SlideShare a Scribd company logo
IdentifyingaWolfin
sheep’sclothing
by Hemant Sengar
VoIPFraud:
HAROKOPIO UNIVERSITY -
DEPARTMENT OF INFORMATICS
AND TELEMATICS
MSc in Advanced Telecommunication
Systems and Applications
Data and Systems Security
Dr. Panagiotis Rizomiliotis
2
Hello!
We are:
Elena Politi - 14207
Fotis Evangelou - 14203
Giorgos Fragiadakis - 14212
3
1. WHATISVoIP
4
VoiceoverInternetProtocol
Cheaper and more flexible than PSTN
5
A technology that enables people to use the
Internet as the transmission medium for
telephone calls.
Works through sending digitized voice
samples in packets.
SIP ≡ Session Initiation Protocol
Τhe dominant signaling channel to handle multimedia sessions.
RTP ≡ Real-time Transport Protocol
Τhe voice channel
VoIPProtocols
6
VoIPArchitecture
Place your screenshot here
7
AnexamPleofSIPcallEstaBlishmentandTearDown
8
Incorporating Active Fingerprinting into SPIT Prevention Systems Hong
Yan et. al.
2.SecurityRisks
SIP based VoIP services are offered in an open
architecture network which makes them attractive
targets.
9
10
SIP scanning attack
Accounts with vulnerabilities
(i.e. poor authentication) that
are brutally attacked in order
to steal credentials and be
compromised.
Attacks via voicemail
Hackers exploit
vulnerabilities in voicemail
systems in order to launch
various fraudulent activities
(i.e. billing)
According to the article there are two common attacks to SIP-based
elements:
PotentialThreats,Vulnerabilities,AttacksandTheirImpactinanSIP-BasedVoIP
Environment
11
TheGlobalFraudLossSurvey2013
12Communications Fraud Control Association
Estimated fraud losses by service type
Insimplenumbers...
The estimated Global Fraud Loss for 2013 was $46.3 Billion:
✖ $11.08 is due to VoIP fraud
✖ 15% increased from 2011
13
e.g. August 2012
Mississippi Counties
were hit by hackers
stealing $100.000 worth
of phone calls to Central
Africa
3.ProBlem & ExistingSolUtions
Attackers are being masqueraded as another user
and originate calls using forged identity
14
ProvideR’sexiStingSolution
Compromised
15
CateGoriesofPropoSedSoluTions
Identity & Trust value of callers
16
Stronger authentication mechanisms
Ascertain to the real path of call source
To date, related work is being focused on three different
scopes and proposes solutions which can be the
ingredients of a general and united solution
17
SoluTionstillYesteRday
18
Another two solutions are presented in last decade, was directly
related to the article which we are presenting today.
SoluTionstillYesteRday2
4.UnmasqueradeTheWolF
Sengar’s approach
19
phaSesofVoiPSecuriTy
User Authentication Device Authorization
Identification
Classification
Verification
Fingerprinting
20
21
A. Classification
If same class of devices
look similar and have
same type of hardware
then there should exist
common attributes, that
can put it apart from other
classes of devices.
B. Fingerprinting
Each device has its own
unique notion of time that
makes it distinct within its
own class of devices.
PHASE1
Identification
22
The SIP Server confirms whether the device is associated
with the particular user or not.
Verification
PHASE2
5.Experimentalmethodology
23
a. ClassiFicatIon
The analysis of RTP payloads (or packets) can reveal information
about the device that created it. The article discusses the
following acoustic features:
✖ Silence Energy
✖ DC Offset
✖ Dithering Pattern
24
Experimental Evaluation
25
11 Different
Hardphones
5 Softphones installed
on a laptop computer
All of the phones
register from one access
location to the SBC
5-8 calls from each
phone
Analysis of Various Softphones and Hardphones
26
B.FinGerpriNting
fig. REGISTER Message Flow
A unique identity of the calling device is created by
achieving a proper registration
Experimental Evaluation
27
Group of devices share
the same configuration
files.
Devices use same
synchronization system
clock
The device location
remains fixed
The signaling and
media streams flow
through the same SBC
Different
manufacturing
stamp
Handset vs Handsfree
Experimental Results
28
The experimental process concludes to the following
aspects that affect device identification
Subscriber’s Behavior
Phone's manufacturing
release version
Laptop connection
for softphones
(wifi - Ethernet)
6.ConClusions
29
Device Authorization
Observing the signaling and media streams in
order to determine the device information
Fingerprinting a remote device with a high speed
degree of accuracy
Establishing a relationship between user ID and
the authorized calling device
30
Sengarsuggests
WhatweBelieve
Back to PSTN
31
Hahahahahaha
32
OurProposals
Use stronger encryption where is possible
Better password management
Better collaboration between service providers and
device manufacturers
Establish a unified SIP standard protocol
Thanks!
Any questions?

More Related Content

What's hot

Network security java
Network security   javaNetwork security   java
Network security java
Dhamu Mca
 
Spying The Wire
Spying The WireSpying The Wire
Spying The Wire
Don Anto
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
Sigfox
 
Tbs Explanation
Tbs ExplanationTbs Explanation
Tbs Explanation
RafiSela
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical Overview
PrivateWave Italia SpA
 
Near field communication
Near field communicationNear field communication
Near field communication
anshu kumari
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
PositiveTechnologies
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
Suhas Desai
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
Onward Security
 
12 wireless ips-ss_12-17-10_a
12 wireless ips-ss_12-17-10_a12 wireless ips-ss_12-17-10_a
12 wireless ips-ss_12-17-10_a
Advantec Distribution
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
PositiveTechnologies
 
Defcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveillDefcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveill
Priyanka Aash
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
PrivateWave Italia SpA
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networks
PositiveTechnologies
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
Icomm Technologies
 
Signaling network vulnerabilities exposed, protection strategies for operator...
Signaling network vulnerabilities exposed, protection strategies for operator...Signaling network vulnerabilities exposed, protection strategies for operator...
Signaling network vulnerabilities exposed, protection strategies for operator...
Xura
 
Elm wifi
Elm wifiElm wifi
Elm wifi
Obd Ready
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
PositiveTechnologies
 
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation FirewallFortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
ShilaThak
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
TI Safe
 

What's hot (20)

Network security java
Network security   javaNetwork security   java
Network security java
 
Spying The Wire
Spying The WireSpying The Wire
Spying The Wire
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
 
Tbs Explanation
Tbs ExplanationTbs Explanation
Tbs Explanation
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical Overview
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
12 wireless ips-ss_12-17-10_a
12 wireless ips-ss_12-17-10_a12 wireless ips-ss_12-17-10_a
12 wireless ips-ss_12-17-10_a
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
 
Defcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveillDefcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveill
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networks
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
Signaling network vulnerabilities exposed, protection strategies for operator...
Signaling network vulnerabilities exposed, protection strategies for operator...Signaling network vulnerabilities exposed, protection strategies for operator...
Signaling network vulnerabilities exposed, protection strategies for operator...
 
Elm wifi
Elm wifiElm wifi
Elm wifi
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
 
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation FirewallFortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 

Similar to VoIP Fraud

Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip spaceAdvanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip space
UltraUploader
 
Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...
guestbda3307
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
ronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
daniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
makdul
 
169
169169
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
TomParker
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
juliankanarek
 
Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...
Videoguy
 
IoT setup and pairing
IoT setup and pairingIoT setup and pairing
IoT setup and pairing
Guy Vinograd ☁
 
Testing
TestingTesting
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
adolphoyonker
 
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
mordechaiguri
 
10.1.1.64.2504
10.1.1.64.250410.1.1.64.2504
10.1.1.64.2504
Dan Drumm
 
Firewalls
FirewallsFirewalls
Firewalls
junaid15bsse
 
Fortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-seriesFortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-series
Julian Ernesto Martinez Oliva
 
VoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleepVoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleep
guestad6e9e
 
EGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingEGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - Licensing
Dr. Edwin Hernandez
 
Fuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for TelecommunicationsFuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for Telecommunications
Codenomicon
 

Similar to VoIP Fraud (20)

Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip spaceAdvanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip space
 
Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
169
169169
169
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...
 
IoT setup and pairing
IoT setup and pairingIoT setup and pairing
IoT setup and pairing
 
Testing
TestingTesting
Testing
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones u...
 
10.1.1.64.2504
10.1.1.64.250410.1.1.64.2504
10.1.1.64.2504
 
Firewalls
FirewallsFirewalls
Firewalls
 
Fortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-seriesFortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-series
 
VoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleepVoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleep
 
EGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingEGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - Licensing
 
Fuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for TelecommunicationsFuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for Telecommunications
 

VoIP Fraud