SlideShare a Scribd company logo
Govt. Engineering College Bikaner
A SEMINAR Presentation
ON

SECURITY CHALLENGE
AND DEFENSE IN VOIP
INFRASTRUCTURE

Presentation By:
Deepak Kumar Mishra
Information Technology
FINAL YEAR
WHAT IS VOIP
 Voice over internet protocol : Allows user to to make calls using
broadband internet Connection instead of analog phone line.
 Uses packet-switched network replace circuit switched network.
VOIP DATA PROCESSING
 SIGNALING (H.323 , SIP )
 ENCODING AND TRANSPORT (analog to digital , RTP , UDP)
 GATEWAY CONTROL (format conversion )
Fig. 1. (a) Typical VoIP network structure. (b) Voice data processing of the VoIP.
OVERVIEW OF SECURITY CONCERNS AND
IMPACTS IN A VOIP SYSTEM
GENERIC SECURITY CONCERNS IN VOIP

 DOS- Availability.
 Eavesdropping – confidentiality.
 Alteration of voice stream – confidentiality and Integrity .

 Toll fraud – Integrity .
 Redirection of call – Integrity and confidentiality.
 Accounting Data Manipulation – Integrity and Confidentiality.
 Caller Identification Impersonation – Integrity
OCCURRENCE POSITION AND IMPACT OF POTENTIAL ATTACKS TO A VOIP SYSTEM
ATTACK VECTORS IN VOIP AND CRITICAL CHALLENGES

The threats to the VOIP system can be further broken down
into specific attack vectors to disrupt the system and
summarized by the system layer where the attacks occur .

 SIP Registration Hijacking
 SIP Message Modification
 SIP cancel / bye attack
 Malformed SIP Command
 SIP Redirect
 RTP Payload
 RTP Tampering
SIP REGISTRATION HIJACKING
Registration hijacking occurs when an attacker
impersonates a valid UA to a registrar and replaces the
legitimate registration with its own address .
TLS can protect this.
SIP MESSAGE MODIFICATION
Have no Built in integrity ,by Man in middle attacks
an attacker can intercept and modify SIP messages .
TLS can protect from reading it.
SIP CANCEL /BYE ATTACK
The attacker can create an SIP message with the Cancel or
Bye command in its payload and send it to an end node to
terminate ongoing conversation .
Strong Authentication can control this attack.
MALFORMED SIP COMMAND
SIP uses HTML to carry command information , it becomes
difficult to test the SIP parser with possible inputs.
Strong Authentication and Dictionary test of cases for parser
can save network.
SIP REDIRECT
By attacking REDIRECT SERVER and commanding it to redirect
the victim’s call to specific number can redirect to null type device .
TLS with strong password can eliminate this.
RTP PAYLOAD
RTP carries actual encoded messages b/w two callers , adds
sequencing information .

MITM attack can gain access to the RTP media stream b/w two
nodes and can inspect and modify the data
RTP TAMPERING
By manipulation of the sequence number and timestamp fields
in the header of the RTP packet , the packets can be re
sequenced or made unusable.
SRTP can determine the modification of packet.
POSITION AND IMPACT OF POTENTIALATTACKS IN VOIP
 Other Attacks General to IP Data Networks.
1. Physical Attack
2. Address Resolution Protocol
3. MAC Spoofing
4. IP Spoofing
5. Malformed Packet
6. TCP or UDP Replay
7. Dynamic Host Configuration Protocol
8. Internet Control Message Protocol
9. Buffer Overflow Attack
10.OS Attack
11.Virus and Malware
12.CIDR Database Attack
DEFENSE VECTORS IN VOIP

 Separation of VOIP and Data Traffic
Similar to port Authentication , separating voice and data traffic is a key
enabler to overall security. VLAN technology (802.1q) is applied along with
voice mail servers and SIP aware firewalls.

 Configuration Authentication
VOIP phones need basic config. Information to get into VOIP system ,public
key or shared secret keys can help in the authenticated configuration of the
phone .Along with TLS it becomes more secure.
Signaling Authentication
The IP Security(IP Sec ) protocol provides mechanisms for both authentication
and encryption .
Provides DNS Secure , Authentication Header protocol . Controls Replay Attacks.

Media Encryption
SRTP protocol minimizes the number of keys that must be shared b/w two
nodes , MIKEY(multimedia Keying Protocol) capable of handing keys in adhoc
environment .
SECURITY MECHANISMS AGAINST ATTACKS
SEGMENTATION OF VOIP VOICE AND DATA
Queries ??
THANK you 

More Related Content

What's hot

I P S P O O F I N G
I P  S P O O F I N GI P  S P O O F I N G
I P S P O O F I N G
avinashkanchan
 
Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
Rajesh Porwal
 
Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
International Journal of Science and Research (IJSR)
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2
Warren Bent
 
Current trends and innovations in voice over IP
Current trends and innovations in voice over IPCurrent trends and innovations in voice over IP
Current trends and innovations in voice over IP
ALTANAI BISHT
 
Presentation1
Presentation1Presentation1
Presentation1
Rahul Polara
 
ip spoofing
ip spoofingip spoofing
ip spoofing
mohan babu
 
Wpa too-hole196-defcon18-presentation
Wpa too-hole196-defcon18-presentationWpa too-hole196-defcon18-presentation
Wpa too-hole196-defcon18-presentation
Md Sohail Ahmad
 
Spoofing
SpoofingSpoofing
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Pankaj Dubey
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
Anushakp9
 
Himanshupptx
HimanshupptxHimanshupptx
Himanshupptx
Himanshu Chaurishiya
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
Stephen Kho
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
ROHIT SAGAR
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
kamran_share
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
arpit.arp
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
MD MONIRUZZAMAN
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
John Rhoton
 
Wpa2 hole196-vulnerability
Wpa2 hole196-vulnerabilityWpa2 hole196-vulnerability
Wpa2 hole196-vulnerability
khalidbaig
 

What's hot (19)

I P S P O O F I N G
I P  S P O O F I N GI P  S P O O F I N G
I P S P O O F I N G
 
Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
 
Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2
 
Current trends and innovations in voice over IP
Current trends and innovations in voice over IPCurrent trends and innovations in voice over IP
Current trends and innovations in voice over IP
 
Presentation1
Presentation1Presentation1
Presentation1
 
ip spoofing
ip spoofingip spoofing
ip spoofing
 
Wpa too-hole196-defcon18-presentation
Wpa too-hole196-defcon18-presentationWpa too-hole196-defcon18-presentation
Wpa too-hole196-defcon18-presentation
 
Spoofing
SpoofingSpoofing
Spoofing
 
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Himanshupptx
HimanshupptxHimanshupptx
Himanshupptx
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
Wpa2 hole196-vulnerability
Wpa2 hole196-vulnerabilityWpa2 hole196-vulnerability
Wpa2 hole196-vulnerability
 

Viewers also liked

Equilibrum
EquilibrumEquilibrum
Equilibrum
EquilibriumHelp
 
Proyecto tecnologico
Proyecto tecnologicoProyecto tecnologico
Proyecto tecnologico
Mario Esteban Ramos Diaz
 
Jcb backhoe
Jcb backhoeJcb backhoe
chap010
chap010chap010
chap010
Mut Somoeun
 
Cattle services - turn key projects (English)
Cattle services - turn key projects (English)Cattle services - turn key projects (English)
Cattle services - turn key projects (English)
Silos Cordoba
 
ZMAN Accentuatios Article
ZMAN Accentuatios ArticleZMAN Accentuatios Article
ZMAN Accentuatios Article
JOEL BRACH
 
Evaluation 2
Evaluation 2Evaluation 2
Evaluation 2
livim
 
Mbeki Overview_Copy
Mbeki Overview_CopyMbeki Overview_Copy
Mbeki Overview_Copy
Ndangwa Noyoo
 
№7
№7№7
Louisiana Purchase Cypress Legacy-- What we're all about
Louisiana Purchase Cypress Legacy-- What we're all aboutLouisiana Purchase Cypress Legacy-- What we're all about
Louisiana Purchase Cypress Legacy-- What we're all about
Harvey Stern
 
Oasis clubhouse - color boards
Oasis clubhouse - color boardsOasis clubhouse - color boards
Oasis clubhouse - color boards
Yafitb
 
Evaluation
EvaluationEvaluation
Evaluation
NicoleTonge
 
Game Nation - Introduction
Game Nation - IntroductionGame Nation - Introduction
Game Nation - Introduction
Daniel Ruke
 
Metpen hasil penelitian
Metpen hasil penelitianMetpen hasil penelitian
Metpen hasil penelitianRonnie Arthana
 
Mgt 301 ppt sample 2
Mgt 301 ppt sample 2Mgt 301 ppt sample 2
Mgt 301 ppt sample 2
drdennylessard
 

Viewers also liked (15)

Equilibrum
EquilibrumEquilibrum
Equilibrum
 
Proyecto tecnologico
Proyecto tecnologicoProyecto tecnologico
Proyecto tecnologico
 
Jcb backhoe
Jcb backhoeJcb backhoe
Jcb backhoe
 
chap010
chap010chap010
chap010
 
Cattle services - turn key projects (English)
Cattle services - turn key projects (English)Cattle services - turn key projects (English)
Cattle services - turn key projects (English)
 
ZMAN Accentuatios Article
ZMAN Accentuatios ArticleZMAN Accentuatios Article
ZMAN Accentuatios Article
 
Evaluation 2
Evaluation 2Evaluation 2
Evaluation 2
 
Mbeki Overview_Copy
Mbeki Overview_CopyMbeki Overview_Copy
Mbeki Overview_Copy
 
№7
№7№7
№7
 
Louisiana Purchase Cypress Legacy-- What we're all about
Louisiana Purchase Cypress Legacy-- What we're all aboutLouisiana Purchase Cypress Legacy-- What we're all about
Louisiana Purchase Cypress Legacy-- What we're all about
 
Oasis clubhouse - color boards
Oasis clubhouse - color boardsOasis clubhouse - color boards
Oasis clubhouse - color boards
 
Evaluation
EvaluationEvaluation
Evaluation
 
Game Nation - Introduction
Game Nation - IntroductionGame Nation - Introduction
Game Nation - Introduction
 
Metpen hasil penelitian
Metpen hasil penelitianMetpen hasil penelitian
Metpen hasil penelitian
 
Mgt 301 ppt sample 2
Mgt 301 ppt sample 2Mgt 301 ppt sample 2
Mgt 301 ppt sample 2
 

Similar to Seminar on Voip Challenges and Countermeasures

Voip security
Voip securityVoip security
Voip security
Shethwala Ridhvesh
 
Case study about voip
Case study about voipCase study about voip
Case study about voip
elmudthir
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
mashiur
 
76 s201919
76 s20191976 s201919
76 s201919
IJRAT
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
sangusajjan
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
Editor IJCATR
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
Sean Flores
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
Togis UAB Ltd
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
ronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
daniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
makdul
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
ijsrd.com
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A Research
IJMER
 
Session initiation protocol security considerations
Session initiation protocol security considerationsSession initiation protocol security considerations
Session initiation protocol security considerations
Sami Knuutinen
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
mashiur
 
V3I6-0108
V3I6-0108V3I6-0108
V3I6-0108
Bhavana Sahni
 
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshopPositive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...
Alexander Decker
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
TomParker
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
Mumbai Academisc
 

Similar to Seminar on Voip Challenges and Countermeasures (20)

Voip security
Voip securityVoip security
Voip security
 
Case study about voip
Case study about voipCase study about voip
Case study about voip
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
76 s201919
76 s20191976 s201919
76 s201919
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A Research
 
Session initiation protocol security considerations
Session initiation protocol security considerationsSession initiation protocol security considerations
Session initiation protocol security considerations
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
 
V3I6-0108
V3I6-0108V3I6-0108
V3I6-0108
 
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshopPositive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshop
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 

Seminar on Voip Challenges and Countermeasures

  • 1. Govt. Engineering College Bikaner A SEMINAR Presentation ON SECURITY CHALLENGE AND DEFENSE IN VOIP INFRASTRUCTURE Presentation By: Deepak Kumar Mishra Information Technology FINAL YEAR
  • 2. WHAT IS VOIP  Voice over internet protocol : Allows user to to make calls using broadband internet Connection instead of analog phone line.  Uses packet-switched network replace circuit switched network. VOIP DATA PROCESSING  SIGNALING (H.323 , SIP )  ENCODING AND TRANSPORT (analog to digital , RTP , UDP)  GATEWAY CONTROL (format conversion )
  • 3.
  • 4. Fig. 1. (a) Typical VoIP network structure. (b) Voice data processing of the VoIP.
  • 5. OVERVIEW OF SECURITY CONCERNS AND IMPACTS IN A VOIP SYSTEM
  • 6. GENERIC SECURITY CONCERNS IN VOIP  DOS- Availability.  Eavesdropping – confidentiality.  Alteration of voice stream – confidentiality and Integrity .  Toll fraud – Integrity .  Redirection of call – Integrity and confidentiality.  Accounting Data Manipulation – Integrity and Confidentiality.  Caller Identification Impersonation – Integrity
  • 7. OCCURRENCE POSITION AND IMPACT OF POTENTIAL ATTACKS TO A VOIP SYSTEM
  • 8. ATTACK VECTORS IN VOIP AND CRITICAL CHALLENGES The threats to the VOIP system can be further broken down into specific attack vectors to disrupt the system and summarized by the system layer where the attacks occur .  SIP Registration Hijacking  SIP Message Modification  SIP cancel / bye attack  Malformed SIP Command  SIP Redirect  RTP Payload  RTP Tampering
  • 9. SIP REGISTRATION HIJACKING Registration hijacking occurs when an attacker impersonates a valid UA to a registrar and replaces the legitimate registration with its own address . TLS can protect this. SIP MESSAGE MODIFICATION Have no Built in integrity ,by Man in middle attacks an attacker can intercept and modify SIP messages . TLS can protect from reading it.
  • 10.
  • 11. SIP CANCEL /BYE ATTACK The attacker can create an SIP message with the Cancel or Bye command in its payload and send it to an end node to terminate ongoing conversation . Strong Authentication can control this attack. MALFORMED SIP COMMAND SIP uses HTML to carry command information , it becomes difficult to test the SIP parser with possible inputs. Strong Authentication and Dictionary test of cases for parser can save network.
  • 12.
  • 13. SIP REDIRECT By attacking REDIRECT SERVER and commanding it to redirect the victim’s call to specific number can redirect to null type device . TLS with strong password can eliminate this. RTP PAYLOAD RTP carries actual encoded messages b/w two callers , adds sequencing information . MITM attack can gain access to the RTP media stream b/w two nodes and can inspect and modify the data
  • 14. RTP TAMPERING By manipulation of the sequence number and timestamp fields in the header of the RTP packet , the packets can be re sequenced or made unusable. SRTP can determine the modification of packet.
  • 15. POSITION AND IMPACT OF POTENTIALATTACKS IN VOIP
  • 16.  Other Attacks General to IP Data Networks. 1. Physical Attack 2. Address Resolution Protocol 3. MAC Spoofing 4. IP Spoofing 5. Malformed Packet 6. TCP or UDP Replay 7. Dynamic Host Configuration Protocol 8. Internet Control Message Protocol 9. Buffer Overflow Attack 10.OS Attack 11.Virus and Malware 12.CIDR Database Attack
  • 17.
  • 18.
  • 19. DEFENSE VECTORS IN VOIP  Separation of VOIP and Data Traffic Similar to port Authentication , separating voice and data traffic is a key enabler to overall security. VLAN technology (802.1q) is applied along with voice mail servers and SIP aware firewalls.  Configuration Authentication VOIP phones need basic config. Information to get into VOIP system ,public key or shared secret keys can help in the authenticated configuration of the phone .Along with TLS it becomes more secure.
  • 20. Signaling Authentication The IP Security(IP Sec ) protocol provides mechanisms for both authentication and encryption . Provides DNS Secure , Authentication Header protocol . Controls Replay Attacks. Media Encryption SRTP protocol minimizes the number of keys that must be shared b/w two nodes , MIKEY(multimedia Keying Protocol) capable of handing keys in adhoc environment .
  • 22. SEGMENTATION OF VOIP VOICE AND DATA