{"title":"Securing VoIP and PSTN from integrated signaling network vulnerabilities","authors":"Hemant Sengar, Ram Dantu, D. Wijesekera","doi":"10.1109/VOIPMS.2006.1638116","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638116","url":null,"abstract":"The liberalization of public switched telephone network (PSTN) and growing acceptance of SIGTRAN protocol suite have introduced new and yet to be trusted signaling entities. Thus security threats emerging from one network not only affects itself but other network also. We show how this integrated signaling environment can become a security threat to emerging VoIP and PSTN networks. We propose a security solution as a fix. Our proposal goes beyond \"Gateway Screening\" and \"SS7 Gatekeeper\" proposed by Telcordia and Verizon respectively to defend vulnerable SS7 network.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131388743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A lightweight scheme for securely and reliably locating SIP users","authors":"L. Kong, V. Balasubramaniyan, M. Ahamad","doi":"10.1109/VOIPMS.2006.1638117","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638117","url":null,"abstract":"Voice over Internet protocol (VOIP) is a fast growing technology believed to be the future replacement for traditional public switched telephone network (PSTN) networks. VOIP offers many benefits over PSTW, but there are still lots of issues when it comes to service reliability and security. One of the problems faced is how to locate communicating parties on the Internet in a secure and reliable manner. The security mechanisms included in RFC 3261 session initiation protocol (SIP) are either weak or expensive to deploy. In this paper, we propose a light weight scheme that can protect the integrity of SIP contact addresses. This scheme also achieves high availability of SIP services through replication. End user public key distributed in this scheme can also be used for end-to-end user authentication and media session key exchange.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133155260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting DoS attacks on SIP systems","authors":"Eric Y. Chen","doi":"10.1109/VOIPMS.2006.1638123","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638123","url":null,"abstract":"As VoIP technology becomes more widely deployed due to its economical advantage over traditional PSTN services, VoIP servers and clients will become attractive targets of denial of service (DoS) attacks. This paper proposes a method to detect DoS attacks that involve flooding SIP entities with illegitimate SIP messages. We modify the original finite-state machines for SIP transactions in such a way that transaction anomalies can be detected in a stateful manner. We also propose to use four threshold parameters to confirm an attack.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125130054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Van Den Bossche, F. De Turck, B. Dhoedt, P. Demeester
{"title":"Enabling Java-based VoIP backend platforms through JVM performance tuning","authors":"B. Van Den Bossche, F. De Turck, B. Dhoedt, P. Demeester","doi":"10.1109/VOIPMS.2006.1638121","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638121","url":null,"abstract":"Software backend platforms are increasingly important in voice over IP (VoIP) service offering. Java, currently the most popular language, and the J2EE platform have evolved toward one of the important software frameworks for designing and implementing business logic on a telecom backend platform. Considering the popularity of Java, the question arises whether Java-based backend platforms can meet the requirements imposed by VoIP applications. SIP is an important example of a signaling protocol often used for VoIP. The SIP Servlet technology was developed for building Java based VoIP services. Therefore, we evaluated both the functionality and performance of the SIP Servlet specification and implementations. The evaluation procedure and the obtained results are reported upon. The influence of the Java virtual machine (JVM) tuning has been investigated and will be detailed in this paper. Moreover, performance of techniques based on the obtained results to optimize the garbage collector tuning of the JVM in general, and more specifically for VoIP related applications, will be presented.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130545307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VoIP security assessment: methods and tools","authors":"H. Abdelnur, V. Cridlig, R. State, O. Festor","doi":"10.1109/VOIPMS.2006.1638119","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638119","url":null,"abstract":"VoIP networks are cost efficient solutions for providing voice services and value added voice based services to both public and enterprise level users. The security of VoIP network is of major importance, since malicious usage can lead to major security incidents and associated costs. In this paper we present a security management framework for VoIP. This framework is capable to perform advanced security assessment tasks for such a network. This paper describe our developed tool, highlights some of its key components and presents some of the learned experience while implementing the framework on a internal testbed.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123105298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical traffic identification method based on flow-level behavior for fair VoIP service","authors":"T. Okabe, T. Kitamura, Takayuki Shizuno","doi":"10.1109/VOIPMS.2006.1638120","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638120","url":null,"abstract":"Many threats, such as denial-of-services (DoS) attacks and impersonation, can endanger an IP network where real-time communication, as represented by VoIP, requires a high level of reliability to work as a replacement for PSTN. Without making a concrete framework to protect the reliability of VoIP, we may soon start seeing cases whereby networks are illegally used by impersonating real-time communication. This paper proposes a technique, based on flow-level behavior, which aims to maintain communication confidentiality and identify applications of real-time communication, in a short period of time in order to eliminate applications that illegally use network resources. The paper shows favorable identification results were obtained from our experiments and also introduces issues we have discovered that must be resolved.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130980040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threat assessment of IP based voice systems","authors":"Bill Rippon","doi":"10.1109/VOIPMS.2006.1638118","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638118","url":null,"abstract":"In this paper, we will provide an analysis of the potential threats to the reliability and security of IP based voice systems including; voice over IP and IP telephony. For each of the threat categories we will explore the potential methods of attacks and detail various mitigation approaches. These mitigation approaches may help to minimize or eliminate the exposure. Finally, we will provide a set of summary recommendations for dealing with each of the threat categories.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132477048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Niccolini, R. Garroppo, S. Giordano, G. Risi, S. Ventura
{"title":"SIP intrusion detection and prevention: recommendations and prototype implementation","authors":"S. Niccolini, R. Garroppo, S. Giordano, G. Risi, S. Ventura","doi":"10.1109/VOIPMS.2006.1638122","DOIUrl":"https://doi.org/10.1109/VOIPMS.2006.1638122","url":null,"abstract":"As VoIP deployment are expected to grow, intrusion problems similar to those of which data networks experience will become very critical. In the early stages of deployment, the intrusion and security problems have not been seriously considered, although they could have a negative impact on VoIP deployment. In the paper, SIP intrusion detection and prevention requirements are analyzed and an IDS/IPS architecture is proposed. A prototype of the proposed architecture was implemented using as a basis the very popular open-source software Snort, a network-based intrusion detection and prevention system. The prototype of the proposed architecture extends the basic functionality of Snort, making use of the preprocessing feature that permits analyzing protocols of layers above the TCP/UDP one. The preprocessors block is a very powerful one since it permits to implement both knowledge and behavior based intrusion detection and prevention techniques in Snort that basically adopts a network based technique. An important requirement of an IPS is that legitimate traffic should be forwarded to the recipient with no apparent disruption or delay of service. Hence, the performance of the proposed architecture has been evaluated in terms of impact that its operation has on the QoS experienced by the VoIP users.","PeriodicalId":374092,"journal":{"name":"1st IEEE Workshop on VoIP Management and Security, 2006.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128355157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}