Вы находитесь на странице: 1из 6

Pan African International Conference on Information Science, Computing and Telecommunications (2013)

Securing VoIP Network: An Overview of Applied


Approaches and Analysis
Michael Oche, Student Member IEEE, Mostofa Kamal Nasir, Abubakar Bello Tambawal,
Rafidah Md Noor, Member IEEE
Faculty of Computer Science and Information Technology
University of Malaya, Kuala Lumpur. Malaysia

Abstract - VoIP is becoming more and more popular and as corresponding realistic security requirements” . This is no
such a potential target for hackers. Providing security for VoIP different in case of VoIP. Most efforts were till today
services is therefore pertinent for telecommunications. Without invested in providing more advanced services and
correct mechanisms to ensure callers’ authentication, applications, with less attention paid to security. Another
transmission confidentiality and availability of the service,
prevailing problem lies in users' perception of VoIP
security of the VoIP users is at risk. The fact that VoIP relies
on IP infrastructure make it vulnerable to any attack that telephony, the fact that VoIP telephony idea is not
targets the network. Consequently, whatever may be the completely new, it follows the exemplification of traditional
nature of the attack, there is a good chance that the attacker is telephony and it’s seen by the users as a replacement to
capitalizing on a weakness in the VoIP protocol being used. traditional telephony. A replacement users presumed should
VoIP is different from other IP services in the sense that its provide similar security level. But unfortunately, VoIP is
security is normally treated as one of the service properties different, in the sense that its security is usually treated as
configurable by the user. This article provides an overview of one of the service properties configurable by the user. As
the VoIP security configuration requirement, aimed at such in this paper we reviewed and analyzed basic VOIP
empowering public VoIP user With the strategies to mitigate
network security requirements, with the aim of empowering
threats.
public VoIP users and equipping them with relevant basic
tools or information on how to better secure their VOIP
Keywords: PSTN; Security; Telephony; VoIP
telephony system.

The rest of the paper is organized as follows. In section 2,


I. INTRODUCTION
give a detailed review of literature, include the stages of
development of traditional telephony to what is known today
Voice over Internet Protocol (VoIP) is a rapidly growing
as VoIP. Section 3 described the typical VoIP architecture. In
Internet service. It gained popularity as a way to cut costs of
section 4, basic elements and concepts of a VoIP system was
international telephone connections by transporting voice
discussed. Section 5 presents the various mitigation methods
over public IP networks [1]. Today it is being implemented
used in securing a VoIP system. And finally in section five
in many IP applications, where it enables direct, and most
present the summary and future work.
time free communication over the Internet to users globally,
for example free Skype to Skype international call. As a
consequence, VoIP technology slowly replaces traditional II. LITERAURE REVIEW
telephony. There are numerous attack vectors when dealing
with VoIP, since VoIP depends on the IP infrastructure, any Voice over Internet Protocol is a somehow a different
attack that targets the network can be a potential hazard for technology, even though an average telecommunication user
VoIP. Consequently, whatever may be the nature of the know it concerns the Internet and it’s relatively cheap,
attack, there is a good possibility that the attacker is he/she probably may not know any details beyond that. The
capitalizing on a weakness in the VoIP protocol being used. traditional telephony system since its introduction in 1878
Providing security for this service is therefore pertinent for involved three main stages, first it existed in a form of a first
telecommunications. User private information, business general telephone network which required a constant human
negotiation details or even state secrets could be revealed if presence to switch and setup call. Later in 1891 [3] Plain
not well protected. Without a correct mechanism to ensure Old Telephone System (POTS) was introduced. POTS
callers’ Authentication, transmission confidentiality and provides for automated switching, which completely
service availability, the security of VoIP users are at risk. In eliminated the need for human presence. In 1970 POTS was
view of this, it is pertinent and imperative to investigate replaced with a more advanced system known as the Public
VOIP security problem and evaluate the service to assure Switched Telephone Network (PSTN). Unlike POTS, the
that moving telephony to a new IP-based platform does not PSTN uses digital signals, which allowed voice to be
compromise its security [2]. In most cases “advances and transmitted as digital signal instead of the analogue signal,
trends in information technology typically surpass the

104
Pan African International Conference on Information Science, Computing and Telecommunications (2013)

as in the case of POTS. This development made it possible Internet Protocol (IP). VoIP differs from the PSTN (a circuit
for services such as fax and other database services to be switched) in its ability to transmit information with no
offered in addition to voice. The introduction of the PSTN requirement for full bandwidth reservation. Unlike the
system marks the beginning of the digital communication PSTN which, irrespective of the amount of information to
era, and to make communication even more seamless the be sent, reserved a full transmission bandwidth. VoIP is
new PSTN was made to be compatible with the old POTS packet switched, information is first divided into packets
system, which uses lower transmission bandwidth of 4KHz before it is being transmitted. Packets may travel in different
despite the fact that digital services are transported on route (dynamic routing), in the transported network, as there
higher frequencies [3]. The higher bandwidth brought about is no single reserved path (circuit). As a consequence packet
as a result of digitization in the early 90’s, find their arrival at the destination may be in a different sequence than
usefulness in data network access technology. Many they were sent. Likewise, as there is no guaranteed
Internet access services, like ISDN, DSL and ADSL were bandwidth, some packets may be lost, as the packets are just
practicable using the same access lines that were used for simply being transported using the Internet Protocol (IP)
PSTN [4]. which doesn’t guarantee packet delivery. Voice
transportation using the IP works just the same way, as in
any other application similar to the World Wide Web
III. THE ARCHITECTURE (WWW) or email. The internet's tariffing system is based on
a philosophy different from that of the PSTN. Tariffing is
The acronym VoIP represents, Voice over Internet independent of geographical distance between the sender
protocol, it implies that voice packet is transported using and receiver. Therefore, transmitting data between any two

Figure 1: VoIP/PSTN basic scenarios [5]

Points may cost the client the same amount or in some cases Table 1 tariff difference using commercial Internet
even less, but in the case of traditional PSTN its different telephony and PSTN from France [5].
(calls are charged based on distance). Table 1 shows the
difference in pricing for a three minute call from France and
From – to Internet tel. PSTN
one national long distance call made within France. It could
France to US 0.30 US$ 1.58 US$
be observed that a call to Australia from France using
France to Australia 0.90 US$ 3.48 US$
internet is by far cheaper than a call made using the PSTN
to neighboring Belgium which distance is less compared to France to Belgium 1.11 US$ 1.31 US$
Australia. Also calling from France to Australia using the Within France (long distance) 1.05 US$ 0.74 US$
Internet is three times cheaper than PSTN to the same
location.

105
Pan African International Conference on Information Science, Computing and Telecommunications (2013)

Figure 1 shows four scenarios that related to the IP Network IP terminal


(VoIP client)
PSTN. Figure 1.1 shows scenario 1, the first VoIP IP terminal
(VoIP client)
applications, the application permits voice communication
between two users of the Internet, and it has grown so
popular to an extent that it is now used in many Instant
Messaging (IM) clients, like Skype, Messenger, etc. Voice
transmission over IP works just as any other Internet service
and fully converged with other IM applications. The next VoIP Server
Gateway

step of VoIP development came with the calls from Internet Conference PSTN
users to PSTN fixed subscribers figure 1.2 scenario 2. The bridge PSTN
Terminal
Terminal

main advantage of such a telecommunication solution is that VoIP provider

information traveled through the Internet as long as possible


and are forwarded to the PSTN at the very end – as close to Fig.2: VoIP basic architecture
the subscriber as possible. Thanks to this, even international
calls are treated as local calls by PSTN provider. The total
cost is considerably diminished [6]. V. ATTACK VECTORS IN VoIP

The last two scenarios (figure 1.3 and figure 1.4) might be The following described some possible attacks that could
used by providers when the need arises (whenever be launched on any VoIP system.
circumstance requires its implementation). Unquestionably,
there are allot more complicated scenario cases in used, but A Toll Fraud
they would merely be a variation of the four presented in Toll fraud is an attack that relates to individuals using
Figure1. telephone equipment to place unauthorized calls for their
personal gain, for example placing long distance calls for
IV. PROTOCOLS AND CONCEPTS which they are not permitted, security threat created relates
to integrity. The best approach proposed to mitigate this
While introducing VoIP one has to mention some basic attack is by letting VoIP application enforcing authorization
elements and concepts of a VoIP system. As can be seen in mechanism on IP network and dialing rules to groups of
Figure 2, there are four basic elements of a VoIP System users for certain times [7].
[6].
B. Denial of service (DoS)
• Terminal – In a VoIP environment it refers to the DoS in VoIP infrastructure, is an attempt by an attacker to
communication devices end point, usually where prevent the phone service from operating within the normal
the calls are being terminated. A terminal could operating specifications. This could include the inability to
either be software base or hardware based and place a call or receive a call, this kind of attack affects
could also involve some automatic interaction such Network availability [8].
as voice mails.
• Server – server is the focal point of a VoIP system. C. Eavesdropping
Registration of terminals and data information such Eavesdropping requires tapping a line or penetrating a
as locations and IP are stored in the server. Also switch. VoIP units share physical network connections with
the server performs some other operations such as the data network, and in many cases VoIP and data are on
setup call routing mechanism, authorization and the same logical portion of the network. Attaching a packet
accounting operation. sniffer to the VoIP network segment makes it easy to
• Gateway – Is the outmost edge of the VoIP intercept voice traffic [9]
network. It ensures the interoperability of the VoIP
network with other networks, such as converting D. Session Initiation Protocol (SIP) Attacks
voice calls and fax calls between PSTN and IP SIP Attacks attempt to exploit the SIP’s use of well-
network. know protocol to intercept or manipulate SIP messages.
• Conference Bridge – For multi point Such attacks include launching man-in-middle attack,
communication. Allows for the functionality of registration hijacking, message tampering and cancel/bye
several communication points. Because of the high attack, all these refer to attacks that affect integrity and
resource requirement of the conference bridge it is confidentiality [2]
isolated from the server just as shown in figure 2.
E. Phishing
Phishing is an attack against data privacy, this involve
the victims themselves giving vital personal information
unknowingly to the attacker. It involves a situation whereby

106
Pan African International Conference on Information Science, Computing and Telecommunications (2013)

an attacker sending an e-mail to user, the email appears to call setup protocol traffic e.g. H.323 traffic to learn the UDP
be from a legitimate business and asking the user to provide port to be used for RTP flows. The firewall then temporarily
vital personal information on a web page, such as social opens those UDP ports for the duration of the RTP
security number, bank or credit card and many more. And connection [13].
later uses this information for fraudulent purposes [10].
C. Hardening Voice Endpoints and Application Services
VI. METHOD OF SECURING VoIP NETWORK IP web access parameter in IP phones should be changed
from enabled to disabled, this is to prevent an attacker from
Much of the IP telephone infrastructure relies on a Call gaining access to a collection of configuration information
Manager (CM) which is a software-based call-processing which are freely available by pointing a web browser to the
component of an IP telephony solution. And so, to IP address of the IP phone. Also to prevent man-in-the-
successfully secure the IP phone, certain service properties middle attack, the gratuitous ARP setting should be changed
need to be configured by the user. Below are some from enable to disable. By disabling the gratuitous ARP
configuration and approaches required to mitigating VoIP feature, can prevent an IP phone from believing unsolicited
network security threats [11]. address resolution protocol (ARP) replies, which potentially
could have come from an attacker claiming to be the next-
A. Discovery Protocol Sniffing hop gateway to the IP phone. Aside from voice end points,
If an attacker is an insider or already has partial access to other popular attack target on voice networks includes
one internal network, there are varieties of passive host application servers, such as UCM server and below are
discovery techniques specific to a VoIP deployment that he some some hardening recommended for mitigation [14], :
can perform. For example, Cisco Discovery Protocol (CDP)
[12] is a proprietary layer 2 network management protocol • Enabling port security on switches to help mitigate
built into most Cisco networking devices, including VoIP ARP spoofing. Port security is a mechanism that
phones. CDP is used particularly in a call manager allows one to allocate a legitimate MAC address of
environment to discover and remove IP phones known server and devise ahead of time specific to
dynamically, for dynamic allocation of VLANs to IP each port on the switch. Thus, access to an
phones’ and other management functions. CDP packets are Ethernet, fast Ethernet, or Gigabit Ethernet port
broadcast on the local Ethernet segment and contain a when the MAC address detected is not on the
wealth of useful reconnaissance, information about the preassigned list should be blocked. This will help
device that are transmitted in plain text, information such as prevent ARP spoofing attack.
IP address, software versions, and VLAN assignments. • Dynamically restrict Ethernet port access with 802-
Most network sniffers can easily decode CDP traffic, Cisco 1x port Authentication. Enabling the 802.1x port
recommends turning off CDP on Cisco devices especially authentication protects against physical attacks,
where the environment is mostly static. However, in a VoIP such a situation where an attacker walking around
environment CDP can offer so much management inside the organization plugs a laptop into an
functionality that keeping it enabled where absolutely empty network jack in order to sniff traffic.
necessary might be an acceptable trade-off. But from a strict • Enabling DHCP snooping to prevent DHCP
security perspective, however CDP can provide attackers spoofing. DHCP snooping is a feature that blocks
with a wealth of data about ones network and should be DHCP responses from ports that don’t have DHCP
disabled. Also Cisco switches and routers have security servers associated with them. This prevents man-
feature called DHCP snooping that will cause the device to in-the-middle attack, a situation where a hacker
act as a DHCP firewall/proxy between trusted and untrusted reroute traffic to his machine by masquerading as a
network interfaces [11]. valid DHCP server. Also traffic entries should be
put in the DHCP-snooping binding table to be used
B. Protecting a VoIP Network with Security Appliances with the dynamic ARP inspection, and IP source
Security appliances such as firewalls and VPN guard that does not use DHCP [14].
termination devices also can be used to protect voice • IP source guard should be Configured on catalyst
networks. However, one challenge of protecting voice switches. The IP source guard (IPSG) feature uses
networks with a firewall is that the administrator is not sure DCHP snooping to prevent IP snooping on the
of the UDP ports that could be used to transmit the RTT network, by closely watching all DHCP IP
voice packets. For example, in a Cisco environment a UDP allocations. The switch only allows valid IP
port for an RTP stream typically is an even number port address that has been allocated by the DHCP server
selected from the range of 16,384 to 32, 767. Opening this to a particular port. This feature prevents an
entire range of potential ports could open unnecessary attacker from spoofing an IP address on the local
security hole. But Cisco firewalls such as the PIX and segment.
Adaptive security appliance (ASA) firewalls solve this • The default native VLAN value should be changed
problem, because Cisco firewalls can dynamically inspect to thwart VLAN hopping. Most switches come

107
Pan African International Conference on Information Science, Computing and Telecommunications (2013)

installed with a default native VLAN ID of VLAN eliminated with the use of existing security measures.
1. Because attackers can sometimes perform Correct deployment of available security solutions can make
VLAN hopping attacks if they know the VLAN VoIP a service with security level very close to those known
IDs ahead of time, it is usually a good idea to never from the PSTN, while keeping all its advantages, like
use VLAN1 for any traffic. It is recommended to advanced services such as user control, flexibility and lower
change the default native VLAN ID for all traffic costs. However, the biggest problem of VoIP system is that
going through the switch, from VLAN1 to those security solutions are actually seldom deployed. This
something hard to guess [15]. problem regards most of all, end users. The truth is that
most of the users do not have any idea about VoIP security
threats and countermeasures, and to make it even worse,
D. Protecting a VOIP with Auxiliary LANs they do not want to know. More serious threats to VoIP
Voice and data networks should be segmented with system may be realized due to weak end-devices protection
logically separate VLANs. This will help restrict access to or lack of encryption. Both are caused by users' lack of
the phones and critical servers. A fundamental approach to expertise and knowledge. It is, however, difficult to expect
protecting voice traffic from attackers is to place it in a the user to be a specialist in VoIP technology just to make a
VLAN separated from data traffic, this voice VLAN is often phone call. Any service or application that is being offered
called an auxiliary VLAN. VLAN separation alone protects in public network should be simple and the security taken
voice traffic from a variety of layer 2 attacks. For example, care of by the provider. In the future researchers need to
an attacker would be unable to launch a man-in-the-middle research on better VoIP security measure that does not
attack against the IP phone’s next-hop gateway. Such an involve the end user participation in the security process.
attack will be mitigated, because the attacker’s PC would be
connected to a data VLAN while the IP phone is connected
to the auxiliary VLAN. [13]. ACKNOWLEDGEMENTS

The authors would like to thank the High Impact Research


VII. CONCLUSION & FUTURE WORK of University of Malaya and Ministry of Higher Education
of Malaysia (UM.C/HIR/MOHE/FCSIT/09) for their
There are many security requirements, but from among support.
them in this paper only a few most important ones have
been chosen to describe VoIP networks: The bottom line of
the security solutions analysis is, though there are some
attacks that are extremely difficult to handle, most may be

Table 2. Summaries of mitigating methods.


Attack Mitigation Description
Auxiliary LANs transport voice traffic in a different VLAN from data traffic. This
Using auxiliary VLANs improves voice transmission quality and assist in securing voice traffic from layer two
attacks.
Effective use of firewalls could prevent potential harmful traffic from entering a voice
Using Firewall
network while dynamically opening suitable UDP port number of distinctive RTP flows.

Employing IPSec-protected Employing IPSec-protected VPNs to mitigate against voice signal and media packet
VPNs interception or modification.

To prevent attackers from using the web access to IP phone, to gain knowledge of other
Disabling Web Access servers such as the DHCP server, DNS and UCM server IP addresses, the web access to IP
phones should be disabled. By default this is usually enabled.

Disabling gratuitous ARP (GARP), can check against man-in-the-middle attack. This will
Disabling Gratuitous ARP prevent an attacker from sending unsolicited ARP replies to the IP phone’s next-hop
gateway in the attacker’s PC MAC address

Unneeded services such as TFTP service on a UCM server that is not acting as a TFTP
Disabling Unneeded Services
server should be disabled to close any potential security holes that might exist in a system.

108
Pan African International Conference on Information Science, Computing and Telecommunications (2013)

Figure 3 Summaries of Threat Taxonomy.

REFERENCES

[1] A. D. Keromytis, "A Comprehensive Survey of Voice [10] J. Hong, "The state of phishing attacks,"
over IP Security Research," Communications Communications of the ACM, vol. 55, pp. 74-81,
Surveys & Tutorials, IEEE, vol. 14, pp. 514-537, 2012.
2012. [11] D. Endler and M. Collier, Hacking Exposed VoIP:
[2] D. R. Kuhn, et al., "Security considerations for voice Tata McGraw-Hill Education, 2007.
over IP systems," NIST special publication, pp. [12] H. Abdelnur, et al., "Assessing the security of VoIP
800-58, 2005. Services," in Integrated Network Management,
[3] K. B. Otterstedt, "Risk analysis on VoIP systems," MSc 2007. IM'07. 10th IFIP/IEEE International
thesis, University of Iceland, 2011. Symposium on, 2007, pp. 373-382.
[4] Digital subscriber line. Available: [13] M. Watkins and K. Wallace, "CCNA Security
http://en.wikipedia.org/wiki/Digital_subscriber_lin Official Exam Certification Guide (Exam 640-
e 553)," 2008.
[5] O. Eng, "Unclassified DSTI/ICCP/TISP(97)3/FINAL," [14] T. J. Walsh and D. R. Kuhn, "Challenges in securing
1998. voice over IP," Security & Privacy, IEEE, vol. 3,
[6] S. Niccolini, et al., "IP Telephony Cookbook," ed: pp. 44-49, 2005.
TERENA, 2004. [15] I. Dacosta, et al., "Security Analysis of an IP Phone:
[7] P. Rowe, "VOIP-extra threats in the converged Cisco 7960G," in Principles, Systems and
environment," Network security, 2005. Applications of IP Telecommunications. Services
[8] P. Hunter, "VOIP the latest security concern: DoS attack and Security for Next Generation Networks. vol.
the greatest threat," Network security, vol. 2002, 5310, H. Schulzrinne, et al., Eds., ed: Springer
pp. 5-7, 2002. Berlin Heidelberg, 2008, pp. 236-255.
[9] E. Edelson, "Voice over IP: security pitfalls," Network
security, vol. 2005, pp. 4-7, 2005.

109

Вам также может понравиться