This document discusses security issues related to Voice over Internet Protocol (VoIP). It begins by explaining what VoIP is and some of its early implementations. It then describes the basic protocols and protocol stacks used for VoIP signaling and sessions, including H.323, SIP, and RTP. The document outlines various roles in VoIP systems, such as administrators and operators. It identifies common attacks against VoIP networks like theft of service, man-in-the-middle attacks, IP spoofing, and denial-of-service attacks. It concludes that VoIP inherits security vulnerabilities from the Internet and that encryption, authentication, firewalls, and separating voice and data traffic are needed to secure VoIP networks.
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days
Integrated services by telecom operators and Unified Communications technology promise a quick payback and great convenience. However, it was discovered from practice that VOIP and IPPBX services can cause many problems, first of all relating to information security and fraud. What information security issues can arise for a company if Unified Communications are used? VOIP/PBX/MGW broken in 60 seconds - is it possible? Effective methods and practicalities of Unified Communications security will be discussed.
Positive Hack Days. Gritsai. VOIP insecurities workshopPositive Hack Days
Участник получит представление об основе IP-телефонии, а также базовые навыки поиска уязвимостей на примере распространенных IP-PBX и абонентских устройств. Рассматриваются как типовые сетевые уязвимости, так и сложные случаи, обнаруживаемые в ходе анализа защищенности реальных сетей.
This presentation contain basic knowledge about how voIP work and what are the security threat in voIP. It will also contain how we can prevent attack on voIP system.
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days
Integrated services by telecom operators and Unified Communications technology promise a quick payback and great convenience. However, it was discovered from practice that VOIP and IPPBX services can cause many problems, first of all relating to information security and fraud. What information security issues can arise for a company if Unified Communications are used? VOIP/PBX/MGW broken in 60 seconds - is it possible? Effective methods and practicalities of Unified Communications security will be discussed.
Positive Hack Days. Gritsai. VOIP insecurities workshopPositive Hack Days
Участник получит представление об основе IP-телефонии, а также базовые навыки поиска уязвимостей на примере распространенных IP-PBX и абонентских устройств. Рассматриваются как типовые сетевые уязвимости, так и сложные случаи, обнаруживаемые в ходе анализа защищенности реальных сетей.
This presentation contain basic knowledge about how voIP work and what are the security threat in voIP. It will also contain how we can prevent attack on voIP system.
The Voice over Internet Protocol (VoIP). The VoIP is relatively new and is gaining more and more popularity as it offers a
wide range of features and is much more cost effective as compared to the traditional PSTN. But the VoIP brings with it certain
security threats which need to be resolved in order to make it a more reliable source of communication. Session Initiation Protocol
(SIP) today is considered the standard protocol for multimedia signaling, and the result is a very generic protocol. SIP is specified by
the IETF in RFC 3261. From a structural and functional perspective, SIP is application layer signaling text-based protocol used for
creating, modifying, and terminating multimedia communications sessions among Internet endpoints. Unfortunately, SIP-based
application services can suffer from various security threats as Denial of Service (DoS). attacks on a SIP based VoIP infrastructure that
can severely compromise its reliability. In contrast, little work is done to analyze the robustness and reliability of SIP severs under
DoS attacks. In this survey, we are discussing the DoS flooding attack on SIP server. Firstly, we present a brief overview about the SIP
protocol. Then, security attacks related to SIP protocol. After that, detection techniques of SIP flooding attack and various exploited
resources due to attack were discussed and finally the paper reviews previous work done on SIP based DoS attacks.
Self Contained Encrypted Voice solution for business and government. Central server + iphone and android app, high level of encrypted voice and text message capability that resides completely onsite, works anywhere from one enabled comms device to another on the same network
Signaling network vulnerabilities exposed, protection strategies for operator...Xura
In the wake of recent highly publicized cyberattacks and the increased threat of data exploitation, with the growing demand for protecting network security, Xura participated in a live external webinar with Erik K Linask, Senior Editor,TMCnet.
Our security expert Ilia Abramov discussed recent publications in the press related to the signaling network vulnerabilities and explored SS7 fraud that threatens mobile network security and subscriber privacy. He identified the risks, determined protection scenarios and highlighted important security considerations for LTE signaling network planning.
LTE Masterclass: “Signaling network vulnerabilities and protection strategies...Xura
Now veterans of the LTE series circuit, we at Xura proudly hosted an LTE Masterclass: “Signaling network vulnerabilities and protection strategies for operators” at Lte Africa, led by our renowned security expert Ilia Abramov.
This Masterclass reviewed recently exposed mobile network vulnerabilities, as Ilia provided guidance on:
The anatomy of mobile network attacks
Examples of attacks and ways to prevent them
An understanding of protection methods
Secure network design planning from 2G to LTE
VOIP(voice over ip- that is,voice delivered using the internet protocol).is a term usred in ip telephony for a set of facilities for managing the delivey of voice information using the internet Protocol (IP). This is probably the best known and most publicized, talking PC to PC. VoIP is therefore telephony using a packet based network instead of the PSTN (circuit switched). "Voice over IP is the technology of digitizing sound, compressing it, breaking it up into data packets, and sending it over an IP (internet protocol) network where it is reassembled, decompressed, and converted back into an analog wave form.." Interoffice calls are free, since the company already has the bandwidth between offices. The technology is transparent to the user, and requires minimum training. Single cable infrastructure. Future proof technology. Users with ubiquitous voice and data service integrated over one universal infrastructure will benefit from true, seamless, transparent interworking between voice and all types of data.
Mobile Cybercrime - Don’t Leave Your Customers VulnerableXura
Based on the results of a survey commissioned by Xura, this webinar co-hosted with TMCnet, explored the mobile consumer’s view of the risks they face from mobile network vulnerabilities, and the role of the mobile network operator in protecting them.
Current trends and innovations in voice over IPALTANAI BISHT
Learn how to implement an open-source webrtc Click to dial or VOIP setup for their enterprises and also the new innovative add-on tech available for a basic VOIP system such as auto-attendants.
VoIP vs Telecom Providers
SIP Servers types
Open-source tool and technologies in VOIP
Opensip
Kamailio
Freeswitch
Media Handling
Webrtc
Machine learning in VoIP
Call Classifier
Fraud Detector
NLP and Auto attendants
VoIP to telecom bridging
Analysis of VoIP Forensics with Digital Evidence Procedureijsrd.com
The invention of Voice over Internet Protocol (VoIP) in communication technology created significant attractive services for its users, it also brings new security threats. Criminals exploit these security threats to perform illegal activities such as VoIP malicious attacks, this will require digital forensic investigators to detect and provide digital evidence. Finding digital evidence in VoIP malicious attacks is the most difficult task, due to its associated features with converged network. In this paper, a Model of investigating VoIP malicious attacks is proposed for forensic analysis. VoIP spoofing is being a common and most important threat to the VoIP users. It is technically possible for an attacker to masquerade as another VoIP caller (VoIP spoofing). A design of a SIP which will try to capture all of the data on a VoIP network and process it for forensic analysis with also detection of the spoofing or the fake caller address.
The Voice over Internet Protocol (VoIP). The VoIP is relatively new and is gaining more and more popularity as it offers a
wide range of features and is much more cost effective as compared to the traditional PSTN. But the VoIP brings with it certain
security threats which need to be resolved in order to make it a more reliable source of communication. Session Initiation Protocol
(SIP) today is considered the standard protocol for multimedia signaling, and the result is a very generic protocol. SIP is specified by
the IETF in RFC 3261. From a structural and functional perspective, SIP is application layer signaling text-based protocol used for
creating, modifying, and terminating multimedia communications sessions among Internet endpoints. Unfortunately, SIP-based
application services can suffer from various security threats as Denial of Service (DoS). attacks on a SIP based VoIP infrastructure that
can severely compromise its reliability. In contrast, little work is done to analyze the robustness and reliability of SIP severs under
DoS attacks. In this survey, we are discussing the DoS flooding attack on SIP server. Firstly, we present a brief overview about the SIP
protocol. Then, security attacks related to SIP protocol. After that, detection techniques of SIP flooding attack and various exploited
resources due to attack were discussed and finally the paper reviews previous work done on SIP based DoS attacks.
Self Contained Encrypted Voice solution for business and government. Central server + iphone and android app, high level of encrypted voice and text message capability that resides completely onsite, works anywhere from one enabled comms device to another on the same network
Signaling network vulnerabilities exposed, protection strategies for operator...Xura
In the wake of recent highly publicized cyberattacks and the increased threat of data exploitation, with the growing demand for protecting network security, Xura participated in a live external webinar with Erik K Linask, Senior Editor,TMCnet.
Our security expert Ilia Abramov discussed recent publications in the press related to the signaling network vulnerabilities and explored SS7 fraud that threatens mobile network security and subscriber privacy. He identified the risks, determined protection scenarios and highlighted important security considerations for LTE signaling network planning.
LTE Masterclass: “Signaling network vulnerabilities and protection strategies...Xura
Now veterans of the LTE series circuit, we at Xura proudly hosted an LTE Masterclass: “Signaling network vulnerabilities and protection strategies for operators” at Lte Africa, led by our renowned security expert Ilia Abramov.
This Masterclass reviewed recently exposed mobile network vulnerabilities, as Ilia provided guidance on:
The anatomy of mobile network attacks
Examples of attacks and ways to prevent them
An understanding of protection methods
Secure network design planning from 2G to LTE
VOIP(voice over ip- that is,voice delivered using the internet protocol).is a term usred in ip telephony for a set of facilities for managing the delivey of voice information using the internet Protocol (IP). This is probably the best known and most publicized, talking PC to PC. VoIP is therefore telephony using a packet based network instead of the PSTN (circuit switched). "Voice over IP is the technology of digitizing sound, compressing it, breaking it up into data packets, and sending it over an IP (internet protocol) network where it is reassembled, decompressed, and converted back into an analog wave form.." Interoffice calls are free, since the company already has the bandwidth between offices. The technology is transparent to the user, and requires minimum training. Single cable infrastructure. Future proof technology. Users with ubiquitous voice and data service integrated over one universal infrastructure will benefit from true, seamless, transparent interworking between voice and all types of data.
Mobile Cybercrime - Don’t Leave Your Customers VulnerableXura
Based on the results of a survey commissioned by Xura, this webinar co-hosted with TMCnet, explored the mobile consumer’s view of the risks they face from mobile network vulnerabilities, and the role of the mobile network operator in protecting them.
Current trends and innovations in voice over IPALTANAI BISHT
Learn how to implement an open-source webrtc Click to dial or VOIP setup for their enterprises and also the new innovative add-on tech available for a basic VOIP system such as auto-attendants.
VoIP vs Telecom Providers
SIP Servers types
Open-source tool and technologies in VOIP
Opensip
Kamailio
Freeswitch
Media Handling
Webrtc
Machine learning in VoIP
Call Classifier
Fraud Detector
NLP and Auto attendants
VoIP to telecom bridging
Analysis of VoIP Forensics with Digital Evidence Procedureijsrd.com
The invention of Voice over Internet Protocol (VoIP) in communication technology created significant attractive services for its users, it also brings new security threats. Criminals exploit these security threats to perform illegal activities such as VoIP malicious attacks, this will require digital forensic investigators to detect and provide digital evidence. Finding digital evidence in VoIP malicious attacks is the most difficult task, due to its associated features with converged network. In this paper, a Model of investigating VoIP malicious attacks is proposed for forensic analysis. VoIP spoofing is being a common and most important threat to the VoIP users. It is technically possible for an attacker to masquerade as another VoIP caller (VoIP spoofing). A design of a SIP which will try to capture all of the data on a VoIP network and process it for forensic analysis with also detection of the spoofing or the fake caller address.
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxronak56
Abstract
Voice over Internet Protocol (VoIP) is an advanced telecommunication technology which transfers the voice/video over
high speed network that provides advantages of flexibility, reliability and cost efficient advanced telecommunication
features. Still the issues related to security are averting many organizations to accept VoIP cloud environment due to
security threats, holes or vulnerabilities. So, the novel secured framework is absolutely necessary to prevent all kind of
VoIP security issues. This paper points out the existing VoIP cloud architecture and various security attacks and issues
in the existing framework. It also presents the defense mechanisms to prevent the attacks and proposes a new security
framework called Intrusion Prevention System (IPS) using video watermarking and extraction technique and Liveness
Voice Detection (LVD) technique with biometric features such as face and voice. IPSs updated with new LVD features
protect the VoIP services not only from attacks but also from misuses.
A Comprehensive Survey of Security Issues and
Defense Framework for VoIP Cloud
Ashutosh Satapathy* and L. M. Jenila Livingston
School of Computing Science and Engineering, VIT University, Chennai - 600127, Tamil Nadu, India;
[email protected], [email protected]
Keywords: Defense Mechanisms, Liveness Voice Detection, VoIP Cloud, Voice over Internet Protocol, VoIP Security Issues
1. Introduction
The rapid progress of VoIP over traditional services is
led to a situation that is common to many innovations
and new technologies such as VoIP cloud and peer to
peer services like Skype, Google Hangout etc. VoIP is the
technology that supports sending voice (and video) over
an Internet protocol-based network1,2. This is completely
different than the public circuit-switched telephone net-
work. Circuit switching network allocates resources to
each individual call and path is permanent throughout
the call from start to end. Traditional telephony services
are provided by the protocols/components such as SS7, T
carriers, Plain Old Telephone Service (POTS), the Public
Switch Telephone Network (PSTN), dial up, local loops
and anything under International Telecommunication
Union. IP networks are based on packet switching and
each packet follows different path, has its own header and
is forwarded separately by routers. VoIP network can be
constructed in various ways by using both proprietary
protocols and protocols based on open standards.
1.1 VoIP Layer Architecture
VoIP communication system typically consist of a front
end platform (soft-phone, PBX, gateway, call manager),
back end platform (server, CPU, storage, memory, net-
work) and intermediate platforms such as VoIP protocols,
database, authentication server, web server, operating sys-
tems etc. It is mainly divided into five layers as shown in
Figure1.
1.2 VoIP Cloud Architecture
VoIP cloud is the framework for delivering telephony
services in which resourc.
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxdaniahendric
Abstract
Voice over Internet Protocol (VoIP) is an advanced telecommunication technology which transfers the voice/video over
high speed network that provides advantages of flexibility, reliability and cost efficient advanced telecommunication
features. Still the issues related to security are averting many organizations to accept VoIP cloud environment due to
security threats, holes or vulnerabilities. So, the novel secured framework is absolutely necessary to prevent all kind of
VoIP security issues. This paper points out the existing VoIP cloud architecture and various security attacks and issues
in the existing framework. It also presents the defense mechanisms to prevent the attacks and proposes a new security
framework called Intrusion Prevention System (IPS) using video watermarking and extraction technique and Liveness
Voice Detection (LVD) technique with biometric features such as face and voice. IPSs updated with new LVD features
protect the VoIP services not only from attacks but also from misuses.
A Comprehensive Survey of Security Issues and
Defense Framework for VoIP Cloud
Ashutosh Satapathy* and L. M. Jenila Livingston
School of Computing Science and Engineering, VIT University, Chennai - 600127, Tamil Nadu, India;
[email protected], [email protected]
Keywords: Defense Mechanisms, Liveness Voice Detection, VoIP Cloud, Voice over Internet Protocol, VoIP Security Issues
1. Introduction
The rapid progress of VoIP over traditional services is
led to a situation that is common to many innovations
and new technologies such as VoIP cloud and peer to
peer services like Skype, Google Hangout etc. VoIP is the
technology that supports sending voice (and video) over
an Internet protocol-based network1,2. This is completely
different than the public circuit-switched telephone net-
work. Circuit switching network allocates resources to
each individual call and path is permanent throughout
the call from start to end. Traditional telephony services
are provided by the protocols/components such as SS7, T
carriers, Plain Old Telephone Service (POTS), the Public
Switch Telephone Network (PSTN), dial up, local loops
and anything under International Telecommunication
Union. IP networks are based on packet switching and
each packet follows different path, has its own header and
is forwarded separately by routers. VoIP network can be
constructed in various ways by using both proprietary
protocols and protocols based on open standards.
1.1 VoIP Layer Architecture
VoIP communication system typically consist of a front
end platform (soft-phone, PBX, gateway, call manager),
back end platform (server, CPU, storage, memory, net-
work) and intermediate platforms such as VoIP protocols,
database, authentication server, web server, operating sys-
tems etc. It is mainly divided into five layers as shown in
Figure1.
1.2 VoIP Cloud Architecture
VoIP cloud is the framework for delivering telephony
services in which resourc ...
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
Abstract
Voice over Internet Protocol (VoIP) is an advanced telecommunication technology which transfers the voice/video over
high speed network that provides advantages of flexibility, reliability and cost efficient advanced telecommunication
features. Still the issues related to security are averting many organizations to accept VoIP cloud environment due to
security threats, holes or vulnerabilities. So, the novel secured framework is absolutely necessary to prevent all kind of
VoIP security issues. This paper points out the existing VoIP cloud architecture and various security attacks and issues
in the existing framework. It also presents the defense mechanisms to prevent the attacks and proposes a new security
framework called Intrusion Prevention System (IPS) using video watermarking and extraction technique and Liveness
Voice Detection (LVD) technique with biometric features such as face and voice. IPSs updated with new LVD features
protect the VoIP services not only from attacks but also from misuses.
A Comprehensive Survey of Security Issues and
Defense Framework for VoIP Cloud
Ashutosh Satapathy* and L. M. Jenila Livingston
School of Computing Science and Engineering, VIT University, Chennai - 600127, Tamil Nadu, India;
[email protected], [email protected]
Keywords: Defense Mechanisms, Liveness Voice Detection, VoIP Cloud, Voice over Internet Protocol, VoIP Security Issues
1. Introduction
The rapid progress of VoIP over traditional services is
led to a situation that is common to many innovations
and new technologies such as VoIP cloud and peer to
peer services like Skype, Google Hangout etc. VoIP is the
technology that supports sending voice (and video) over
an Internet protocol-based network1,2. This is completely
different than the public circuit-switched telephone net-
work. Circuit switching network allocates resources to
each individual call and path is permanent throughout
the call from start to end. Traditional telephony services
are provided by the protocols/components such as SS7, T
carriers, Plain Old Telephone Service (POTS), the Public
Switch Telephone Network (PSTN), dial up, local loops
and anything under International Telecommunication
Union. IP networks are based on packet switching and
each packet follows different path, has its own header and
is forwarded separately by routers. VoIP network can be
constructed in various ways by using both proprietary
protocols and protocols based on open standards.
1.1 VoIP Layer Architecture
VoIP communication system typically consist of a front
end platform (soft-phone, PBX, gateway, call manager),
back end platform (server, CPU, storage, memory, net-
work) and intermediate platforms such as VoIP protocols,
database, authentication server, web server, operating sys-
tems etc. It is mainly divided into five layers as shown in
Figure1.
1.2 VoIP Cloud Architecture
VoIP cloud is the framework for delivering telephony
services in which resourc.
Voice over IP (VOIP) Security Research- A ResearchIJMER
This is a work based on a survey of Voice over IP security research.Goal is to provide a
roadmap for researchers seeking to understand existing capabilities and, and to identify gaps in
addressing the numerous threats and vulnerabilities present in VoIP systems. We also briefly discuss the
implications of our findings with respect to actual vulnerabilities reported in a variety VoIP products.
VoIP (Voice over Internet Protocol).pdfOkan YILDIZ
VoIP (Voice over Internet Protocol) transmits voice and multimedia content over an internet connection. VoIP allows users to make voice calls from a computer, smartphone, other mobile devices, special VoIP phones and WebRTC-enabled browsers. VoIP is a valuable technology for consumers and businesses, as it typically includes additional features that can't be found on standard phone services. These features include call recording, custom caller ID, and voicemail to e-mail. It is also helpful to organizations as a way to unify communications.
The process works similarly to a regular phone, but VoIP uses an internet connection instead of a telephone company's wiring. VoIP is enabled by a group of technologies and methodologies to deliver voice communications over the internet, including enterprise local area networks or wide area networks.
A VoIP service will convert a user's voice from audio signals to digital data and then send that data through the internet. If another user calls from a regular phone number, the signal is converted back to a telephone signal before reaching that user.
VoIP can also route incoming and outgoing calls through existing telephone networks. However, some VoIP services may only work over a computer or VoIP phone.
you can be friend with me on orkut
"mangalforyou@gmail.com" : i belive in sharing the knowledge so please send project reports ,seminar and ppt. to me .
2. VoIP Basics
VoIP defines as the transport of voices as packets
over IP based network or internet.
VoIP is result of experimental Network voice protocol
invented by ARPANET in 1973.
Vocaltec brought to the market the first Internet
phone software called Internet Phone.
3. VoIP Basics
These early applications of VoIP were marked by
poor sound quality and connectivity.
The steps and principles involved in originating VoIP
telephone calls are similar to traditional telephony
system.
VoIP services convert your voice into a digital signal
(packets of data) that travels over the IP based
Network or Internet.
VoIP inherits the internet’s security issues.
4. VoIP signalling Protocol
Voice over IP has been implemented in various
ways using both proprietary protocols and
protocols based on open standards.
VoIP signalling protocols are divided into two
categories:
1.Session Control Protocols
2.Media Control Protocols
1.Session Control Protocols are responsible for the
establishment, preservation and tearing down of
call sessions.
2.Media Control Protocols are responsible for the
creation and tearing down of media connections.
6. Some of the VoIP Protocols
H.323
Session Initiation Protocol (SIP)
Media Gateway Control Protocol (MGCP)
H.248 (also known as Media Gateway Control
(Megaco))
Real-time Transport Protocol (RTP)
Real-time Transport Control Protocol (RTCP)
Secure Real-time Transport Protocol (SRTP)
Session Description Protocol (SDP)
Skype protocol
7. H.323 Protocols
The H.323 protocol was one of the first VoIP protocols
that found widespread implementation for long-
distance traffic, as well as LAN services.
H.323 Protocols: defines the protocols to provide audio
visual communication sessions on any IP based
network.
used for transporting voice, video and data
communication in IP based network.
Supports Secure Real-Time protocol (SRTP) for media
confidentiality, and Multimedia Internet Keying
(MIKEY) for key exchange.
9. Session Initiation Protocol (SIP)
SIP is an application-layer control (signalling)
protocol used for creating, modifying and
terminating sessions with one or more participants.
The most common applications of SIP are in Internet
telephony for voice and video calls, as well as instant
messaging over IP networks.
Session management provides the ability to control
the attributes of an end-to-end call
SIP is gaining more acceptance in the network
telephony market
10. Session Initiation Protocol
(SIP)
The main components of SIP-based systems are user
agents and servers:
User Agents (UAs), are combinations of User Agent
Clients (UAC) and User Agent Servers (UAS).
A UAC is responsible for initiating a call by sending a
URL addressed INVITE to the intended recipient
A UAS receives requests and sends back responses.
12. ROLES IN A BASIC VOIP MODEL
The VoIPSA aims to define the security threats against
VoIP deployments, services, and end users.
Internal Roles
1. Administrator. This role is responsible for
maintaining the VoIP network perimeter and
auditing the VoIP system in order to monitor user
activities.
2. Auditor. This role is responsible for performing audit
logs to verify the integrity of the VoIP system.
3. Operator is responsible of protecting the system
from being compromised, so that each voice call can be
accounted to the appropriate user.
13. ROLES IN A BASIC VOIP MODEL
External Roles
1. Remote subscriber are users such as employees who
occasionally work from home.
2. Law Enforcement Agent is a legal agent who
redirects duplicated media packets to law
enforcement, for the purpose of wiretapping.
14. ATTACKS AGAINST THE VOIP NETWORK
Attacks when making/receiving a VoIP Call
Theft of service is the ability of a malicious user to
place fraudulent calls. this attack. This against the
service provider.
Man-in-the-middle attacks or Call Interception, VoIP is
particularly vulnerable to man-in-the-middle attacks,
in which the attacker intercepts call-signalling SIP
message traffic and masquerades as the calling party
to the called party, or vice versa.
IP Spoofing, occurs when a hacker inside or outside a
network impersonates a trusted computer.
.
15. ATTACKS AGAINST THE VOIP NETWORK
Repudiation attacks can take place when two parties talk over the
phone and later on one party denies that the conversation occurred.
Call Hijacking or Redirect attacks could replace a voice mail address
with a hacker-specified IP address, opening a channel to the hacker.
Denial-of-service (DoS) attacks prevent legitimate users of a network
from accessing the features and services provided by the network.
Call tampering (Signal protocol tampering) Call tampering is an attack
which involves tampering a phone call in progress.
Attacks against Softphones occur because as they reside in the data
VLAN, they require open access to the voice VLAN in order to access
call control, place calls to IP phones, and leave voice messages.
16. ATTACKS AGAINST THE VOIP NETWORK
B. Registration attacks
Brute Force attacks are simply an attempt to try all
possible values when attempting to authenticate with a
system or crack the crypto key used to create cipher
text.
Reflection attacks are specifically aimed at SIP systems.
It may happen when using http digest authentication
(i.e. challenge-response with a shared secret) for both
request and response.
The IP Spoofing attacks described earlier can also be
classified as registration attacks.
17. CONCLUSION
VoIP has inherited a number of Internet vulnerabilities
exploited by malicious person which pose a latent
threat to network infrastructures.
To defeat VoIP security threats, a well-structured plan
needs to be devised. The plan should include voice
encryption, authentication, voice-specific firewalls, and
separation of data and voice traffic.
It is also important that the voice servers and the other
components of VoIP networks stay physically secure
from intruders.