VoIP (Voice Over IP) Security
From Computing and Software Wiki
Line 45: | Line 45: | ||
| | | | ||
* Voice connectivity between IP network and public carrier network | * Voice connectivity between IP network and public carrier network | ||
+ | * Can be taken over by hackers to make free calls | ||
|} | |} | ||
<br style="clear:both;"/> | <br style="clear:both;"/> | ||
Line 53: | Line 54: | ||
===Eavesdropping=== | ===Eavesdropping=== | ||
+ | Eavesdropping on VoIP calls involves third parties monitoring the call signal packets in which the hacker may learn of confidential information such as name, passwords, and other personal information. This is especially significant to businesses as corporate sensitive information may be revealed. | ||
+ | VoIP eavesdropping is easier accomplished that eavesdropping the traditional telephone line through physical wiretap since the hacker must physically place the wiretap. Since VoIP calls send data across the network, the hacker can sniff for packets anywhere along the network. | ||
+ | |||
+ | ====Data Encryption==== | ||
+ | The most effective countermeasure to eavesdropping is data encryption. As seen in class, there are many data encryption methods, some more effective than others. However, all methods introduce overhead which can greatly effect the quality of the conversation by causing large packet loss and packet jitter. Here are some common data encryption methods: | ||
+ | |||
+ | * Data Encryption Standard(DES) [[Wikipedia:Data Encryption Standard|Data Encryption Standard]] | ||
+ | * | ||
===Theft of Services=== | ===Theft of Services=== | ||
Line 73: | Line 82: | ||
==External Links== | ==External Links== | ||
+ | |||
+ | --[[User:Chenc8|Chenc8]] 13:29, 13 April 2008 (EDT) |
Revision as of 17:29, 13 April 2008
VoIP (Voice over Internet Protocol) is a protocol used for the transmission of voice data across the Internet. IP telephony treats voice as another form of data that is compressed and optimized for network traffic and is vulnerable to attacks traditional data would be on the network. VoIP security is akin to network security; voice data traveling the network will look like any other normal data.
Corporations generally place VoIP concerns on the voice quality, latency, and quality of service above the overall security when VoIP telephony is actually more vulnerable to certain attacks compared to the traditional phone system. The most common threats found in the VoIP environment include eavesdropping, theft of services, and denial of service attacks. Has VoIP come far enough so that the benefits outweigh the costs to justify its use?
Contents |
Introduction
To greater understand VoIP security, a general overview of VoIP systems is useful.
Components
A typical VoIP system includes four components:
Component | Description |
---|---|
Data Network |
|
IP Handset |
|
Call Server |
|
Gateway |
|
Attacks
There are three main types of attacks that the VoIP environment are susceptible to including eavesdropping, theft of services, and denial of service attacks.
Eavesdropping
Eavesdropping on VoIP calls involves third parties monitoring the call signal packets in which the hacker may learn of confidential information such as name, passwords, and other personal information. This is especially significant to businesses as corporate sensitive information may be revealed.
VoIP eavesdropping is easier accomplished that eavesdropping the traditional telephone line through physical wiretap since the hacker must physically place the wiretap. Since VoIP calls send data across the network, the hacker can sniff for packets anywhere along the network.
Data Encryption
The most effective countermeasure to eavesdropping is data encryption. As seen in class, there are many data encryption methods, some more effective than others. However, all methods introduce overhead which can greatly effect the quality of the conversation by causing large packet loss and packet jitter. Here are some common data encryption methods:
- Data Encryption Standard(DES) Data Encryption Standard
Theft of Services
Denial of Services
Recommendations
Although a network cannot be completely immune to attack, here are some recommendations to secure your VoIP network.
- Do not user shared media devices (ie hubs) on networks
- All VoIP traffic should be encrypted
- VoIP servers with confidential information should be treated as a confidential database
- Build redundancy into VoIP network.
- Make sure firewall is VoIP aware
References
See Also
External Links
--Chenc8 13:29, 13 April 2008 (EDT)