20-04-2013, 02:54 PM
A Seminar on VOIP (voice on internet protocol)Security Threats in VOIP
VOIP.ppt (Size: 371 KB / Downloads: 27)
Introduction
VoIP technology is constantly gaining momentum on broadband networks, packetizing phone calls through the same routes used by network and internet traffic.
IP Telephony
IP telephony is a technology in which IP networks are being used as the medium to transmit voice traffic.
Voice over IP (VoIP) – describes an IP telephony deployment where the IP network used as the medium to transmit voice traffic is a managed IP network.
Voice on the Net (VON)--describes an IP telephony deployment where the IP network used as the medium to transmit voice traffic is the Internet.
VoIP Phone
VoIP requires broadband internet access (cable or DSL) and regular house phones which plug into an analog telephone adapter (ATA) provided by the company or purchased from a third party.
Alternatively, VoIP can run on software based phones, which require use of a computer to make and receive calls.
Signaling protocols
Locating a user – the ability to locate the called party.
Session establishment – the ability to determine the availability of the called party as well as its willingness to participate in a call. The called party is able to accept a call, reject a call, or redirect the call to another location or service.
Identifying IP Address of the Phone
In a VoIP environment, a threat agent can decipher the IP address of a phone simply by calling that number or extension and sniffing the packets that it receives.
MAC Address Spoofing
Media Access Control (MAC) address spoofing involve the SIP protocol itself. In this type of attack, spoofing is employed to impersonate a SIP proxy server. User agent requests can then be intercepted and modified to do any number of malicious things.
Conclusion
In conclusion, none of the security tools evaluated were significantly effective for mitigating security risks in SIP-based VoIP networks. Almost all tools today are still under heavy development and will no doubt evolve as VoIP adoption increases. However, before VoIP security methods mature, significant attacks may pose some threats to confidence in the technology.