SlideShare a Scribd company logo
CASE STUDY

Securing Enterprise VoIP Networks with Multi-Service Business Gateways
This paper discuss the security problem on voice over IP system and how to
solve those problems using Multi-Service Business Gateways, the MSBG is used for
securing enterprise networks includes securing the IP network with traditional firewall
and VPN capabilities and advanced VoIP security capabilities.
The security threats that voice over IP system can face can be classified to four
main categories:1234-

Network level threats
Media threats
Communication session threats
Application level threats

1- Network level threats:
VOIP use firewall to control network traffic, it check the incoming and
outgoing packets and then accepted or discarded them based on rules. This rules
specify type of server and available server in external network. The traffic that come
by this firewall compare with rules and then accepted or denied.
Denial of services attack is away to legitimate the server by overwhelm it by
heavy traffic, Firewall reduce the opportunities to attack the network using denial of
services attack.
Distributed denial of services (DDOS) it reduce the resources by creating
multiple attacks to preform simultaneous attack that cause resources starvation.
Solution:
Local area network have a property that solve network level threats called
virtual private network (VPN) ,VPN use to allow the external employee to access the
company LAN from outside it and allowing inter branch connectivity.
VPN depend on tunneling protocol to secure the network traffic and provide
an efficient way to transport IP traffic from one point to another by using confidential
mechanism, sender authentication and message integrity.
Therefore,VPN allow organization to maintain secure communication over
external, nonsecure network.
2- Addressing media security :
In some cases secure connection must be established due to need of high security
when we send sensitive data like card number and password when the connection
between different networks another example secured VoIP.
The standard protocol for VoIP media is Real-time Transport Protocol (RTP)and there
is (RSTP) it is an enhancement of (RTP) it called Secure Real-time Transport
Protocol an RTP packet consists of a header and a payload, the header consists
information such as payload type, sequence number, etc. a payload contains a
compressed voice generated by a voice coder.
The main purpose of securing a link is to keep data more confidential and to verify
data integrity and authenticity.

Solution:
For confidentiality, the packet payload is encrypted at the sender’s side and decrypted
at the receiver’s side using the same encryption key.
For verifying authentication of message SRTP relies on a hash algorithm that
produces a unique sequence of bytes (called MAC) that are being appended to the
packet end. This schema enables the receiver to verify the integrity of payload as well
as field in the header, such as the packet sequence number, to compact replay attacks.

Addressing session level security:
In VoIP calls there are several security issues and attacks that could Violates
the privacy of the call such an example man in the middle attack and illegitimate
session attempts, man in the middles attack is the way that someone else (3rd part)
enter the VOIP call without the sender and receiver knowledge and listen to their
conversation.
The MSBG supports some unique features for the protection for real-time
communication this features are available in service provider stand-alone Sessions
Border Control (SBCs).
The SBC element within the MSBG is designed for enhancing the level of
protection delivered to voice, video and instant user messages.
SBC preform many levels security:
1- Compliment the firewall DOS protection capability by adding applications
intelligence to prevent VOIP attack. Provide deep classification for signaling
and media stream at layer 2 through layer 7.
2- Used transaction rate to ensure that SIP devices with enterprise boundaries are
not flooded with failed SIP requests, SBC is self-protect against signaling
floods.
3- Infrastructure topology hiding at all protocol layers for confidently and
prevention and services attack.
4- Used encryption such as TLS to provide user authentication and privacy.
5- Session aware access control for signaling and media using static and dynamic
ACLs.
6- Monitoring and reporting include event logs, access violation logs,
management access logs, call detail records, with performance monitoring and
row packet capture ability.

More Related Content

What's hot

Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networks
PositiveTechnologies
 
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshopPositive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51
martinvoelk
 
SBC: Do I really need it?
SBC: Do I really need it?SBC: Do I really need it?
SBC: Do I really need it?
Bangladesh Network Operators Group
 
ManagedISDNandIPEncryption
ManagedISDNandIPEncryptionManagedISDNandIPEncryption
ManagedISDNandIPEncryptionAl Ewers
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
TAMBEMAHENDRA1
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
SS7 Vulnerabilities
SS7 VulnerabilitiesSS7 Vulnerabilities
SS7 Vulnerabilities
PositiveTechnologies
 
Introduction to Security Fabric
Introduction to Security FabricIntroduction to Security Fabric
Introduction to Security Fabric
Francisco Ordillano
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Editor IJCATR
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacks
Rohan Fernandes
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabric
ANSItunCERT
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
Manoj Kumar Mishra
 
Creating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case studyCreating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case study
PositiveTechnologies
 
Security Issues In Voip
Security Issues In VoipSecurity Issues In Voip
Security Issues In VoipWaqas Daar
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
TomParker
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Siddharth Rao
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
Puneet Bawa
 

What's hot (20)

Ch20 book
Ch20 bookCh20 book
Ch20 book
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networks
 
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshopPositive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshop
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51
 
SBC: Do I really need it?
SBC: Do I really need it?SBC: Do I really need it?
SBC: Do I really need it?
 
ManagedISDNandIPEncryption
ManagedISDNandIPEncryptionManagedISDNandIPEncryption
ManagedISDNandIPEncryption
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
SS7 Vulnerabilities
SS7 VulnerabilitiesSS7 Vulnerabilities
SS7 Vulnerabilities
 
Introduction to Security Fabric
Introduction to Security FabricIntroduction to Security Fabric
Introduction to Security Fabric
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacks
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabric
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
Creating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case studyCreating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case study
 
Security Issues In Voip
Security Issues In VoipSecurity Issues In Voip
Security Issues In Voip
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 

Viewers also liked

Concejo municipal (1)
Concejo municipal (1)Concejo municipal (1)
Concejo municipal (1)
Luis Fernando Tascón Montes
 
All Star Game Blue pdf
All Star Game Blue pdfAll Star Game Blue pdf
All Star Game Blue pdfMalinda Legg
 
The good old days
The good old daysThe good old days
The good old dayseoihelen
 
Vision slides
Vision slidesVision slides
Vision slides
Kae Novak
 
дубечне табір 2015
дубечне табір 2015дубечне табір 2015
дубечне табір 2015
Olena Maxun
 

Viewers also liked (7)

Concejo municipal (1)
Concejo municipal (1)Concejo municipal (1)
Concejo municipal (1)
 
cvandportfolio
cvandportfoliocvandportfolio
cvandportfolio
 
Tablas de joselyn
Tablas de joselynTablas de joselyn
Tablas de joselyn
 
All Star Game Blue pdf
All Star Game Blue pdfAll Star Game Blue pdf
All Star Game Blue pdf
 
The good old days
The good old daysThe good old days
The good old days
 
Vision slides
Vision slidesVision slides
Vision slides
 
дубечне табір 2015
дубечне табір 2015дубечне табір 2015
дубечне табір 2015
 

Similar to Case study about voip

Voip security
Voip securityVoip security
Voip security
Shethwala Ridhvesh
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)mashiur
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A Research
IJMER
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
ronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
daniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
makdul
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056mashiur
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...
Alexander Decker
 
why-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdfwhy-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdf
tardis2
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
Editor IJCATR
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
Palani Kumar
 
Ip security
Ip security Ip security
Ip security
Dr.K.Sreenivas Rao
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networkingsangusajjan
 
Ipsecurity
IpsecurityIpsecurity
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
sweta dargad
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
Christopher Duffy
 
R43019698
R43019698R43019698
R43019698
IJERA Editor
 
Sbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSelf Employed
 

Similar to Case study about voip (20)

Voip security
Voip securityVoip security
Voip security
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A Research
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...
 
why-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdfwhy-your-network-needs-an-sbc-guide.pdf
why-your-network-needs-an-sbc-guide.pdf
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
V3I6-0108
V3I6-0108V3I6-0108
V3I6-0108
 
Ip security
Ip security Ip security
Ip security
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
 
R43019698
R43019698R43019698
R43019698
 
Sbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX DeloymentSbc the-critical-component for a successful IP PBX Deloyment
Sbc the-critical-component for a successful IP PBX Deloyment
 
VoIP
VoIPVoIP
VoIP
 

Recently uploaded

Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Why People Fail in Network Marketing Business
Why People Fail in Network Marketing BusinessWhy People Fail in Network Marketing Business
Why People Fail in Network Marketing Business
Harish Kumar
 
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdfOffissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
offisadizayn
 
How to Make Your Trade Show Booth Interactive
How to Make Your Trade Show Booth InteractiveHow to Make Your Trade Show Booth Interactive
How to Make Your Trade Show Booth Interactive
Blue Atlas Marketing
 
QuickBooks Sync Manager Repair Tool- What You Need to Know
QuickBooks Sync Manager Repair Tool- What You Need to KnowQuickBooks Sync Manager Repair Tool- What You Need to Know
QuickBooks Sync Manager Repair Tool- What You Need to Know
markmargaret23
 
Enhancing a Luxury Furniture E-commerce Store with Expert Shopify Management
Enhancing a Luxury Furniture E-commerce Store with Expert Shopify ManagementEnhancing a Luxury Furniture E-commerce Store with Expert Shopify Management
Enhancing a Luxury Furniture E-commerce Store with Expert Shopify Management
SunTec India
 
Google Ads Vs Social Media Ads-A comparative analysis
Google Ads Vs Social Media Ads-A comparative analysisGoogle Ads Vs Social Media Ads-A comparative analysis
Google Ads Vs Social Media Ads-A comparative analysis
akashrawdot
 
AI Driven Emotional Recognition in Digital Ads - Tarun Gupta
AI Driven Emotional Recognition in Digital Ads - Tarun GuptaAI Driven Emotional Recognition in Digital Ads - Tarun Gupta
AI Driven Emotional Recognition in Digital Ads - Tarun Gupta
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
Demandbase
 
SEO as the Backbone of Digital Marketing
SEO as the Backbone of Digital MarketingSEO as the Backbone of Digital Marketing
SEO as the Backbone of Digital Marketing
Felipe Bazon
 
Digital Marketing Trends - Experts Insights on How
Digital Marketing Trends - Experts Insights on HowDigital Marketing Trends - Experts Insights on How
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel LeminTurn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Digital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew RupertDigital Strategy Master Class - Andrew Rupert
Playlist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music UPlaylist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music U
SemajahParker
 
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny LeibrandtThe New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya KellyHow to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Winning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis YuWinning local SEO in the Age of AI - Dennis Yu
Exploring the Top Digital Marketing Company in Canada
Exploring the Top Digital Marketing Company in CanadaExploring the Top Digital Marketing Company in Canada
Exploring the Top Digital Marketing Company in Canada
Solomo Media
 
Grow Your Business Online: Introduction to Digital Marketing
Grow Your Business Online: Introduction to Digital MarketingGrow Your Business Online: Introduction to Digital Marketing
Grow Your Business Online: Introduction to Digital Marketing
Digital Discovery Institute
 
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 

Recently uploaded (20)

Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge...
 
Why People Fail in Network Marketing Business
Why People Fail in Network Marketing BusinessWhy People Fail in Network Marketing Business
Why People Fail in Network Marketing Business
 
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdfOffissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
 
How to Make Your Trade Show Booth Interactive
How to Make Your Trade Show Booth InteractiveHow to Make Your Trade Show Booth Interactive
How to Make Your Trade Show Booth Interactive
 
QuickBooks Sync Manager Repair Tool- What You Need to Know
QuickBooks Sync Manager Repair Tool- What You Need to KnowQuickBooks Sync Manager Repair Tool- What You Need to Know
QuickBooks Sync Manager Repair Tool- What You Need to Know
 
Enhancing a Luxury Furniture E-commerce Store with Expert Shopify Management
Enhancing a Luxury Furniture E-commerce Store with Expert Shopify ManagementEnhancing a Luxury Furniture E-commerce Store with Expert Shopify Management
Enhancing a Luxury Furniture E-commerce Store with Expert Shopify Management
 
Google Ads Vs Social Media Ads-A comparative analysis
Google Ads Vs Social Media Ads-A comparative analysisGoogle Ads Vs Social Media Ads-A comparative analysis
Google Ads Vs Social Media Ads-A comparative analysis
 
AI Driven Emotional Recognition in Digital Ads - Tarun Gupta
AI Driven Emotional Recognition in Digital Ads - Tarun GuptaAI Driven Emotional Recognition in Digital Ads - Tarun Gupta
AI Driven Emotional Recognition in Digital Ads - Tarun Gupta
 
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
What’s “In” and “Out” for ABM in 2024: Plays That Help You Grow and Ones to L...
 
SEO as the Backbone of Digital Marketing
SEO as the Backbone of Digital MarketingSEO as the Backbone of Digital Marketing
SEO as the Backbone of Digital Marketing
 
Digital Marketing Trends - Experts Insights on How
Digital Marketing Trends - Experts Insights on HowDigital Marketing Trends - Experts Insights on How
Digital Marketing Trends - Experts Insights on How
 
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel LeminTurn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
 
Digital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew RupertDigital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew Rupert
 
Playlist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music UPlaylist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music U
 
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny LeibrandtThe New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
 
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya KellyHow to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
 
Winning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis YuWinning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis Yu
 
Exploring the Top Digital Marketing Company in Canada
Exploring the Top Digital Marketing Company in CanadaExploring the Top Digital Marketing Company in Canada
Exploring the Top Digital Marketing Company in Canada
 
Grow Your Business Online: Introduction to Digital Marketing
Grow Your Business Online: Introduction to Digital MarketingGrow Your Business Online: Introduction to Digital Marketing
Grow Your Business Online: Introduction to Digital Marketing
 
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
Unknown to Unforgettable - The Art and Science to Being Irresistible on Camer...
 

Case study about voip

  • 1. CASE STUDY Securing Enterprise VoIP Networks with Multi-Service Business Gateways This paper discuss the security problem on voice over IP system and how to solve those problems using Multi-Service Business Gateways, the MSBG is used for securing enterprise networks includes securing the IP network with traditional firewall and VPN capabilities and advanced VoIP security capabilities. The security threats that voice over IP system can face can be classified to four main categories:1234- Network level threats Media threats Communication session threats Application level threats 1- Network level threats: VOIP use firewall to control network traffic, it check the incoming and outgoing packets and then accepted or discarded them based on rules. This rules specify type of server and available server in external network. The traffic that come by this firewall compare with rules and then accepted or denied. Denial of services attack is away to legitimate the server by overwhelm it by heavy traffic, Firewall reduce the opportunities to attack the network using denial of services attack. Distributed denial of services (DDOS) it reduce the resources by creating multiple attacks to preform simultaneous attack that cause resources starvation. Solution: Local area network have a property that solve network level threats called virtual private network (VPN) ,VPN use to allow the external employee to access the company LAN from outside it and allowing inter branch connectivity. VPN depend on tunneling protocol to secure the network traffic and provide an efficient way to transport IP traffic from one point to another by using confidential mechanism, sender authentication and message integrity. Therefore,VPN allow organization to maintain secure communication over external, nonsecure network.
  • 2. 2- Addressing media security : In some cases secure connection must be established due to need of high security when we send sensitive data like card number and password when the connection between different networks another example secured VoIP. The standard protocol for VoIP media is Real-time Transport Protocol (RTP)and there is (RSTP) it is an enhancement of (RTP) it called Secure Real-time Transport Protocol an RTP packet consists of a header and a payload, the header consists information such as payload type, sequence number, etc. a payload contains a compressed voice generated by a voice coder. The main purpose of securing a link is to keep data more confidential and to verify data integrity and authenticity. Solution: For confidentiality, the packet payload is encrypted at the sender’s side and decrypted at the receiver’s side using the same encryption key. For verifying authentication of message SRTP relies on a hash algorithm that produces a unique sequence of bytes (called MAC) that are being appended to the packet end. This schema enables the receiver to verify the integrity of payload as well as field in the header, such as the packet sequence number, to compact replay attacks. Addressing session level security: In VoIP calls there are several security issues and attacks that could Violates the privacy of the call such an example man in the middle attack and illegitimate session attempts, man in the middles attack is the way that someone else (3rd part) enter the VOIP call without the sender and receiver knowledge and listen to their conversation. The MSBG supports some unique features for the protection for real-time communication this features are available in service provider stand-alone Sessions Border Control (SBCs). The SBC element within the MSBG is designed for enhancing the level of protection delivered to voice, video and instant user messages. SBC preform many levels security: 1- Compliment the firewall DOS protection capability by adding applications intelligence to prevent VOIP attack. Provide deep classification for signaling and media stream at layer 2 through layer 7. 2- Used transaction rate to ensure that SIP devices with enterprise boundaries are not flooded with failed SIP requests, SBC is self-protect against signaling floods. 3- Infrastructure topology hiding at all protocol layers for confidently and prevention and services attack. 4- Used encryption such as TLS to provide user authentication and privacy. 5- Session aware access control for signaling and media using static and dynamic ACLs.
  • 3. 6- Monitoring and reporting include event logs, access violation logs, management access logs, call detail records, with performance monitoring and row packet capture ability.