SlideShare a Scribd company logo
1 of 14
(VOIP) VOICE NETWORK TECHNOLOGY SECURITY & STRATEGIES
 Presented by: Pankaj Karande
 Class: TE (A)
 Roll no: 3351
Guide:
Prof. M.P. Mali
TOPICS TO BE COVERED:
 What is VOIP ?
 How Does VOIP Work?
 Security Concerns & Security Measures.
 Pros & Cons.
 Conclusion.
 References.
WHAT IS VOIP?
• VOIP, also known as IP telephony, is the real-time
transmission of voice signals using the Internet Protocol
(IP) over the public Internet or a private data network.
• VOIP allows users to make telephone calls using a
broadband Internet connection instead of an analog phone
line.
WORKING OF VOIP:
Fig(1): Voice processing in VOIP network.
The VOIP data processing consists of the following steps:
1) Signaling
2) Encoding
3)Transport
SECURITY CONCERNS & SECURITY MEASURES..
1) (DoS) Denial of Service attack:
There are two types:
1) Flood Service Attack.
2) Crash Service Attack.
Fig (2): VOIP specific Dos attack.
Counter Measure for (DoS):
 To mitigate the Dos attack, strong
authentication is a key.
 VOIP components should make sure that
they are communicating with legitimate.
 VOIP firewall should be enabled.
SECURITY CONCERNS & SECURITY MEASURES..
2) Eavesdropping:
Eavesdropping in which the attacker
makes independent connections with
the
victims and relays messages between
them, making them believe that they
are
talking directly to each other over a
private connection, when in fact the
entire conversation is controlled by the
attacker.
Counter Measures for Eavesdropping:
 Encryption of voice packet in the network
should be there to protect against
Eavesdropping.
 If web-based interfaced is made, use of
HTTPS is recommended instead of HTTP.
SECURITY CONCERNS & SECURITY MEASURES..
4) Vishing:
 Vishing is another word of VOIP Phishing. The term is combination of
“voice” and “phishing”.
 Vishing is typically used to steal credit card numbers or other information
from the people.
5) (SPITP) Spamming Over Internet
Telephony:
• Spamming is actually sending emails to people against their
will.
• Spam messages can carry viruses and spyware along with
them.
PROS..
• The main advantage of VOIP is that PC-to-PC,
calls are free no matter the distance and PC-to-
Phone are nominal.
• For monthly fee you may make unlimited calls
within a geographical area.
• It enables to make calls from anywhere as long as
the a broadband connection is available.
CONS..
• VOIP is susceptible to worms, viruses and hacking,
although this is very rare and VOIP developers are
working on VOIP encryption to counter this.
• With VOIP emergency calls, it is hard to locate you
and send help in time.
• Without power VOIP phones are useless, so in
case of emergencies during power cuts it can be a
major disadvantage.
CONCLUSION
In VOIP, threats such as DoS (Denial of Service) attack, Eavesdropping,
Vishing, these all above are the common threat which are risky & which
disturbs the VoIP technology in large amount. Due to this there are chances
of leakage of confidential messages which complicates the security
assurance. So to reduce this threat various Security Strategies are applied
various adoption of Security mechanism is carried out such as
Authentication, Encryption and Firewall measures are taken which will not
hamper VoIP technology. “Defense in depth” is a good principle in
defending VOIP.
REFERENCE
Websites:
• http://en.wikipedia.org/wiki/VOIP
• http://www.VOIP-info.org/wiki/
• http://computer.howstuffworks.com/ip-telephony5.htm
Papers:
• Yan Zhang, Huimin Huang, Computer Information Institute, ”VOIP Voice Network
Technology Security Strategies”, 978-1-4577-0536-6/11/$26.00 ©2011 IEEE
• David Butcher, Xiangyang Li, and Jinhua Guo, Computer Information Institute,
“Security Challenge And Defense in VOIP Infrastructure”, 1094-6977/$25.00 ©
2007 IEEE

More Related Content

What's hot

PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateWave Italia SpA
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Sophos
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksIcomm Technologies
 
VoIP security: Implementation and Protocol Problems
VoIP security: Implementation and Protocol ProblemsVoIP security: Implementation and Protocol Problems
VoIP security: Implementation and Protocol Problemsseanhn
 
Vo ip presentation
Vo ip presentationVo ip presentation
Vo ip presentationLuis Flores
 
10.1.1.64.2504
10.1.1.64.250410.1.1.64.2504
10.1.1.64.2504Dan Drumm
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITYJay Nagar
 
Security lte environment_cook_zuong
Security lte environment_cook_zuongSecurity lte environment_cook_zuong
Security lte environment_cook_zuongHoanPeterDuongPronou
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemSyuan Wang
 
SIP Security Best Practices
SIP Security Best PracticesSIP Security Best Practices
SIP Security Best PracticesIntelePeer
 
Honeywell alarmnet-brochure
Honeywell alarmnet-brochureHoneywell alarmnet-brochure
Honeywell alarmnet-brochureAlarm Grid
 
CNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular networkCNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular networkSam Bowne
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth securityRamasubbu .P
 
mobile/wireless telephony
mobile/wireless telephonymobile/wireless telephony
mobile/wireless telephonyShaurya
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyChristopher Duffy
 

What's hot (20)

PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical Overview
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
 
Dipu cyberroam presenttion
Dipu cyberroam presenttionDipu cyberroam presenttion
Dipu cyberroam presenttion
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
VoIP security: Implementation and Protocol Problems
VoIP security: Implementation and Protocol ProblemsVoIP security: Implementation and Protocol Problems
VoIP security: Implementation and Protocol Problems
 
VOIP
VOIPVOIP
VOIP
 
Vo ip presentation
Vo ip presentationVo ip presentation
Vo ip presentation
 
10.1.1.64.2504
10.1.1.64.250410.1.1.64.2504
10.1.1.64.2504
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITY
 
Security lte environment_cook_zuong
Security lte environment_cook_zuongSecurity lte environment_cook_zuong
Security lte environment_cook_zuong
 
Cyber security
Cyber securityCyber security
Cyber security
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
 
SIP Security Best Practices
SIP Security Best PracticesSIP Security Best Practices
SIP Security Best Practices
 
Honeywell alarmnet-brochure
Honeywell alarmnet-brochureHoneywell alarmnet-brochure
Honeywell alarmnet-brochure
 
CNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular networkCNIT 128 Ch 2: Hacking the cellular network
CNIT 128 Ch 2: Hacking the cellular network
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
SMB Communications - is VoIP secure?
SMB Communications - is VoIP secure?SMB Communications - is VoIP secure?
SMB Communications - is VoIP secure?
 
mobile/wireless telephony
mobile/wireless telephonymobile/wireless telephony
mobile/wireless telephony
 
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice EncryptionSlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
 

Similar to VOIP - Pankaj Karande

An approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptxAn approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptxamalouwarda1
 
why-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdfwhy-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdftardis2
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056mashiur
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...Alexander Decker
 
Misrepresentation is not considered a generic security issue in VoIP.pdf
Misrepresentation is not considered a generic security issue in VoIP.pdfMisrepresentation is not considered a generic security issue in VoIP.pdf
Misrepresentation is not considered a generic security issue in VoIP.pdfapposekitchenpvd
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Fringe Division
 
Voice over Internet Protocol
Voice over Internet ProtocolVoice over Internet Protocol
Voice over Internet ProtocolCourse Hero
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Generic Voice Security Issues
Generic Voice Security IssuesGeneric Voice Security Issues
Generic Voice Security Issuesjasondewar
 
introduction to voip
introduction to voipintroduction to voip
introduction to voipdeeq maxamed
 
Voice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel ApplicationsVoice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel Applicationsirjes
 

Similar to VOIP - Pankaj Karande (20)

VOIP BASIC
VOIP BASICVOIP BASIC
VOIP BASIC
 
An approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptxAn approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptx
 
why-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdfwhy-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdf
 
Kartik Powerpoit
Kartik PowerpoitKartik Powerpoit
Kartik Powerpoit
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...
 
Misrepresentation is not considered a generic security issue in VoIP.pdf
Misrepresentation is not considered a generic security issue in VoIP.pdfMisrepresentation is not considered a generic security issue in VoIP.pdf
Misrepresentation is not considered a generic security issue in VoIP.pdf
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)
 
Internet Telephony
Internet TelephonyInternet Telephony
Internet Telephony
 
VOIP Presentation
VOIP PresentationVOIP Presentation
VOIP Presentation
 
VOIP Technology
VOIP TechnologyVOIP Technology
VOIP Technology
 
Voice over Internet Protocol
Voice over Internet ProtocolVoice over Internet Protocol
Voice over Internet Protocol
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Generic Voice Security Issues
Generic Voice Security IssuesGeneric Voice Security Issues
Generic Voice Security Issues
 
Vo ip
Vo ipVo ip
Vo ip
 
Voip.v1(1)
Voip.v1(1)Voip.v1(1)
Voip.v1(1)
 
VoIP
VoIPVoIP
VoIP
 
introduction to voip
introduction to voipintroduction to voip
introduction to voip
 
Voice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel ApplicationsVoice over Internet Protocol with Novel Applications
Voice over Internet Protocol with Novel Applications
 

More from Shailesh Kabra

Emission controls techniques ppt
Emission controls techniques pptEmission controls techniques ppt
Emission controls techniques pptShailesh Kabra
 
Emission control technique report
Emission control technique reportEmission control technique report
Emission control technique reportShailesh Kabra
 
Final ppt on car safety
Final ppt on car safetyFinal ppt on car safety
Final ppt on car safetyShailesh Kabra
 
Anti collision devices
Anti collision devicesAnti collision devices
Anti collision devicesShailesh Kabra
 
Gears uploaded shailesh kabra
Gears   uploaded shailesh kabraGears   uploaded shailesh kabra
Gears uploaded shailesh kabraShailesh Kabra
 

More from Shailesh Kabra (8)

Emission controls techniques ppt
Emission controls techniques pptEmission controls techniques ppt
Emission controls techniques ppt
 
Emission control technique report
Emission control technique reportEmission control technique report
Emission control technique report
 
Title page Sample
Title page SampleTitle page Sample
Title page Sample
 
Car safety
Car safetyCar safety
Car safety
 
Frnt 3 pgs mod 2
Frnt 3 pgs mod 2Frnt 3 pgs mod 2
Frnt 3 pgs mod 2
 
Final ppt on car safety
Final ppt on car safetyFinal ppt on car safety
Final ppt on car safety
 
Anti collision devices
Anti collision devicesAnti collision devices
Anti collision devices
 
Gears uploaded shailesh kabra
Gears   uploaded shailesh kabraGears   uploaded shailesh kabra
Gears uploaded shailesh kabra
 

Recently uploaded

Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 

Recently uploaded (20)

Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 

VOIP - Pankaj Karande

  • 1. (VOIP) VOICE NETWORK TECHNOLOGY SECURITY & STRATEGIES  Presented by: Pankaj Karande  Class: TE (A)  Roll no: 3351 Guide: Prof. M.P. Mali
  • 2. TOPICS TO BE COVERED:  What is VOIP ?  How Does VOIP Work?  Security Concerns & Security Measures.  Pros & Cons.  Conclusion.  References.
  • 3. WHAT IS VOIP? • VOIP, also known as IP telephony, is the real-time transmission of voice signals using the Internet Protocol (IP) over the public Internet or a private data network. • VOIP allows users to make telephone calls using a broadband Internet connection instead of an analog phone line.
  • 4. WORKING OF VOIP: Fig(1): Voice processing in VOIP network. The VOIP data processing consists of the following steps: 1) Signaling 2) Encoding 3)Transport
  • 5. SECURITY CONCERNS & SECURITY MEASURES.. 1) (DoS) Denial of Service attack: There are two types: 1) Flood Service Attack. 2) Crash Service Attack. Fig (2): VOIP specific Dos attack.
  • 6. Counter Measure for (DoS):  To mitigate the Dos attack, strong authentication is a key.  VOIP components should make sure that they are communicating with legitimate.  VOIP firewall should be enabled.
  • 7. SECURITY CONCERNS & SECURITY MEASURES.. 2) Eavesdropping: Eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.
  • 8. Counter Measures for Eavesdropping:  Encryption of voice packet in the network should be there to protect against Eavesdropping.  If web-based interfaced is made, use of HTTPS is recommended instead of HTTP.
  • 9. SECURITY CONCERNS & SECURITY MEASURES.. 4) Vishing:  Vishing is another word of VOIP Phishing. The term is combination of “voice” and “phishing”.  Vishing is typically used to steal credit card numbers or other information from the people.
  • 10. 5) (SPITP) Spamming Over Internet Telephony: • Spamming is actually sending emails to people against their will. • Spam messages can carry viruses and spyware along with them.
  • 11. PROS.. • The main advantage of VOIP is that PC-to-PC, calls are free no matter the distance and PC-to- Phone are nominal. • For monthly fee you may make unlimited calls within a geographical area. • It enables to make calls from anywhere as long as the a broadband connection is available.
  • 12. CONS.. • VOIP is susceptible to worms, viruses and hacking, although this is very rare and VOIP developers are working on VOIP encryption to counter this. • With VOIP emergency calls, it is hard to locate you and send help in time. • Without power VOIP phones are useless, so in case of emergencies during power cuts it can be a major disadvantage.
  • 13. CONCLUSION In VOIP, threats such as DoS (Denial of Service) attack, Eavesdropping, Vishing, these all above are the common threat which are risky & which disturbs the VoIP technology in large amount. Due to this there are chances of leakage of confidential messages which complicates the security assurance. So to reduce this threat various Security Strategies are applied various adoption of Security mechanism is carried out such as Authentication, Encryption and Firewall measures are taken which will not hamper VoIP technology. “Defense in depth” is a good principle in defending VOIP.
  • 14. REFERENCE Websites: • http://en.wikipedia.org/wiki/VOIP • http://www.VOIP-info.org/wiki/ • http://computer.howstuffworks.com/ip-telephony5.htm Papers: • Yan Zhang, Huimin Huang, Computer Information Institute, ”VOIP Voice Network Technology Security Strategies”, 978-1-4577-0536-6/11/$26.00 ©2011 IEEE • David Butcher, Xiangyang Li, and Jinhua Guo, Computer Information Institute, “Security Challenge And Defense in VOIP Infrastructure”, 1094-6977/$25.00 © 2007 IEEE