipient.
Fabrication The legitimate recipient receives information that was not
sent through the system by the legitimate sender.
Modification A message is altered on its way through the system.
Table 4: Threats to communication function
Communication System Context - Security
The threats to the function described in the previous subsection are
interpreted within the context in Table 5.
Threat Description Impact
Interruption A person is not able to
deliver a message to a
desired destination.
Delay in operations.
Interception A third party receives
confidential data about the
company, its customers,
Potential loss of competitive
advantage, and deterioration of
image as a reliable business partner.
49
Applying a Systems Approach to Security in a Voice Over IP System
and ongoing projects.
Fabrication Bad information source. A
third party has injected
(false/harmful)
information into the
company communication
system.
Potential harmful influence on
decision making processes.
Modification Information has been
modified on its way from
its source to the intended
destination.
Potential harmful influence on
decision making processes.
Table 5: Threats in communication context
Communication System Structure – Security
The four communication systems are parallel to each other. In some cases
they complement each, such as when VoIP is used to discuss about
material sent by e-mail. In some other cases they are interchangeable. If a
users need to talk with each other, they can choose between VoIP and
mobile.
Threat Requires
Interruption Total interruption of communications would require the
interruption of both the mobile, and the e-mail system in
addition to the VoIP system.
Interception Interception in any part of the communication system.
Fabrication Fabrication in some part of the system.
Modification Modification in any part of the system.
Table 6: Threats to communication system structure
In VoIP and mobile systems users recognize each other by voice and a
fabrication of content, a third party speaking, would most likely be
detected. When talking with an unrecognized person employees are
expected to follow caution and to be aware of the possibility of social
engineering attacks. Replay attacks are theoretically possible. The use of
voice-mail system is very rare and the system is used mostly for exchange
of information rather than for example giving orders. Replay attacks are
considered unlikely based on these facts. The risk is acknowledged but
accepted. Modification is unlikely as well. It is more likely that fabrication
or modification happens for example in the e-mail system. In the case of
VoIP system, interception is the only one of these four threats that
demands for closer analysis.
Communication System Process – Security
Selection of a party and selection of method are decision making
processes of an individual. They can be influenced by attacker for example
by giving false information or by pretending to be an authority that the user
trusts. This can be used to trick a person to send classified information to
50
Applying a Systems Approach to Security in a Voice Over IP System
wrong recipient or to select an insecure communication channel where the
communication can be intercepted.
7.4 VoIP System Security Analysis
We now continue with security analysis of the VoIP system. The analysis
of the communication system has already affected how we estimate the
relative importance of various threats to the VoIP system.
VoIP System Function - Security
In the previous section when analyzing the communication system, we
decided that the threats of interruption, fabrication, and modification are
not a top priority in case of VoIP system. We will therefore concentrate
only on the threat of interception that we consider being the most relevant
here. The threat is described in Table 7.
Threat Description
Interception There are other recipients to the information flow in
addition to the legitimate recipient.
Table 7: Threats to VoIP system function
VoIP System Context - Security
The threats to VoIP system context are described in Table 8.
Threat Description Impact
Interception A third party has access to
the media stream.
Interception in the communication
system.
Table 8: Threats to VoIP system context
VoIP System Structure – Security
Threats to VoIP system structures are described in Table 9.
Threat Requires
Interception Interception in any of the networks
Table 9: Threats to VoIP system structure
VoIP System Process – Security
Threats to VoIP system process is described in Table 9.
Reference
point
Description
A Eavesdropping of the physical space of user-terminal
medium by a person or a microphone
B Interception of encrypted VoIP traffic would reveal the IP
address of the remote user terminal.
C Interception of encrypted VoIP traffic would reveal the IP
address of the remote user terminal.
51
Applying a Systems Approach to Security in a Voice Over IP System
D Unlocked room in a locked building. Family members and
visitors have physical access to the room.
Eavesdropping of the physical space of user-terminal
medium by a person or a microphone
Table 10: Interception of VoIP system process
7.5 Intranet Model
We continue down the system hierarchy (Figure 20) to understand its
internal structure and processes in more detail. We first look at the
intranet, then the internet and finally the home network. This way we get a
network level end-to-end view of the VoIP system.
Intranet Function Model
In the VoIP system the intranet has two main functions that we can identify
in Figure 29 by looking at the combinations of reference points. First, it can
mediate conversations between two intranet end-points. Second it can
convert the audible sound to VoIP traffic, and encrypt it to be sent forward
out of the network.
Intranet Context Model
The intranet is connected to the internet and through it to employees’
home networks (Figure 23). The network is physically located inside one
building and it spans several rooms. All employees have access to the
network. The users use it mainly to communicate with people and access
information and services in the network.
Intranet Structure Model
The intranet is a simple switched local area network that is connected to
external networks through a firewall (Figure 29). There are several similar
user terminals connected to it. The reference points are described in Table
11.
52
Applying a Systems Approach to Security in a Voice Over IP System
Figure 29: Intranet structure
Reference
point
Description
A User-terminal medium. Air, audible sound waves.
B Terminal-network connection. Ethernet, electric signal.
Encoded audio signal carried in RTP packets on UDP on IP
on Ethernet.
C Ethernet. Essentially the same properties as in point B
(probably larger amount of traffic).
D Connecting the home network and the internet. The VoIP
payload is encrypted.
Table 11: Intranet reference point descriptions
Intranet Process Model
Figure 30 shows that part of a direct end-to-end media transport that takes
place in the intranet. The depicted process is for VoIP connections to
outside of the intranet. The phases are described in Table 12.
Figure 30: Intranet process
Process Description
1. VoIP
conversion
Audible sound waves are converted into VoIP stream.
2. Routing The VoIP stream is routed through the network to the
correct recipient based on the IP address in the packets.
3. Routing + The stream is encapsulated in encrypted packets and routed
53
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10

More Related Content

Viewers also liked

Batson_ Design Samples
Batson_ Design SamplesBatson_ Design Samples
Batson_ Design Samples
Chelsey Batson
 
Life After Graduation
Life After GraduationLife After Graduation
Life After Graduation
Paul Olioff
 
S&R June 2013 Food safety
S&R June 2013 Food safetyS&R June 2013 Food safety
S&R June 2013 Food safety
Simone Armer
 

Viewers also liked (19)

Batson_ Design Samples
Batson_ Design SamplesBatson_ Design Samples
Batson_ Design Samples
 
Eurostar_bro_ ENG
Eurostar_bro_ ENGEurostar_bro_ ENG
Eurostar_bro_ ENG
 
Bán vé máy bay việt nam airlines từ hồ chí minh đi singapore giá rẻ
Bán vé máy bay việt nam airlines từ hồ chí minh đi singapore giá rẻBán vé máy bay việt nam airlines từ hồ chí minh đi singapore giá rẻ
Bán vé máy bay việt nam airlines từ hồ chí minh đi singapore giá rẻ
 
параметринамузикалнитезвуци
параметринамузикалнитезвуципараметринамузикалнитезвуци
параметринамузикалнитезвуци
 
Monitor SharePoint usage and performance using Application Insights
Monitor SharePoint usage and performance using Application InsightsMonitor SharePoint usage and performance using Application Insights
Monitor SharePoint usage and performance using Application Insights
 
Life After Graduation
Life After GraduationLife After Graduation
Life After Graduation
 
Intel_YogaBlueprint
Intel_YogaBlueprintIntel_YogaBlueprint
Intel_YogaBlueprint
 
บท3
บท3บท3
บท3
 
Crash of 1929 Museum by Aniruth Kasthuri and Sai Nakka
Crash of 1929 Museum by Aniruth Kasthuri and Sai NakkaCrash of 1929 Museum by Aniruth Kasthuri and Sai Nakka
Crash of 1929 Museum by Aniruth Kasthuri and Sai Nakka
 
Pais tao pequeno para tanto ladrao
Pais tao pequeno para tanto ladraoPais tao pequeno para tanto ladrao
Pais tao pequeno para tanto ladrao
 
Plan de trabajo hogar bohío de maría 2016 2
Plan de trabajo hogar bohío de maría 2016 2Plan de trabajo hogar bohío de maría 2016 2
Plan de trabajo hogar bohío de maría 2016 2
 
Chapter 1.1 glaze basics
Chapter 1.1 glaze basicsChapter 1.1 glaze basics
Chapter 1.1 glaze basics
 
S&R June 2013 Food safety
S&R June 2013 Food safetyS&R June 2013 Food safety
S&R June 2013 Food safety
 
E3
E3E3
E3
 
Assessment 01
Assessment 01Assessment 01
Assessment 01
 
DEE baby resume
DEE baby resumeDEE baby resume
DEE baby resume
 
DIAPOSITIVAS DE INFORMATICA
DIAPOSITIVAS DE INFORMATICA DIAPOSITIVAS DE INFORMATICA
DIAPOSITIVAS DE INFORMATICA
 
trabajando en la nube
trabajando en la nube trabajando en la nube
trabajando en la nube
 
مندوب
مندوبمندوب
مندوب
 

Similar to systems-approach-security_masters-thesis_Halla_2016-08-10

Reliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docxReliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docx
carlt4
 
Process behaviour modelling using lsm
Process behaviour modelling using lsmProcess behaviour modelling using lsm
Process behaviour modelling using lsm
iaemedu
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
laurieannwilliams
 
create your own Security Management Model using the NIST Special Pub.pdf
create your own Security Management Model using the NIST Special Pub.pdfcreate your own Security Management Model using the NIST Special Pub.pdf
create your own Security Management Model using the NIST Special Pub.pdf
FORTUNE2505
 
Be information technology2008course
Be information technology2008courseBe information technology2008course
Be information technology2008course
Anuj Sharma
 
Evaluating systems usability in complex work. Development of a systemic usabi...
Evaluating systems usability in complex work. Development of a systemic usabi...Evaluating systems usability in complex work. Development of a systemic usabi...
Evaluating systems usability in complex work. Development of a systemic usabi...
VTT Technical Research Centre of Finland Ltd
 

Similar to systems-approach-security_masters-thesis_Halla_2016-08-10 (20)

Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2
 
Systems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasisSystems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasis
 
Reliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docxReliable Behavioural Factors in the Information SecurityCont.docx
Reliable Behavioural Factors in the Information SecurityCont.docx
 
Process behaviour modelling using lsm
Process behaviour modelling using lsmProcess behaviour modelling using lsm
Process behaviour modelling using lsm
 
20150122 cisec mbsa-lismma
20150122 cisec mbsa-lismma20150122 cisec mbsa-lismma
20150122 cisec mbsa-lismma
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
Operating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdfOperating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdf
 
Security Introspection for Software Reuse
Security Introspection for Software ReuseSecurity Introspection for Software Reuse
Security Introspection for Software Reuse
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial device
 
create your own Security Management Model using the NIST Special Pub.pdf
create your own Security Management Model using the NIST Special Pub.pdfcreate your own Security Management Model using the NIST Special Pub.pdf
create your own Security Management Model using the NIST Special Pub.pdf
 
Be information technology2008course
Be information technology2008courseBe information technology2008course
Be information technology2008course
 
Learn about Security Orchestration
Learn about Security OrchestrationLearn about Security Orchestration
Learn about Security Orchestration
 
9.system analysis
9.system analysis9.system analysis
9.system analysis
 
IMPLEMENTATION_OF_SECURITY_INFORMATION_EVENT_MANAG.pdf
IMPLEMENTATION_OF_SECURITY_INFORMATION_EVENT_MANAG.pdfIMPLEMENTATION_OF_SECURITY_INFORMATION_EVENT_MANAG.pdf
IMPLEMENTATION_OF_SECURITY_INFORMATION_EVENT_MANAG.pdf
 
Systems engineering
Systems engineeringSystems engineering
Systems engineering
 
Rinat Galyautdinov: Systems engineering guide from the department of defense
Rinat Galyautdinov: Systems engineering guide from the department of defenseRinat Galyautdinov: Systems engineering guide from the department of defense
Rinat Galyautdinov: Systems engineering guide from the department of defense
 
Evaluating systems usability in complex work. Development of a systemic usabi...
Evaluating systems usability in complex work. Development of a systemic usabi...Evaluating systems usability in complex work. Development of a systemic usabi...
Evaluating systems usability in complex work. Development of a systemic usabi...
 

systems-approach-security_masters-thesis_Halla_2016-08-10

  • 1. Applying a Systems Approach to Security in a Voice Over IP System Case Study: IP PBX System in a Small Company Antti Halla Helsinki University of Technology Supervisor: Professor N. Asokan Instructor: M.Sc. Juha Sääskilahti 10th August 2006
  • 2. Applying a Systems Approach to Security in a Voice Over IP System HELSINKI UNIVERSITY OF TECHNOLOGY Department of Computer Science and Engineering ABSTRACT OF MASTER’S THESIS Author Date 10th August 2006 Antti Halla Pages 68 Title of thesis Applying a Systems Approach to Security in a Voice over IP System Professorship Professorship Code Telecommunications Software T-110 Supervisor Professor N. Asokan Instructor M.Sc. Juha Sääskilahti The objective of this work is to evaluate security in parts of a system in relation to security of a whole system. The focus is on Voice over IP (VoIP) systems. VoIP systems have recently been discussed widely, and their security aspects have received much of criticism. This work is also an attempt to combine different areas of security into a coherent whole. The method of research used is systems methodology. Systems approach itself is directed towards entities, which might make it useful for studying security of a whole system. In this thesis a method for studying security in a system is outlined. A case study about security in a VoIP system of a small company applies this method, and at the same time demonstrates VoIP and security concepts. Systems methodology is a general methodology for understanding specific systems in a specific environment. It begins to look at a system with little or no assumptions at all. In security context this means that there are no assumptions for example about security requirements for the system, but they are discovered through the process of systematic inquiry. Keywords: Security, Voice over IP, Systems Methodology, Risk Management, System Development TEKNILLINEN KORKEAKOULU DIPLOMITYÖN TIIVISTELMÄ 2
  • 3. Applying a Systems Approach to Security in a Voice Over IP System Tietotekniikan osasto Tekijä Päiväys 10.8.2006 Antti Halla Sivumäärä 68 Työn nimi Applying a Systems Approach to Security in a Voice over IP System Professuuri Koodi Tietoliikenneohjelmistot T-110 Työn valvoja Professori N. Asokan Työn ohjaaja DI Juha Sääskilahti Työn tavoitteena on järjestelmän yksittäisten osien turvallisuuden arvioiminen osana systeemin kokonaisturvallisuutta. Tarkastelun kohteena on Voice Over IP (VoIP) systeemit. Ne ovat olleet viimeaikoina keskustelun kohteena, ja niiden turvallisuusominaisuudet ovat saaneet osakseen arvostelua. Tämä työ on samalla myös yritys yhdistää eri tietoturvallisuuden osa-alueita yhteen yhtenäiseksi kokonaisuudeksi. Tutkimuskeinona on käytetty systeemimetodologiaa. Systeemilähestymistapa jo itsessään korostaa kokonaisuuksia, joten se voisi soveltua myös kokonaistietoturvan tutkimiseen. Tutkimuksessa hahmotellaan metodi järjestelmän tietoturvan analysoimiseksi. Tapaustutkimus turvallisuudesta pienyrityksen VoIP- järjestelmästä soveltaa hahmoteltua metodia ja kokoaa samalla yhteen Voice over IP:n ja tietoturvallisuuden käsitteitä. Systeemimetodologia on yleinen methodologia yksittäisten systeemien ymmärtämiseen yksittäisessä ympäristössä. Se lähtee tutkimaan järjestelmää mahdollisiman vähin alkuoletuksin. Turvallisuuskontekstissa tämä tarkoittaa, että esimerkiksi turvallisuusvaatimuksia ei oleteta, vaan ne etsitään systemaattisen tutkimusmetodin avulla. Avainsanat Turvallisuus, Voice over IP, Systeemiajattelu, Riskinhallinta, Järjestelmäkehitys 3
  • 4. Applying a Systems Approach to Security in a Voice Over IP System Contents Contents...................................................................................4 List of Figures..........................................................................6 List of Tables...........................................................................7 Glossary of Terms...................................................................8 Acknowledgements...............................................................10 1 Introduction..................................................................11 1.1 Motivation..............................................................11 1.2 Research Question...............................................12 1.3 Structure of the Thesis..........................................12 2 Voice Over IP Systems.................................................13 2.1 VoIP and Network Convergence...........................13 2.2 Applications of Voice over IP.................................14 2.3 Common Functionality in Voice over IP Systems. .15 2.4 Technological Basis of Voice over IP Systems......16 3 Security.........................................................................21 3.1 Computer Security................................................21 3.2 Risk Management.................................................25 3.3 Security Mechanisms............................................25 4 Voice over IP Security..................................................28 5 Systems Methodology.................................................30 5.1 Systems Theories.................................................31 5.2 System and its Environment..................................31 5.3 Systems Thinking..................................................33 5.4 Systems Approach to Problem Solving.................33 6 Method for Studying Security Aspects of a System..36 6.1 Overview of the Method........................................36 6.1 Iteration 1: System Model.....................................38 6.2 Iteration 2: Security Analysis.................................40 6.3 Further Iterations...................................................42 7 Case Study: IP PBX System Security.........................43 7.1 VoIP System Model...............................................44 7.2 Communication System Model..............................47 7.3 Communication System Security Analysis............49 7.4 VoIP System Security Analysis..............................51 7.5 Intranet Model.......................................................52 7.6 Intranet Security Analysis......................................54 7.7 Home Network Model............................................55 7.8 Home Network Security Analysis..........................56 7.9 Internet Model.......................................................57 7.10 Internet Security Analysis......................................58 7.11 User Terminal Mode..............................................58 7.12 User Terminal Security Analysis............................60 7.13 Case Study Summary...........................................61 4
  • 5. Applying a Systems Approach to Security in a Voice Over IP System 8 Conclusions..................................................................62 8.1 Evaluation of Systems Methodology.....................62 8.2 Further study.........................................................63 9 Summary.......................................................................65 10 References....................................................................66 5
  • 6. Applying a Systems Approach to Security in a Voice Over IP System List of Figures Figure 1: Migration from vertical to horizontal service architecture (source[12])13 Figure 2: Simplified network overview.................................................................17 Figure 3: TCP/IP protocol stack.............................................................................18 Figure 4: Simple VoIP call sequence......................................................................19 Figure 5: Media transfer.........................................................................................20 Figure 6: Security threats (source [22] )................................................................22 Figure 7: Waterfall development model.................................................................23 Figure 8: Security concepts....................................................................................23 Figure 9: Testing in waterfall model......................................................................24 Figure 10: Security division...................................................................................26 Figure 11: System in its environment....................................................................32 Figure 12: Black-box and white-box models.........................................................35 Figure 13: Method overview..................................................................................37 Figure 14: Recursions of the method.....................................................................37 Figure 15: Function model.....................................................................................38 Figure 16: Context model......................................................................................39 Figure 17: Structure model....................................................................................40 Figure 18: Process model.......................................................................................40 Figure 19: IP PBX system overview......................................................................43 Figure 20:Company system hierarchy...................................................................44 Figure 21: VoIP system function............................................................................44 Figure 22: VoIP system context.............................................................................45 Figure 23: VoIP system structure...........................................................................45 Figure 24: System in its physical environment......................................................46 Figure 25: VoIP system process.............................................................................47 Figure 26: Communication system function..........................................................47 Figure 27: Communication system in its organizational environment..................48 Figure 28: Communication system structure.........................................................48 Figure 29: Intranet structure...................................................................................53 Figure 30: Intranet process.....................................................................................53 Figure 31: Home network structure.......................................................................55 Figure 32: Home network process.........................................................................56 Figure 33: Internet function...................................................................................57 Figure 34:User terminal function...........................................................................58 Figure 35: User terminal structure.........................................................................59 Figure 36: User terminal process...........................................................................60 6
  • 7. Applying a Systems Approach to Security in a Voice Over IP System List of Tables Table 1: VoIP system reference points...................................................................46 Table 2: VoIP system process descriptions.............................................................47 Table 3: Communication system process model....................................................49 Table 4: Threats to communication function.........................................................49 Table 5: Threats in communication context...........................................................50 Table 6: Threats to communication system structure.............................................50 Table 7: Threats to VoIP system function...............................................................51 Table 8: Threats to VoIP system context................................................................51 Table 9: Threats to VoIP system structure..............................................................51 Table 10: Interception of VoIP system process......................................................52 Table 11: Intranet reference point descriptions......................................................53 Table 12: Intranet process......................................................................................54 Table 13: Threats to intranet function....................................................................54 Table 14: Intranet threats in context.......................................................................54 Table 15: Intranet threats to structure....................................................................54 Table 16: Intranet, causes of interception..............................................................54 Table 17: Home network reference points.............................................................56 Table 18: Home network process model................................................................56 Table 19: Threats to home network function.........................................................56 Table 20: Home network threats in context...........................................................56 Table 21: Threats to home network structure.........................................................56 Table 22: Home network, causes of interception...................................................57 Table 23: Threats to internet function....................................................................58 Table 24: Internet threats in context.......................................................................58 Table 25: User terminal reference point descriptions............................................60 Table 26: User terminal process descriptions.........................................................60 Table 27: Threats to user terminal function...........................................................60 Table 28: User terminal threats in context.............................................................61 Table 29: Threats to user terminal structure...........................................................61 Table 30: User terminal process interruption.........................................................61 7
  • 8. Applying a Systems Approach to Security in a Voice Over IP System Glossary of Terms ADSL Asymmetric Digital Subscriber Line Availability The property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system. [4] Data confidentiality The property that information is not made available or disclosed to unauthorized individuals, entities, or processes. [4] Data integrity The property that information has not been changed, destroyed, or lost in an unauthorized or accidental manner. [4] DMZ DeMilitarized Zone DNS Domain Name Service DoS Denial of Service Environment of a System A set of elements and their relevant properties, which elements are not part of the system, but a change in any of which can cause or produce a change in the state of the system. [8] GPRS General Packet Radio Service IDS Intrusion Detection System IMS IP Multimedia Subsystem IP Internet Protocol ISDN Integrated Services Digital Network LAN Local Area Network NIDS Network Intrusion Detection System PBX Private Branch Exchange PSTN Public Switched Telephone Network RTCP Real-Time Control Protocol RTP Real-Time Transport Protocol SDP Session Description Protocol SIP Session Initiation Protocol System A set of interrelated elements, each of which is related directly or indirectly to every other element, and no subset of which is unrelated to any other subset. [8] 8
  • 9. Applying a Systems Approach to Security in a Voice Over IP System System integrity The quality that a system has when it can perform its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation. [4] TCP Transmission Control Protocol TLS Transport Layer Security UDP User Datagram Protocol UMTS Universal Mobile Telecommunications System VLAN Virtual Local Area Network VoIP Voice over IP WLAN Wireless Local Area Network 9
  • 10. Applying a Systems Approach to Security in a Voice Over IP System Acknowledgements I want to thank my supervisor professor N. Asokan for advice and encouragement, and my instructor Juha Sääskilahti for guiding me through the whole work. Thanks to Antti Alinen for review and professor Teemupekka Virtanen for instructions in the beginning of the work. Thanks to my employer Ericsson for making this thesis work possible, and especially all the people at NetworkSecurity department. Finally thanks to each and all of you who supported me along the way in any way. 10
  • 11. Applying a Systems Approach to Security in a Voice Over IP System 1 Introduction 1.1 Motivation Security as a basic need has always been there. In contrast, security as a field of study has got a new dimension during the last few decades along with new technological innovations. The number and the capacity of computers and networks has been growing rapidly, and at the same time people are learning more about using, and abusing these new technologies. One of the current trends in technology is called network convergence. A main technological aspect of this course of development is that the traditional telephone networks, mobile telephone networks and the Internet are gradually merging into one global communication system. The Internet was mainly designed for data transfer. It is now facing new challenges, especially regarding availability and quality of service, as it is required to provide increased support for transport of real-time media such as audio and video. The traditional telephone networks are also facing new challenges as they are migrating into using Internet technologies. Assuring high level of quality and availability in the telephone service is one issue. Another major issue is security. The internet is notorious for its security problems. Virus attacks, unauthorized use of computer systems, denial of service attacks and website incidents have become a commonplace in the internet today [11]. Voice over IP (VoIP) systems have to be prepared to meet these threats. Security in communication networks is a complex issue. There are large numbers of interconnected networks that are owned and controlled by different parties. These networks often span large areas and connect large numbers of computers and other network nodes together. In principle, a security breach in any part of the network could endanger the security of the whole network. The field of computer security began with a focus on single computer systems. Over time the focus shifted from individual computers to computer networks [1]. Focusing only on either one will not bring us secure communication systems. We need to develop the security in both of them and to understand how they are interrelated to each other. Systems methodologies give us conceptual tools for understanding systems in relationship with their environment. They help us to understand and to improve existing systems and to develop altogether new systems that are better adapted for specific purposes and specific environments. They help us first to find, and then to concentrate on the most essential aspects of systems while avoiding unnecessary details, depending on the situation and the environment. 11
  • 12. Applying a Systems Approach to Security in a Voice Over IP System 1.2 Research Question The main research question of this thesis is: What are the main benefits of systems methodology in studying security aspects of Voice over IP systems? We start with the hypothesis that systems methodology will help us to combine different aspects of a VoIP system, and the security in them together in a way that would provide practical information for developing security in real-world VoIP systems. We expect the systems approach to provide us with means to find a balance that optimizes the cost of security measures and achieved decrease of risk in the whole system. The resulting method should include both technological and social dimensions to the VoIP system. It should also provide a high-level conceptual framework for managers with sufficient details for engineers to facilitate understanding and communication of security aspects of VoIP systems. To answer the research question we first need to gather some background knowledge on the subject. The background study tries to answer the following five questions: What are VoIP systems? What is their technological basis? What are the security aspects of a system in general? What are the security aspects of VoIP systems in particular? What is systems methodology? How to apply systems methodology in practice? Each of these five questions is discussed in their own chapters. A case study is then performed to provide a basis for evaluating the methodology, whether it is feasible for this purpose, and whether it brings new aspects to security in Voice over IP systems. 1.3 Structure of the Thesis Chapter 2 gives an overview of Voice over IP Systems and their technological basis. Chapter 3 discusses computer security in the context of risk management and system development. Chapter 4 discusses security aspects of VoIP systems. Chapter 5 is an introduction to systems thinking and systems methodology. Chapter 6 describes a method for studying security aspects of a system. Chapter 7 demonstrates the use of the method that is described in Chapter 6. The method is applied to an VoIP system of a small company. 12
  • 13. Applying a Systems Approach to Security in a Voice Over IP System 2 Voice Over IP Systems In this chapter we will look at the general overview of Voice over IP and its uses. We will discuss example applications of VoIP and the common functionality in them. Finally we will look at the basics of Voice over IP technology. 2.1 VoIP and Network Convergence The technology environment in the Internet is very different from that of the traditionally closed telephone systems. Traditional telephone companies used to have separate networks for fixed, mobile, and data communication, each of which had their own set of services. The architecture of the internet is fundamentally different. Internet technology supports provision of both data and voice services. It does that independent of access method, whether one connects from a fixed or mobile terminal. In traditional networks the operator could control the provision of services, in the internet basically anyone can set up a service for anyone else to use. This difference between traditional vertical architecture and internet technology’s horizontal architecture is illustrated in Figure 1 [12]. Figure 1: Migration from vertical to horizontal service architecture (source[12]) In general, Voice over IP means transmitting telephone calls using internet technologies. The current trend is to replace the traditional circuit switched telephone networks with more general purpose and relatively low cost packet switched infrastructure. As with traditional telephone networks VoIP consists of technologies for signaling and transfer of voice. In the case of VoIP, the voice might be combined with video or data transfer as well. VoIP can be found in many different kinds of applications. Internet access providers and independent service providers have offerings for VoIP services. Corporations are migrating to VoIP in their internal telephone systems. VoIP is also used in the internal networks of the operators. [9] Users can access VoIP applications from fixed, wireless or mobile terminals. Most of the VoIP terminals today are fixed, but the number of mobile and wireless terminals is increasing. Although mobility is a trend in 13
  • 14. Applying a Systems Approach to Security in a Voice Over IP System user terminals and on the last mile of the connection, practically all the transport networks use fixed lines. [12] The overall trend is for the current circuit switched, fixed telephone network, the mobile networks and the Internet to merge into a single global communication system, which is built mostly upon internet technologies. 2.2 Applications of Voice over IP IP Multimedia Subsystem – IMS IMS is a standardized platform for multimedia services that has been developed as a joint effort of various technology vendors, tele operators and public representatives. It is planned to gradually replace the current circuit switched telephone systems. The architecture has been designed for multiple access methods, that is, it can be accessed from any access network, either fixed or mobile. The IMS is a way to gradually execute a controlled migration from vertical service architecture to a horizontal one by those who own the physical networks. Service providers in IMS systems can be independent third parties. The platform has defined interfaces to facilitate fast development of value- added services. IMS provides users with multimedia calls and multimedia services. IMS provides operators a means to charge the users for services using different charging schemes. This is a feature that Internet has been lacking. IMS also facilitates roaming, quality of service, and interconnection with PSTN. Having support for legacy networks, the services developed for GSM and PSTN networks are compatible with the IMS system. [2] VoIP as Extension to Instant Messaging Instant messaging systems like MSN Messenger, Yahoo Messenger, Google Talk or online-gaming systems have added voice capability to their chat services. Registered users can set up a voice connection with other users of the system. The service is essentially free of charge for the users. Services typically facilitate user mobility: a person can log in to the system from any terminal connected to the Internet. Other services include presence service and directory service. The caller finds the network address of the callee through the system, after which a point-to-point call connection is created between the caller and the callee. Skype Skype is a VoIP application that has become very popular in a very short time. Skype users can call other Skype users in the internet as well as make calls to PSTN and receive calls from PSTN to their terminal in the internet. The protocols used are proprietary, and there is little information available of the actual implementation details of Skype. The idea behind Skype is very different from that of the traditional telephone networks. It uses peer-to-peer networks in routing the calls. 14
  • 15. Applying a Systems Approach to Security in a Voice Over IP System Central servers are used for users to initiate and authenticate their client software. Supernodes are used by clients to bypass network devices that limit connectivity, such as Network Address Translators (NAT) and firewalls. Skype traffic is encrypted in some unknown way and the route through network to reach other clients in the P2P network is unspecified. [20] IP Private Branch Exchange – PBX Large organizations often have their own internal telephone networks that are implemented using a Private Branch Exchange system. These systems are typically connected to the PSTN to allow calls to and from other telephone networks. The main reason for PBX deployment is cost savings for the company. [13] IP PBX systems that use VoIP technologies are gradually widening their user base. The IP based PBX systems can utilize the often already existing IP network infrastructure resulting in cost savings. This makes it attractive for both new customers and existing owners of circuit switched PBX systems that want to migrate into IP based systems. In addition to phone calls, a PBX might provide additional services such as call forwarding, voice-mail or teleconferencing. The service can also be centralized and operated by an external service provider. It is then called a centrex service. 2.3 Common Functionality in Voice over IP Systems The different types of VoIP systems have their own special characteristics, and they are used for many different purposes. They still have much in common and often need to address same kinds of needs of the users. Incoming and Outgoing Calls The most basic service is of course the phone call. It still is also the most important one. In addition to stand-alone calls, the call service is becoming more often integrated into computer applications such as instant messaging applications and computer games. From the user point of view, incoming and outgoing calls function as in traditional telephone systems. From the network point of view the Internet, for example, brings special asymmetry to VoIP systems. Some solution is needed to contact network nodes and user terminals that reside behind restricting firewalls or Network Address Translators (NAT). Mobility Mobility in communication systems can be divided into three categories: user mobility, terminal mobility, and service mobility. User mobility is the user’s capability to connect to the services from any terminal connected to the system. Terminal mobility is the mobile user terminal that allows the user to move around freely. When a user of a mobile phone uses a network of another service provider, for example in a foreign country, it is 15
  • 16. Applying a Systems Approach to Security in a Voice Over IP System called roaming. If the user is then able to utilize the same services as in the home network, it is called service mobility. [14] Interworking There is a need for communication between networks that use different technologies. Interworking refers to the case where for example a call is made from the Internet to a phone in the public switched telephone network (PSTN). It requires technical arrangements for converting the signaling data and the media stream to a suitable form for the other network. Standardized and open protocols, and interfaces have been developed to facilitate interworking. It also often requires special arrangements and contracts to be made between the network operators or owners. Other Services and Functionality Other services that VoIP systems might provide are services such as the value-added services in the traditional telephone networks: voice-mail, call-forwarding, and conference calls. One service that has been common for instant messaging applications in the Internet is the presence service. It provides real-time information about the current availability status of the system users. 2.4 Technological Basis of Voice over IP Systems The technological basis of VoIP systems is that of the internet and telephone networks. Figure 2 shows a simplified example of a network. A user can connect to the network using different kinds of equipment. The service network can provide routing of a phone-call to the receiver somewhere in the network, or there can be a voice-mail box for the user. Transport networks mediate the traffic between users, and between users and services. 16
  • 17. Applying a Systems Approach to Security in a Voice Over IP System Figure 2: Simplified network overview User Terminals A user terminal is the physical device that the user needs to connect to the network. The terminals are often divided into softphones and hardphones. Softphone is basically a PC installed with VoIP software, and a hardphone is a piece of hardware dedicated to be used in a VoIP network. At the moment most of the terminals use fixed line connections, but the number of terminals with mobile or wireless access is increasing. The terminals are used both to connect with people and to access various information resources. Service Infrastructure Service infrastructure is often built on PC platforms, using common operating systems like Windows, Linux, Unix or Solaris. There are servers for handling the call logic, subscriber databases, gateways that handle connectivity with neighboring networks, proxies and relay servers to facilitate routing of the calls, operation and management nodes and security related components. In large networks the functionality is distributed across many network nodes, but in a small office setup a single node can perform most of the required functionality. 17
  • 18. Applying a Systems Approach to Security in a Voice Over IP System Transport Networks Transport networks can be dived into access and trunk networks [23]. User terminals, home networks, or company intranets connect to access networks. Connection can be fixed, as in a modem, ISDN, ADSL or cable modem connection. It can use wireless links such as WLAN, or mobile connection such as GPRS or UMTS. Different connection types have different characteristics regarding bandwidth, response time, cost, and terminal mobility. Trunk networks connect access networks and other trunk networks together. They often span large geographical distances and transport large amounts of data. This is the least visible part of the network to the users. Internet Technology VoIP applications utilize the same technologies that are commonly used in the Internet. The networks are built using Ethernets, switches, routers, Domain Name Servers (DNS), firewalls that are the building blocks in any IP network. They are used in a same way as in data communication, although VoIP might bring some additional requirements to them concerning quality of service, connectivity and security. TCP/IP protocol suite is the core of the Internet technology. The characteristics of TCP/IP give raise to many of the issues in VoIP. TCP/IP was originally designed for data transmission in packed switched networks. Transmission of real-time media on the other hand has been found out to be a challenge in the Internet. Figure 3: TCP/IP protocol stack The layer model in Figure 3 depicts how the protocols in TCP/IP are build one on another to form a stack. For example, a computer application can send audio signal to another application on a different computer over the network. This signal can be transported inside Real-time Transport Protocol (RTP) packets. These RTP packets are then encapsulated inside 18
  • 19. Applying a Systems Approach to Security in a Voice Over IP System a User Datagram Protocol (UDP) packet that in turn is encapsulated inside an IP packet. The IP (Internet Protocol) packets can be transported over a variety of different networks such as local area networks (LAN), wireless LANs (WLANS) or Universal Mobile Telecommunication System (UMTS) that have utilize some specific data link protocols. There the information is carried in electric, electromagnetic or optical form to the receiver. TCP/IP provides two protocols for applications to use at transport layer: TCP and UDP. TCP is used to establish reliable connections between applications in separate network nodes. UDP on the other hand is a connectionless protocol. The packets travel independent of each other and there is no guarantee for their delivery. [18] In principle, both UDP and TCP can be used to deliver signaling and media in VoIP applications. TCP is often used in session management and UDP in transferring real-time media because of their different characteristics. VoIP Protocols VoIP systems can utilize many different protocols as any application in the internet does today. By VoIP protocols we mean the protocols that are common and specific to all VoIP applications. The protocols can be divided into signaling protocols and media transfer protocols. Session Management. Signaling protocols are needed to set up and manage call sessions and other VoIP services. The most significant signaling protocol in the Internet today is Session Initiation Protocol (SIP) that is defined in RFC 3261 [3]. It is accompanied with Session Description Protocol (SDP) that is used to actually describe the content of SIP communication. SDP is defined in RFC 2327 [6]. RTP Traffic BYE OK INVITE ACK OK Figure 4: Simple VoIP call sequence 19
  • 20. Applying a Systems Approach to Security in a Voice Over IP System Figure 4 shows a simplified phone call using SIP and RTP. Alice calls Bob by sending him a SIP INVITE message. Bob answers the call by replying with an OK message. Alice confirms by sending and ACK message. Now the session is open and the conversation is transferred using RTP protocol. After the conversation is over, Alice hangs up by sending a BYE message, and Bob confirms with an OK message. In practice there is likely to be other nodes in between facilitating the call process. Media Transfer SIP and SDP are first used to set up the sessions. The media protocols are then used to transport the actual content of the communication in the networks. The most used of these is Real-time Transport Protocol (RTP) that is defined in RFC 3550 [5]. RTP is a connectionless protocol that is carried on top of the UDP protocol. Figure 5: Media transfer The phases of the media transfer are illustrated in Figure 5. The speaker talks to a microphone that is connected to an analogue to digital converter such as a sound-card in a computer. The digital audio signal is then encoded and compressed before it is encapsulated into RTP packets for transport in the IP network. The receiving end then has to decode the media signal back to digital waveform, convert it back to analogue signal and finally in a loudspeaker into sound waves that the receiver can hear. 20
  • 21. Applying a Systems Approach to Security in a Voice Over IP System 3 Security Security is a broad subject that encompasses all the different aspects of a system, both technological and social. Our concentration here is on securing communication systems, such as a Voice over IP system, and the information transferred over them. We will look at the security from point of view of system development, how we build secure systems and how can we be sure that they really are secure. Then we consider the security in a larger context, as part of risk management: how much security do we need and how much we are ready to pay for it? Finally we discuss some security mechanisms that ensure that the system fulfills their security requirements. 3.1 Computer Security Confidentiality, Integrity, Availability There are three aspects that are commonly used to describe computer security: confidentiality, integrity and availability. Confidentiality refers to protecting from unauthorized access to information. Integrity refers to protecting the information from unauthorized modification. Availability is about assuring authorized parties access to information or services. [1] Access control mechanisms and cryptography are typically used to protect confidentiality and integrity in computer systems. The information is made unreadable by unauthorized users by encrypting it. The integrity of information can be verified utilizing cryptographic signatures. Availability in general is often improved designing systems according to statistical models of user traffic. [1] Threats to Communication Threats can be seen from the point of view of information flow between two communicating entities. Instead of a desired normal flow, communication can be interrupted, intercepted, modified or fabricated (Figure 6). Interrupted flow means that the message that is sent is not delivered to the recipient, interception means that the message is delivered to a third party in addition to the legitimate recipient. Modification refers to a case where a third party is able to get a hold on the message and modify its content before it is delivered to the recipient. Fabrication means that a third party is able to act on behalf of a legitimate message sender. [22] 21
  • 22. Applying a Systems Approach to Security in a Voice Over IP System Figure 6: Security threats (source [22] ) System Development System development is a large subject containing all the phases in the life cycle of a system, from the drawing board to eventual disposal. We need to know what kind of a system we need, to know how to build it, and then build it. The waterfall model (Figure 7) is a top-down model of system development. It defines seven development phases: requirements, specifications, design, implementation, integration, and operation and maintenance. Requirements define what is wanted from the system, and they are typically defined by the customer. Specification defines the system in more technical terms and in detail. Design phase describes how the system is going to be built. In the implementation phase the components of the systems are built based on the design, and in the integration phase the single components are combined together to form the complete system. The system can then be deployed and put into use in the maintenance phase. [33] 22
  • 23. Applying a Systems Approach to Security in a Voice Over IP System Figure 7: Waterfall development model The waterfall model is selected here for simplicity. It is only one of many different development models, but it presents the essential aspects of development and it suffices for our study. Building Secure Systems It is one thing to build systems that work. The next level is to build systems that are reliable in case of accidents and unexpected events. Building secure systems means the system can defend against malicious attacks that are intended to cause the system to behave in unexpected ways. [16] Figure 8: Security concepts 23
  • 24. Applying a Systems Approach to Security in a Voice Over IP System Figure 8 illustrates some essential security concepts. Secure systems have protection for the information and services that are valued, assets. The attacks, and accidents as well, that might happen in the future are called threats. A security policy defines requirements for protection of the assets against the threats. [1] Security mechanisms enforce the security policy of a system in practice. The functions of security mechanisms can be divided into three classes: prevention, detection, and recovery. Prevented attacks never succeed in a first place. Those attacks that get through have to be detected, before actions to recover from the situation can be taken. [1] Security mechanisms may also have other functions as side effects. One that is not that desirable is the effect of the mechanisms to reduce the usability of the system. On the other hand, in a business context security mechanisms can also be used as competitive advantage, and to build trust with customers. Testing and Assurance Testing is an essential part of system development. By testing we build assurance for the quality of the system. To do that properly in the waterfall model, we need to test the whole chain of development phases. Verification refers to finding out whether we are building the system right, and validation to the process of finding out whether we are building the right system [33]. The implementation is verified against the design, and design is validated against the system specifications. If the specification is an accurate description of the implemented system, the system satisfies the specification [1]. Figure 9: Testing in waterfall model Security assurance in turn refers to the testing of security aspects of the system. Its objective is to determine how much we can trust the system [1]. Security development of a system can be treated analogously to functional development. Security policy defines the requirements, and the 24
  • 25. Applying a Systems Approach to Security in a Voice Over IP System other phases are related to development of the security mechanisms in the system. Specifications can be validated against the requirements defined by the customer. This applies both for functional and security requirements. How do we validate these requirements? The requirements, define what the customer wants, but it often fail to define what the customer really needs[33]. We will present some perspectives into solving this problem when developing our method in Chapter 6 and Chapter 7. 3.2 Risk Management Security in a company is essentially part of the risk management process. In risk management the protected assets are identified and their value estimated, and the probability and potential damages of threats are estimated. Some of the identified risks can then be eliminated, some can be minimized, and the rest of them have to be accepted. From risk management point of view, the security mechanisms are justified only to the degree that the costs of implementing them is lower than the expected loss through realized threats [16]. Risks related to computer security are just one aspect of risk management. There are also other risks such as accidents, violence, and natural disasters. When looking at an organization as a whole, we have to evaluate the risks to information in the context of the other risks. To be able to compare the risks they need to be quantified first. A simplistic way to do this is to define a probability for a threat to actualize and the impact of exploited vulnerability. By multiplying these together we get an expected value for the loss. Probability of threat x Impact Value = Risk. This way we can compare different threats decide which ones demand the most attention. In practice the task of determining the probability and the impact value is often far from trivial. 3.3 Security Mechanisms Security mechanisms are the means to fulfill the security requirements for a system by enforcing the security policy. We have divided the mechanisms in four groups. The first three groups, network, network node, and application security, discuss mechanisms on different scales of computer systems. The fourth, communication security, discusses mechanisms to protect the communication process between two end- points, as it starts from one application on one network node and travels through the network to another application on another node. The division is illustrated in Figure 10. 25
  • 26. Applying a Systems Approach to Security in a Voice Over IP System Application 1 Network Node 1 Network 1 Application 2 Network Node 2 Network 2 Communication Figure 10: Security division The following is not an exhaustive listing of existing security mechanisms, but it rather gives examples of them. Network Security Network level security mechanisms protect whole networks or parts of them. Security mechanisms are built on the border of the network where it connects to external networks through gateways. The first protection is typically a firewall that filters incoming and outgoing traffic. The topology of the network is designed to support security, and often special security zones with different levels of protection are defined. One such a zone is De-Militarized Zone (DMZ) that is used for services that are provided to the external network. This arrangement allows stronger protection for other nodes such as user terminals or intranet servers. Other mechanisms include virus protection, Network Intrusion Detection systems (NIDS) that monitor network traffic for suspicious patterns of behavior, and NAT that effectively hides the topology of the internal network and prevents incoming access requests. Network Node Security Node level security protects individual computers or other network elements. In addition to firewalls protecting whole networks, individual nodes can also have a firewall, and they can filter incoming and outgoing traffic. They have different types of access control mechanisms depending on whether they are mainly designed to be client or server nodes and whether they are single-user or multi-user systems. In multi-user and multi-application systems access to data of other users is limited with access control mechanisms. Applications also need to be protected from each other as well. Especially the integrity of the operating system is important as all the applications in the system rely on its functionality. Node level Intrusion Detection Systems (IDS) typically monitor and detect abnormal user behavior and changes in important files. Other mechanisms include for example virus protection and log files. 26
  • 27. Applying a Systems Approach to Security in a Voice Over IP System Application Security Applications have certain access rights to resources such as files or data in the memory of the computer they are running on. With communication applications the application actually has two users: the one who owns the computer and the person at the other end of the communication. Local user can often send files or other information from the computer to the remote party for example during a conversation. The communication application is rarely intended to allow the remote party access to the local resources unless the local user explicitly wants that to happen. Poorly written applications can be tricked to malfunction and allow a remote party access to confidential data. In a conversation between two mobile phones this could mean that the other person could get access to the telephone directory or text message storage of the other person. Communication Security Communication security here means the protection of connections, and the data transferred between two end-points. Protection of communications can happen at different layers of the TCP/IP protocol stack (see subsection ). Examples of security mechanisms at different layers are S/MIME[31] at application layer, Transport Layer Security TLS[29], and IPSec[30] at network layer, and VLANs[32] at data link layer. Cryptography is a typical means to protect data. It can protect the confidentiality of the data, and detect a breach of integrity in it. It also provides means for authentication of the end-points of the communication, whether they are computers or people. Other Aspects In addition to securing the software side of the information systems, there is a need for physical protection as well. Physical security is protection of physical assets with locks, walls, doors, buildings, surveillance cameras, alarms, guards and other physical means. If we consider computer security as a whole we have to take into account also the physical space around the computers and networks. Even though the access controls and firewalls in software would be in good condition, someone might just steal the computer and the valuable information in it. Cryptography might protect voice communication between two terminals, but it does little to counter eavesdropping of the physical space around the terminal. In order to get the define security policies and implement security mechanisms that enforce them in practice, we need an organization that manages and coordinates the security processes. Important questions to take into account include division of power and responsibilities, and allocation of resources [1]. 27
  • 28. Applying a Systems Approach to Security in a Voice Over IP System 4 Voice over IP Security In this chapter we will look at security from the point of view of VoIP systems, and consider expectations towards security in VoIP systems. The presentation in this section is brief and general. The case study in Chapter 7 will give us deeper understanding of security in a VoIP system. VoIP systems are computer communication systems, so basically all the security principles presented in Chapter 3 apply to VoIP systems as well. The function of security is to prevent, detect, and recover from attacks against the VoIP system. Voice over IP security alliance has divided threats to VoIP security and privacy into six categories in its threat taxonomy. Social threats include threats such as misrepresentation, theft of services, and unwanted contact. Eavesdropping threats target the signaling and media, and includes traffic capture, number harvesting, and call pattern tracking. Interception and modification threats are those where the attacker has access to complete control or media stream and is able to alter it. Service abuse category includes different forms of identity theft, methods for concealing fraud, and methods to bypass billing functions of a system. All the forms of denial of service attacks are included in intentional interruptions of service. There are also other interruptions such as power outages and resource exhaustion. [34] The security mechanisms for VoIP systems are mostly the same ones that can be used to protect any computer system. Special attention is required in any case. VoIP systems place additional requirements for the components regarding performance and security. Performance requirements might restrict the use of some security mechanisms as well. [17] As we saw in Chapter 2, there are many different types of applications of VoIP. In these different systems, the technology, and security mechanisms are similar to each other. The purposes of these systems vary from application to application. What actually makes the difference from the security viewpoint is the difference in requirements and expectations for the security of these systems. These are defined by the different parties that are affected by the level of security of the system. There are many different parties that have a stake in the quality of VoIP Systems. Depending on their interests, they in general value different security aspects of the system more than others. These interests then have to be combined together to satisfy all the parties. We now look at the expectations of some of the main interest groups, namely the users, the service providers, and the governments. Users are the main target group of VoIP services. After all, a service without users does not make much sense. Users can roughly be divided into home users, business users, and government users. Home users main security interest is typically availability of service. Privacy is another 28
  • 29. Applying a Systems Approach to Security in a Voice Over IP System issue of concern for many people. The integrity of call detail records collected by a service provider is important if the services are charged for. Governments, in the user role, often have strict requirements for confidentiality in their activities (military, health care). Public services such as police and fire departments may have their own dedicated communication networks which are separate from the ones open for public. Business organizations utilize public communication networks in the same manner as home users, while they often have higher requirements for confidentiality. They may have their own internal communication networks. Service providers’ main interest is in protecting the integrity and availability of the service system. The service system produces value to the owners and users only when it is available and working. The systems also contain sensitive data such as subscriber information, charging information, and details about made calls that need to be protected from unauthorized access. Service providers typically have to fulfill various amounts of regulatory requirements, the extent of which depends on the type of the provided service. In addition to the user role, governments participate in many ways in VoIP system development. They pose regulatory requirements, which try to balance between needs of society, needs of business, and political agendas. The regulations are not very negotiable after they have been set and therefore usually have to be taken as given. Lawful interception, emergency calls, privacy protection, and retention and protection of call detail records are examples of such regulatory requirements. Some requirements are conflicting. For example the requirement for lawful interception is based on public or national safety, and it actually restricts the amount of privacy and confidentiality protection that is allowed for the users. The national public communication systems are in the main interest of governments. On the other hand, the regulators have little interest in PBX systems used inside companies, and VoIP systems that are used internally in transport networks of the operators. 29
  • 30. Applying a Systems Approach to Security in a Voice Over IP System 5 Systems Methodology Systems methodology is a means to generate understanding on existing systems and to design new systems. Systems methodology gives tools for simplifying the emerging complexities and interdependencies between and within technological and social systems. This chapter presents background for systems methodology, and defines and describes essential concepts related to it. We will use the systems methodology as the basis for a specific method that will be described in Chapter 6. We can use this method to build various kinds of system models. A model of an existing system can be used for analyzing that system, for example to discover problems in it. We can also design new models that we can later implement into reality. The term system is used very broadly here. Basically it can mean any subject under study. For example our system can be a network of computers. If we need to look into the details, a single specific computer in that network can be seen as subsystem that we can concentrate on and take as the new system under study. On the other hand we can look at the bigger picture and see how the network is a subsystem of an even larger system such as a business organization or a society. Systems methodology is very general in the sense that it basically can be applied to any problem. The target in contrast is specific. Every situation is regarded as more or less unique. This allows for customized treatment for each problem that in systems perspective appears to become a set of interrelated problems. Even with an initial focus on a technical system, systems methodology draws the attention quickly towards organizational and human issues. Systems methodology measures the technological system by the value it produces to the people in its environment. In this way systems methodology is beneficial in filling the gap between technical and management issues in security. The method begins with as little assumptions about the system under study as possible. In the security context this means that for example the security requirements of the systems are not given, but they should be discovered through the process of inquiry. This would mean discussions and interviews with different stakeholders about their security requirements for the specific system in questions whenever it is possible. In principle systems methodology allows examining systems on different scales using the same concepts and methods. The same iterative approach can be repeated for subsystems as for the larger whole. The results differ from each other because on different levels of the system and in different parts of the system different aspects and properties are relevant. The organizational, physical, and software dimensions to systems and security can be treated analogously too. The methodology facilitates structuring of knowledge. We can explicitly define different levels of system abstraction which helps us to effectively hide unnecessary 30
  • 31. Applying a Systems Approach to Security in a Voice Over IP System details out of the way. Still it allows maintaining of clear connections vertically between the different abstraction levels. The methodology enables us to build system models that quickly show us how different details of the system are linked together in the big picture. It enables us to spot the places where security breaches might occur. It facilitates understanding both the user end-to-end perspective and the technological end-to-end perspective to the system. In the user perspective we can leave out all the technical details of the system and consider what the system and its security aspects look like from the user perspective. On the other hand we can build models that span the whole communication path through the network from node to node. 5.1 Systems Theories Systems theories are a relatively new addition to our body of knowledge. Although their roots date back millennia, the systematic formalization started in the beginning of the 20th century[28]. The theories and methodologies are constantly evolving and there is not any single right systems approach. Systems approach has been used in fields such as physics[25] biology[25], cybernetics[27], social sciences[8], and organizational management & development[24]. While there are many different schools of systems thinking around, we will mostly follow a systems methodology called interactive management, using its terminology and concepts related to systems. Interactive management aims to understanding of purposeful systems such as business companies and the society. Computer systems can be considered as subsystems for them, as we are going to see in the case study in Chapter 7. In this study we concentrate on technological systems. But while the system itself is technological, people form an essential part of its environment. Technological systems don’t have purpose of their own but they serve the purposes of their environment. 5.2 System and its Environment First we have to define two important concepts: system and its environment. - System: a set of interrelated elements, each of which is related directly or indirectly to every other element, and no subset of which is unrelated to any other subset. [8] The definition of system implies that one cannot fully understand the behavior of one part of the system without understanding of the whole system since all parts of a system are interrelated. A change in one part of the system can affect any other part of that system. - Environment of a system: a set of elements and their relevant properties, which elements are not part of the system, but a change 31
  • 32. Applying a Systems Approach to Security in a Voice Over IP System in any of which can cause or produce a change in the state of the system. [8] In order to understand behavior of a system, one needs to understand its relationship with the environment too. Systems do not exist in isolation: they are inseparable from their environment. Every system is here considered to be an open system. System’s Environment System Figure 11: System in its environment Figure 11 shows a system, its environment, and interactions between them. The arrows going into the system are its inputs, and the arrows coming from the system are its outputs. The relationship between the inputs and the outputs define the function of the system, and the relationship between the function and the environment defines the system’s purpose in that environment. We can identify different dimensions in a system and its environment. For example a computer system may be seen from the point of view of the software system, the physical system (hardware) and the organizational system. Organizational dimension defines the main purpose or purposes of the system. For example a communication system can be part of organization’s support functions, or it can be a product or service that a company is providing. Typical terminology for organizational context might include value, responsibility, power, influence, control, ownership, trust, agreement, and other concepts describing social relationships. The software dimension looks at the system from the point of view of computer networks and software. The starting point is the software communication channel and related applications such as operating systems, databases, and network protocols. Typical terminology for describing network context includes connection, interface, node, application, data, access, throughput, response time and other computer software related terminology. The physical dimension looks at the physical objects, and space, and their mechanics. In a communication system its starting point is the physical communication channel and related equipment such as the computers, network cables and radio links. Typical terminology might include location, 32
  • 33. Applying a Systems Approach to Security in a Voice Over IP System distance, movement, speed, weight, material, and other mechanical concepts. 5.3 Systems Thinking If we look inside a system we will find it is composed of components and their relationships: the system has an internal structure. There is also a specific way, a process, how the system converts the inputs into outputs. This output is the function of the structure and the process. Each of these concepts, function, process, and structure, has been considered to be the most important aspect of a system by different people at different times. People who stress analysis are been concerned with the structure, those who stress synthesis with the function and process orientated people with the process of a system. In systems thinking each of the three concepts are considered equally essential, and inseparable of each other. They are basically different views to the same system. [21] According to Ackoff[19] a main difference between analytical and systemic approach is the concept of interdependence. In analytical approach it is assumed that one can understand a system as a whole by taking it to parts and analyzing these parts independently. It is therefore a reductionistic approach. In systems approach, we assume that we can understand the parts of the system only by understanding their relationships to the whole. All the parts of a system are considered to be interdependent of each other. Another difference between analytical and systemic approach is the starting point of inquiry. If analytical approach to understand computers starts from dividing it to parts and analyzing them, systems approach starts from looking at the networks the computers are part of and the individuals who use them. Analytical approach to studying human behavior would start from finding out what can be found inside human beings, systemic approach would first look at their relationships with other people and the society. Analytical thinking begins by looking into the system. Systems thinking begins by looking out of the system. [19] 5.4 Systems Approach to Problem Solving Systemic Problems and Their Treatment An aim of systems methodology is problem solving. We encounter problems, and try to look solutions to them. We can develop new systems to solve problem, or we can change and develop the existing ones. Systemic problems are problems that require systemic treatment, that is, a view on the larger whole and understanding of the interrelationships of the system with its environment. A typical example of systemic problem is the tragedy of commons. 33
  • 34. Applying a Systems Approach to Security in a Voice Over IP System Tragedy of commons means a situation where many parties compete over a limited amount of shared resources. In addition, every party’s own interest is to consume as much resources as possible, but everyone’s consuming as much as possible results in a disaster for everyone. [16], [24] These kinds of situations are unlikely to be solved without a systemic approach that can appreciate the situation as a part of a larger whole. Problem treatments can be divided into four classes: absolution, resolution, and dissolution. We can ignore, or absolve, the problem. We can resolve a problem by finding something that works. We can solve the problem by finding an optimal answer to the problem. Finally we can dissolve the problem by redesigning the system so that the original problem disappears. Dissolving problems is a target of systems approach. [19] Context, Problem, Ideal, and Solution Ackoff and Gharajedaghi suggest making a clear separation between the problem, the ideal, and the solution. Most importantly, the problem that describes the current state of affairs should be separated from the ideal that describes our wanted ideal state of affairs. The actual solution that is to be implemented is then designed based finding a practical solution between the problem system and the ideal system. [19], [21] Defining problems and designing solutions are core targets of systems methodology. It proposes an alternative way for approaching these activities. Defining problems in terms of existing solutions is very common in other approaches. This is typical for disciplinary approach, where problems are called for example technical, social, economic or political problems, often depending on the field of expertise of the person solving the problem. [21] For example a company might have a problem with employees visiting suspicious websites and increasing the risk of computer virus infections. One person says it is a firewall problem and is resolved with a more restrictive firewall, while another says it is a leadership problem and is resolved by giving the employees more motivating tasks to direct their attention elsewhere. By defining problems in terms of existing solutions poses unnecessary limitations on our choices to solve that problem. On the other hand, defining solutions based only on the current reality, i.e. the problem, readily defines unnecessary constraints for the possible solutions. Designing an ideal design from the scratch, thinking out of the box, allows for much greater creativity and increases our possibilities. Defining the problem gives us understanding on the current reality. An ideal gives us something we can move towards. Based on these models we can then proceed by planning and implementing changes and improvements to the current system that in an ideal case dissolves the original problems altogether. 34
  • 35. Applying a Systems Approach to Security in a Voice Over IP System Black-Box and White-Box An approach to gaining understanding on a system can be described as either a black-box or a white-box approach. In black-box approach, we consider only inputs and outputs of a system and hide the details about the internal structures and processes of a system. Black-box approach can be used to simplify complex systems and allows us to study ever larger systems. The white-box approach on the other hand inspects the internal parts of the system. We need white-box approach to simulate behavior of real-world systems. These two views are complementary to each other, and are both useful in understanding systems. [15] Figure 12: Black-box and white-box models In practice, a white-box model contains black-box models inside it. The model is an approximation of the reality. We can look deeper and deeper into the system by continuing to look inside the black-box models. This way we can develop more and more accurate approximations of the system under study. In addition to going deeper into details we can also continue looking out of the system at ever larger entities that the system is part of. 35
  • 36. Applying a Systems Approach to Security in a Voice Over IP System 6 Method for Studying Security Aspects of a System This chapter describes a method for studying security of a system. It is built based on the concepts presented in the previous chapter. It both combines different systems approaches and simplifies them to better suit the scope of this study. In the next chapter, a case study is presented which demonstrates the use of this method in practice. Systems methodology draws attention to the security in the system as a whole. The security in subsystems is only secondary. A secure system can be built with components that would be described insecure if analyzed independently. The security is not treated as an absolute, but it is rather evaluated relative to the environment and other parts of the system. The systems methodology enables us to systematically build models from many different perspectives at many different levels of scale and detail. This kind of systematic inquiry enables us to point out those things about the system that we have too little knowledge about. Executing the inquiry to ever smaller subsystems while at the same time keeping the models of different subsystem synchronized is tedious, but at the same time it forces us to understand the system better. The model grows only by linking different levels and parts of the system together incrementally. That means the result is a whole body of interlinked knowledge rather than individual snapshots of the system. This makes the resulting models also attractive for use in education and explaining large complex systems to others. 6.1 Overview of the Method We will concentrate on security evaluation, but the method is also a logical part of developing security of a system in a given environment (Figure 13). The method is targeted for an existing real-world system in a specific environment. An assumption is that a statement about the security of a system is meaningful only when its environment is defined (section 5.2). Figure 13: Method overview 36
  • 37. Applying a Systems Approach to Security in a Voice Over IP System In a broader context we can see the study method as part of risk management of an organization or part of a method for system development. The need and benefits for improving security in different parts of the system is first identified relative to all the other risks in an organization. After that improvements to the system are designed and implemented in the development process. The method has two main dimensions: recursion and iteration. Recursion is used to create a hierarchy of systems, to chunk the problem up to larger supersystems and down to smaller subsystems that are easier to manage (Figure 14). Each of these subsystems is treated in analogous, iterative way. Iterative approach is practical for gathering information in cases, where there is a high level of interconnection between systems. Studying one part often results in knowledge about other parts. Each of the successive iterations develops our models and understanding of part of the system further. Figure 14: Recursions of the method Each of the iterations considers four dimensions of the subsystem under study: function, context, structure and process. Function looks at the system as a black box, context is about the environment or environments of the system, structure deals with components, and process with their interactions (see 5.3). The first iteration identifies the system and builds a model out of it. The second iteration is a security analysis, and it utilizes the information gathered during the first iteration. In third iteration an ideal model of the subsystem is designed and in fourth it is implemented in practice. We consider here the two first iterations due to time constraints. Each of the iterations can be repeated as well. As we study the details or the context of a subsystem further, we are likely to encounter new information that affects our models of other parts of the whole system. Recursion takes a component of the system, and considers it as the new subsystem under study. The same iterative process is applied for each subsystem. By recursion we will create a hierarchy of system models, each of which is directly or indirectly related to each other. A system is related vertically to the containing larger systems through its context and to its subsystems through its structure. It is also related horizontally to systems in the same hierarchical level through its context. (Figure 14) 37
  • 38. Applying a Systems Approach to Security in a Voice Over IP System The gathering of information about the system can have many forms, depending on the level of detail and part of the system, or whether we are interested for example in the organizational, physical or software dimension of the system. Ways to get organizational information include interviews and surveys. Information about software can be achieved by studying documentation such as technical specifications and design documents, and source code. In some cases black-box testing is the only way of inquiry. Physical dimension can be studied from documentation such as floor plans and by visiting the actual sites. It is worthwhile to notice that we don’t assume much about the system we are studying. We for example do not assume any certain set of (security) requirements, but they should be discovered during the process of inquiry as we consider the role of the system relative to its context. The case study in Chapter 7 provides examples for understanding the following description of the method. 6.1 Iteration 1: System Model System Model – Function The functional view is a general description what the system does. Basically only the the inputs and outputs of the system are identified as in Figure 15 that corresponds to a black-box model of a system (Section ) The details about internal structures and processes of the system are left out. The system is also studied out of context. The result might even be trivial, but the functional view is often the most relevant one when considering the relationship of the system to its larger containing system. A system may have multiple functions. Functions can be found by considering different combinations of inputs and outputs of the system. Figure 15: Function model System Model – Context If the function describes in general what the system does, the context explains why the system does that. The context looks out of the system under study. The containing larger system is identified as well as other interrelating systems as in Figure 16. In the recursive hierarchy these systems typically are on the same level or above as the system under study. We then consider the objectives of that containing system as the reason why the system should perform in a certain way or have certain 38
  • 39. Applying a Systems Approach to Security in a Voice Over IP System properties. The context can be looked from the organizational, physical, and software perspectives (see section 5.2). Figure 16: Context model As we consider the organizational dimension of the system and its environment we reach the actual stakeholders, individual persons and organizations, for whom the system is built and who are affected by it. When studying a technological system, context inquiry is therefore also a link between the functionality of the system, and the purposes of the people using it. In a communication system context also defines the content of the information passed through it. The stakeholders define the expectations and requirements for the system based on their understanding of the environment and the importance of the system. The interests of the stakeholders regarding the system under study may not be aligned, in fact, they may well be contradictory. The same goes for security related requirements. System Model – Structure Structure describes the internal static organization of the system. Identifying system components means defining a partitioning of the system, and boundaries of components. Figure 17 that illustrates the structural view corresponds to a white-box model of a system (Section ), and is also similar to the context view. The components can be software structures, mechanical objects, or people, and they are related to each other through an interface. We can define reference points in between the components. In these points we can take snapshot views of the processes of the system. The information might include the interaction medium, the structure of the information, and amount of traffic. A single structure can be associated with multiple processes resulting in multiple functions. 39
  • 40. Applying a Systems Approach to Security in a Voice Over IP System Figure 17: Structure model The structures are considered as static components. We don’t assume anything of their inner workings, but rather treat them functionally, considering only their inputs and outputs. If we want to gain more knowledge of the inner structures and processes of a specific component, we consider it as a subsystem, and then execute the iterative process on that subsystem again. The other components then become as part of the context of the new subsystem. System Model – Process The process is the dynamic part of the system model. It describes how the different structures are combined together in order to produce the desired total function. They describe the interactions of the system components. Processes combine components through interfaces. Figure 18: Process model We can describe the processes with the use of the reference points that are defined in the structural view. The process has a path through the system structure where it passes different reference points in some order. As it moves from one point to another it passes components and results in a function. 6.2 Iteration 2: Security Analysis Security analysis uses the system model and analyzes it from the security perspective. To do that we need a threat model. The choice of the model should reflect the security requirements for the system. For example in a 40
  • 41. Applying a Systems Approach to Security in a Voice Over IP System communication system the information flow can bee seen as a main asset. The requirements might then be stated in terms of confidentiality, integrity and availability of this flow. The threat model containing the generic threats of interruption, interception, modification, and fabrication described in section corresponds to these requirements. Security Analysis – Function The first iteration identified the functionality of the system. That functionality of the system under study is now analyzed against the threat model. The result is a general description of the possible malfunctions of the system. This in practice is a list of potential vulnerabilities in the input or output dimensions. There might for example be illegitimate inputs or outputs to the system or the input or output might be modified. In this phase the details about how exactly the system can be broken is irrelevant. These aspects are considered later in the structural and process views to security. The further implications of the malfunctions are irrelevant as well. They are considered in the context view. Security Analysis – Context The functional view on security considered the ways in which the system in general might malfunction. In contextual view these malfunctions are then considered in relation to the environment of the system. In this phase we come up with a list of implications of possible malfunctions to the larger system, and we can evaluate the severity of their impact. By looking at the environment we can identify possible sources of attacks too. One of our aims is to connect together different system levels from the smallest details to the big picture. This would ideally allow for example to explain why a software fault in a certain part of a communication system is harmful for customer relationships of a company. Context is the link between the system under study and the larger system also in security aspects. Security Analysis – Structure In the structural view the static properties, and logical, physical, and social relationships are in focus. We try to find out where the security breaches could occur on the basis of the structural model of the system. Complementarities and redundancies in structure often provide useful information when considering the impact of an attack against a specific component. Security Analysis – Process For a single process we can consider how the process can be attacked in different reference points. If we have multiple processes, we can consider their interrelationships, such as how a failure in one process could lead to a failure in another process. 41
  • 42. Applying a Systems Approach to Security in a Voice Over IP System 6.3 Further Iterations We could still go further and start planning changes for improvement of the system under study, and actually start implementing these plans. We limit our study into the first two iterations. The last two iterations are shortly introduced but their development is left for further study. Idealized design is designing a system from the scratch, based on the requirements defined by the context. The objective is a model of the system that would best serve the interests of the environment. This phase is executed independent of the analysis of the existing system. That is, the design of the current system is not taken as a starting point. Successive approximation takes the results of system analysis and idealized design, to combine them into a real world solution. Here the limitations of the current reality are taken into account and compromises between the ideal and actual improvements are made. We can decide to run all the improvements we can at once, or decide to have a continuous, iterative process, where we gradually approach the ideal we have defined in the idealized design phase. 42
  • 43. Applying a Systems Approach to Security in a Voice Over IP System 7 Case Study: IP PBX System Security A study of VoIP System security is described in this chapter. It is based on a scenario rather than an existing real-world situation. The used method is described in detail in the previous chapter. We are going to show examples of execution of the first two iterations of the method, the system model and the security analysis, on different levels of recursion. The models we build are not going to be complete, and in many cases they wouldn’t pass critical inspection. Their primary function is to demonstrate the use of the methodology and to show what kinds of results would be expected from its applications. Figure 19: IP PBX system overview Figure 19 shows an overview of the situation. A company has an intranet that provides access to internet and to services such as VoIP calls, e-mail, and world wide web. Users connect to the network using laptop computers. Some users access the company intranet from their homes using encrypted virtual private network connections directly from their laptop to the intranet firewall. 43
  • 44. Applying a Systems Approach to Security in a Voice Over IP System Figure 20:Company system hierarchy Figure 20 shows an overview of the system hierarchy related to the Voice over IP system under study. Our study first begins from the VoIP system (4b in the figure), then looks out at the larger system, the communication system, and then goes on to study the details of the VoIP system. The above figure is a result of the study, not a starting point. It is presented here as a map for the following case study. 7.1 VoIP System Model VoIP System Function Model VoIP system is an audio communication channel. It basically allows talking and exchange of information over a distance. Figure 21 shows the simplified function of the system. In practice the system usually is bidirectional, but we only consider one direction here. Figure 21: VoIP system function The control of the system and feedback from the system are omitted as well for simplicity in this demonstration as they can be considered as means to achieve the function. 44
  • 45. Applying a Systems Approach to Security in a Voice Over IP System VoIP System Context Model The VoIP system is considered to be a part of the communication systems for the company. A main purpose of the system is to support business by improving communication inside the company. The cost for maintenance of the intranet infrastructure and for the internet connection is fixed. The system allows essentially free phone calls inside the company building and with a remote location through Internet. Figure 22: VoIP system context Figure 22 depicts the four main communication channels in the company. People either communicate directly by meeting each other, through internet using VoIP or e-mail, or by mobile phones. These channels have their own distinct security, usability, and cost properties. VoIP System Structure Model VoIP system consists of three essential components, the company intranet, the internet and a home network (Figure 23). The reference point A and D are user interfaces, B and C are network interfaces. These are described in Table 1. Figure 24 shows the physical view of the system that depicts the physical network cable connection between the intranet and the home network. The reference point X is a potential unknown entry point to the network. Figure 23: VoIP system structure 45
  • 46. Applying a Systems Approach to Security in a Voice Over IP System Figure 24: System in its physical environment The exact path of TCP/IP communication through the network is unspecified. Two consecutive IP packets might in fact take a different route. The path shown in Figure 24 is therefore merely suggestive. The main idea in the physical model is to show that the VoIP traffic travels through networks owned and controlled by unknown third parties. Reference point Description A User interface(s) in company intranet, air, audible sound waves. B Network-network connection. Electric signal. Encoded audio signal carried in encrypted IP packets. C As in B. D User interface in home network, air, audible sound waves. X Additional unknown interfaces to the network. Table 1: VoIP system reference points VoIP System Process Model Figure 25 shows a direct end-to-end media transfer process. The phases are described in Table 2. 46
  • 47. Applying a Systems Approach to Security in a Voice Over IP System Figure 25: VoIP system process Process Description 1. Sound to VoIP over IPSec conversion Audible sound waves are converted into VoIP stream. The content is encrypted. 2. Routing The VoIP stream is routed through the network to the correct recipient based on the IP address in the packets. 3. VoIP over IPSec to sound conversion The procedure 1 is done in reverse. Table 2: VoIP system process descriptions 7.2 Communication System Model We found out in VoIP system model, that the system is a part of a larger communication system inside the company. In risk management perspective the threats against the VoIP system are very closely related to the other communication systems. Therefore we take a closer look at the context of the VoIP system to gain better understanding about why we need protection and what we actually are protecting in the end. Communication System Function Model The communication system basically allows exchange of information over a distance. Figure 26 shows the simplified function of the communication system. In practice the system usually is bidirectional, but we only consider one direction here. Figure 26: Communication system function The content of the communication can be for example data, audio or video stream depending on the specific communication system. Communication System Context Model The communication systems are seen as being part of support functions of the company (Figure 27). They bring value to the company indirectly 47
  • 48. Applying a Systems Approach to Security in a Voice Over IP System through the business functions. And finally, the company’s value is defined by its stakeholders who have different interests and value different kinds of results. Figure 27: Communication system in its organizational environment The communication system is considered to be successful to the degree in which it is able to provide the right and only the right people with right information when they need it. Communication System Structure Model Figure 28 depicts a simplified high-level model of the communication system. The picture is the same as in the context view of VoIP system (Figure 22). A user of the system has four primary choices of communication channels for delivering a message to a specific destination: a meeting, VoIP, E-mail, and mobile phone. The delivered information or parts of it has been received from some source, and the receiver can send the information forward. Figure 28: Communication system structure 48
  • 49. Applying a Systems Approach to Security in a Voice Over IP System Communication System Process Model Communication processes are described in Table 3. Process Description 1. Selection of party The user selects the person or system she wants to contact. 2. Selection of method The user selects the communication system she wants to use. 3. Message passing The user sends a message to the other party. Table 3: Communication system process model 7.3 Communication System Security Analysis We could continue looking out of the system or traverse up the system hierarchy in Figure 20. Due to limited time frame we have to limit the expansion of the model. The security analysis of the communication system is expected to give us direction and a reference frame for further analysis of the VoIP system. The main asset in the system is the information flow. The general security requirements for the flow are confidentiality, integrity and availability. The analysis of the threats of interruption, interception, and fabrication to the information flow is considered sufficient to evaluate the system’s ability to fulfill these requirements. Communication System Function – Security The malfunctions to the communication system are identified in Table 4. Threat Description Interruption A message sent through the system is not received in the other end. Interception There are other recipients to the information flow in addition to the legitimate recipient. Fabrication The legitimate recipient receives information that was not sent through the system by the legitimate sender. Modification A message is altered on its way through the system. Table 4: Threats to communication function Communication System Context - Security The threats to the function described in the previous subsection are interpreted within the context in Table 5. Threat Description Impact Interruption A person is not able to deliver a message to a desired destination. Delay in operations. Interception A third party receives confidential data about the company, its customers, Potential loss of competitive advantage, and deterioration of image as a reliable business partner. 49
  • 50. Applying a Systems Approach to Security in a Voice Over IP System and ongoing projects. Fabrication Bad information source. A third party has injected (false/harmful) information into the company communication system. Potential harmful influence on decision making processes. Modification Information has been modified on its way from its source to the intended destination. Potential harmful influence on decision making processes. Table 5: Threats in communication context Communication System Structure – Security The four communication systems are parallel to each other. In some cases they complement each, such as when VoIP is used to discuss about material sent by e-mail. In some other cases they are interchangeable. If a users need to talk with each other, they can choose between VoIP and mobile. Threat Requires Interruption Total interruption of communications would require the interruption of both the mobile, and the e-mail system in addition to the VoIP system. Interception Interception in any part of the communication system. Fabrication Fabrication in some part of the system. Modification Modification in any part of the system. Table 6: Threats to communication system structure In VoIP and mobile systems users recognize each other by voice and a fabrication of content, a third party speaking, would most likely be detected. When talking with an unrecognized person employees are expected to follow caution and to be aware of the possibility of social engineering attacks. Replay attacks are theoretically possible. The use of voice-mail system is very rare and the system is used mostly for exchange of information rather than for example giving orders. Replay attacks are considered unlikely based on these facts. The risk is acknowledged but accepted. Modification is unlikely as well. It is more likely that fabrication or modification happens for example in the e-mail system. In the case of VoIP system, interception is the only one of these four threats that demands for closer analysis. Communication System Process – Security Selection of a party and selection of method are decision making processes of an individual. They can be influenced by attacker for example by giving false information or by pretending to be an authority that the user trusts. This can be used to trick a person to send classified information to 50
  • 51. Applying a Systems Approach to Security in a Voice Over IP System wrong recipient or to select an insecure communication channel where the communication can be intercepted. 7.4 VoIP System Security Analysis We now continue with security analysis of the VoIP system. The analysis of the communication system has already affected how we estimate the relative importance of various threats to the VoIP system. VoIP System Function - Security In the previous section when analyzing the communication system, we decided that the threats of interruption, fabrication, and modification are not a top priority in case of VoIP system. We will therefore concentrate only on the threat of interception that we consider being the most relevant here. The threat is described in Table 7. Threat Description Interception There are other recipients to the information flow in addition to the legitimate recipient. Table 7: Threats to VoIP system function VoIP System Context - Security The threats to VoIP system context are described in Table 8. Threat Description Impact Interception A third party has access to the media stream. Interception in the communication system. Table 8: Threats to VoIP system context VoIP System Structure – Security Threats to VoIP system structures are described in Table 9. Threat Requires Interception Interception in any of the networks Table 9: Threats to VoIP system structure VoIP System Process – Security Threats to VoIP system process is described in Table 9. Reference point Description A Eavesdropping of the physical space of user-terminal medium by a person or a microphone B Interception of encrypted VoIP traffic would reveal the IP address of the remote user terminal. C Interception of encrypted VoIP traffic would reveal the IP address of the remote user terminal. 51
  • 52. Applying a Systems Approach to Security in a Voice Over IP System D Unlocked room in a locked building. Family members and visitors have physical access to the room. Eavesdropping of the physical space of user-terminal medium by a person or a microphone Table 10: Interception of VoIP system process 7.5 Intranet Model We continue down the system hierarchy (Figure 20) to understand its internal structure and processes in more detail. We first look at the intranet, then the internet and finally the home network. This way we get a network level end-to-end view of the VoIP system. Intranet Function Model In the VoIP system the intranet has two main functions that we can identify in Figure 29 by looking at the combinations of reference points. First, it can mediate conversations between two intranet end-points. Second it can convert the audible sound to VoIP traffic, and encrypt it to be sent forward out of the network. Intranet Context Model The intranet is connected to the internet and through it to employees’ home networks (Figure 23). The network is physically located inside one building and it spans several rooms. All employees have access to the network. The users use it mainly to communicate with people and access information and services in the network. Intranet Structure Model The intranet is a simple switched local area network that is connected to external networks through a firewall (Figure 29). There are several similar user terminals connected to it. The reference points are described in Table 11. 52
  • 53. Applying a Systems Approach to Security in a Voice Over IP System Figure 29: Intranet structure Reference point Description A User-terminal medium. Air, audible sound waves. B Terminal-network connection. Ethernet, electric signal. Encoded audio signal carried in RTP packets on UDP on IP on Ethernet. C Ethernet. Essentially the same properties as in point B (probably larger amount of traffic). D Connecting the home network and the internet. The VoIP payload is encrypted. Table 11: Intranet reference point descriptions Intranet Process Model Figure 30 shows that part of a direct end-to-end media transport that takes place in the intranet. The depicted process is for VoIP connections to outside of the intranet. The phases are described in Table 12. Figure 30: Intranet process Process Description 1. VoIP conversion Audible sound waves are converted into VoIP stream. 2. Routing The VoIP stream is routed through the network to the correct recipient based on the IP address in the packets. 3. Routing + The stream is encapsulated in encrypted packets and routed 53