Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.

Slides:



Advertisements
Similar presentations
Driving Factors Security Risk Mgt Controls Compliance.
Advertisements

The leader in session border control for trusted, first class interactive communications.
Fall VoN 2000 SIP Servers SIP Servers: A Buyers Guide Jonathan Rosenberg Chief Scientist.
SURA/ViDe 4th Annual Workshop SIP, Security & Threat Models Dr. Samir Chatterjee School of Information Science Claremont Graduate University Claremont,
IMS and Security Sri Ramachandran NexTone. 2 CONFIDENTIAL © 2006, NexTone Communications. All rights Traditional approaches to Security - The CIA principle.
Information Document 18-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI) (by Mike Pluke, ETSI)
Voice Security Interop 2009 Mark D. Collier SecureLogix Corporation
1 IP Telephony (VoIP) CSI4118 Fall Introduction (1) A recent application of Internet technology – Voice over IP (VoIP): Transmission of voice.
Application Server Based on SoftSwitch
Building Applications Using SIP Scott Hoffpauir Vice President, Engineering Fall 1999 VON, Atlanta.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
The study and demonstration on SIP security vulnerabilities Mahidhar Penigi Vamsi Krishna Karnati.
SIP.edu : OpenSER in an academic environment OpenSER SUMMIT - VON – Berlin 2006.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
September 19, 2006speermint interim1 VoIP Threats and Attacks Alan Johnston.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Building Applications Using SIP Scott Hoffpauir Vice President, Engineering Fall 1999 VON, Atlanta.
Application Security Chapter 8 Copyright Pearson Prentice Hall 2013.
Colombo, Sri Lanka, 7-10 April 2009 Security & Regulatory Issues in NGN NK Goyal President, Communications & Manufacturing Association of India (CMAI)
Rajeev Bevara CS-555 Security Threats in VoIP. What is VoIP ? ➔ VOIP - Voice Over Internet Protocol. ➔ Delivery of voice communications and multimedia.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
VoIP Security Sanjay Kalra Juniper Networks September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 3 VoIP Issues.
Understanding Active Directory
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Common Misconceptions Alan D. Percy Director of Market Development The Truth of Enterprise SIP Security.
Voice & Data Convergence Network Services January 11, 2001.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
October 10-13, 2006 San Diego Convention Center, San Diego California Taking IP Security to the Next Level Real-time threat mitigation.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
Agenda Voice Security Architecture VoIP Risk VoIP threats Service disruption Design Consideration Attacks.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
PART 2: Product Line. Tenor Switches & Gateways Tenor AX Series Solution For Medium to Large Enterprises  Available in 8, 16, 24 and 48 port Available.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
Support Services & IP Multimedia Subsystem (IMS)
VoIP Security Assessment: Methods and Tools H. Abdelnur, V. Cridlig, R. State and O. Festor Madynes, LORIA-INRIA.
1 A high grade secure VoIP using the TEA Encryption Algorithm By Ashraf D. Elbayoumy 2005 International Symposium on Advanced Radio Technologies Boulder,
June 2006 Roles of Session Border Controllers in IMS Networks CANTO - June 2006.
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Introduction to SIP Based ENUM IP Telephony Infrastructure 資策會 網路及通訊實驗室 Conference over IP Team 楊政遠 博士
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Sridhar Ramachandran Chief Technology Officer Core Session Controller.
Chapter 4 Application Level Security in Cellular Networks.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Service Provider concerns in Implementing effective NGN Control 8 th April 2009 R.N.Padukone Pr. GM (Long Term Planning) BSNL, INDIA 1.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Analysis of SIP security Ashwini Sanap ( ) Deepti Agashe ( )
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
Network security Vlasov Illia
CS457 Introduction to Information Security Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
IP Telephony (VoIP).
Global Standards Collaboration (GSC) 14
The study and demonstration on SIP security vulnerabilities
Global Standards Collaboration (GSC) GSC-15
Ingate & Dialogic Technical Presentation
Presentation transcript:

Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director CQR Conference

Outline Threats Vulnerabilities Architecture Boundaries Insider External Application Logical Domains Other Challenges Market Perspective

Example Service Provider Architecture SIP Endpoints Soft Phones, VoIP Phones, Attached Terminal Adaptors (ATA) SoftSwitch Signaling Gateway Media Gateway Media Gateway Controller Session Border Controller (SBC) Registration & Location Servers Supporting Servers Authentication, Authorization, and Accounting (AAA) servers Call Data Record (CDR) servers Domain Name Service (DNS) servers Network File Server (NFS)

Threats Confidentiality Eavesdropping (including traffic analysis) Interception of Signaling or Media Stream Integrity Modification of Signaling (Rerouting/Masquerading) Modification of Media Stream (Impersonation) Fraud (cannot trust Caller ID) Integrity of stored data and systems Availability Service disruption (amplification attacks DoS/DDoS) Denial of Service against Signaling or Media Stream Spam Over Internet Telephony (SPIT) Unauthorized access (compromise systems with intentions to attack other systems or exploit vulnerabilities to commit fraud and eavesdropping).

Types of Vulnerabilities Applications: Buffer overflows, format-string exploits, scripts, password exploits, overload (DoS, DDoS) Protocols: Session tear-down, impersonation, session hijacking, SIP>SS7 boundary messages tampering, malformed messages, overload (DoS, DDoS) Supporting Services Address resolution and directory services (DNS, LDAP, ENUM), (SMTP), supporting databases (SQL), SNMP, STUN used for NAT traversal OS and Networking: Buffer overflows, format-string exploits, scripts, password exploits, overload (DoS, DDoS), ARP cache poisoning

End-to-End View Source: ITU Y.2701 (Security Requirements for NGN)

Insider Perspective

Operations Network Interfaces

External Perspective

Attempts to Bypass Filtering

Application³ Interface Security OSA/Parlay Interface OSA/Parlay Framework Service Control Features OSA/Parlay Application A OSA/Parlay Application A OSA/Parlay Gateway - Service Capability Server OSA/Parlay APIs Enterprise/Third Party Providers IMS Third Party Access OSA/Parlay Application A IMS Core Components IMS Network * Application³ means Third Party Application

Logical Segmentation Challenges Logical segmentation of the management/signaling/user layer between locations: Secure logical separation of domestic and international VoIP/NGN components An intruder from a foreign location could attack key domestic network elements because there may be insufficient barriers between domestic and international domains.

Internal Security Boundaries Needed?

An End-to-End View of Potential Security Vulnerabilities

Other Challenges in Security End-to-End Security Management Scaling across network domains, national and international domains (e.g., countries/continents) Hop-by-hop or end-to-end Identity Management Identity across network domains, national and international domains (e.g., countries/continents) Associated with a location Private/public identities, role and context based identifiers

Evolving Trust Model Source: ITU Y.2701

NNI Trust Model Source: ITU:Y.2701

Market Perspective Hows security in VoIP/NGN products today? Poor to average Security controls are not mature Not well implemented in deployments Implementations inherit traditional vulnerabilities (e.g. Buffer Overflows) Security performance and reliability are critical elements and need to be improved Security features to enforce stronger security posture (protocol, user and boundaries) are not uniformly implemented Baseline security requirements for product vendors are many times vague Signaling and media security are not fully recognized by the market Integration of security functionality still evolving Organizational issues are not fully identified and addressed