security issues in voip ppt

Security Issues in voice over internet protocol (voip):

VOIP being at a beginning stage, security issues appear to be build in response to its growth. As per the information based on an interview of Frost and Sullivan by analyst Jon Arnold, Denial of service attacks against VoIP in reality is possible. To rectify the threat with Denial of Service, analyst Jon Arnold suggests that a system requires a terminal adaptor node. SPAM affects the SIP code, meaning it makes the language vulnerable to remote coding execution (Jeffrey Albers, Bradley Hahn, Shawn McGann, Rundond Zhu, Seungwoo Park, 2004).

Two primary methods of mitigating attacks that are used by network operators are destination based BGP black hole routing and access control lists (Borderware, 2006). When media pressure security threats are avoided only 1.5% of the organizations trust in the reporting procedures of violation to law enforcement. To allow carriers to detect and mitigate attacks companies come up with relevant packages like Peak flow SP, anti-DDoS software suites etc. (Borderware, 2006).

Interconnections between nodes are supported by an SS7 architecture that boosts the network security. This is the signal controlling system used in the United States and a few other countries in the world (Martinez). As it was mentioned earlier in the report VeriSign is the SS7 (Signaling system 7) authority for Skype. The SS7 architecture consists of something called as the packet switch network; this is a high speed network. This network is connected by 3 types of signaling links which are:

  • Service switching points
  • Signal Transfer Points (STP)
  • Service Control Points (SCP)

There has been a growth in demand for SS7 systems due to the use of data networks to transfer real time voice calls. The best part of the standard SS7 architecture is the free VoIP to VoIP calls (Werbach, K).  Hence SS7 architecture is a mandatory module to be included for signally protection.

First goal to be considered is the high quality calls expected by users in case of wireless security and a voice over wireless LAN deployment (Jacobs, 2006). The two most important functions of relevant VoWLAN security mechanisms are the radio frequency management and load balancing. Aruba networks specialize in these solutions and have a full range over this domain. In the wireless industry, Spectral link, Quote, Chart, Avaya, voice-badge maker Vocera and software designer TeleSym are few big partners to Aruba. Objective of providing security to the VoWLAN lies in the correct MAC addresses authentication and WEP analysis. Due to the codecs and the compression schemes used by Aruba’s partners, Aruba 5000 switch is capable of handling 5000 calls simultaneously. The problems with VoWLAN exist in its basic functionality. VoWLAN needs are much more complex when compared to the data over wireless networks. Providing an interoperability testing for the new IEEE 802.11 is the basic task of Wi-Fi. The new IEEE 802.11 equipment has already boomed on grounds of demand in the market. In order to allow expansion in its present market and the future, it is up to the technical task group in a Wi-Fi project.

Intrusion Detection and Prevention System PPT

Application of IDP (Intrusion detection and prevention) system:

This is the new Intrusion Detection and Prevention System technology which helps in protecting both the application and network layers from existing and future threats. Intrusion detection and prevention system makes in-depth scrutiny of all the packets in communication traffic to identify different types of doubtful activities and lawful threats/risks at both the layers (Anonymous, 2006). This technique helps a lot in recognizing, Back-door detection, Regular expression pattern matching and Attack signatures etc.

When compared to other traditional firewalls that are very prone to false signals, low efficiency, high cost and incapacity to face threats/risks. On the other hand, this system can also be useful to destroy certain risks and certain flag, doubtful items. In addition to these, the IDP system in Juniper networks came out with a new technology to maintain high level of security and control.

Installation of Gateways (Application Level Gateways- ALGs):

Application Level Gateways helps in maintaining the security by putting on and off of the firewall pinholes. These gateways are designed in such a manner to prevent unexpected attacks either on VoIP or other IP network. In addition to the above benefits, these gateways are capable enough to read and interpret messages and then act as appropriate. Because of these facilities, ALGs are used to see the set-up messages to decide between legal and piracy ones (P.67). Normally, these ALGs will be embedded into the security devices like firewalls to upgrade their performance and capacity for applications. With regard to VoIP, H323, SIP, MGCP are some of the protocols.

Implementation of SIP in terms of Authorisation, Authentication and IPSec:

SIP could be understood as a vital part in relation to VoIP in terms of providing call transfer, call set-up, call ID, call transmission, call processing, call waiting, and so many advance features. For the beginners, Hypertext Transfer Protocol (HTTP) and simple Mail TRANSFER Protocol (SMPT) are the two other protocols in use which allows SIP to easily monitor or spoof (Griffith, D.,2004). Now-a-days, network managers are coming across different types of threats such as SPIT, unauthorised call transfers and access to information etc. All the above threats can overcome by strong and valid authentication, authorisation and IPSec.

Download Intrusion Detection and Prevention System PPT

Security Considerations for Voice Over IP Systems

Security Considerations for Voice Over IP Systems: In this world of technology, Voice over Internet Protocol gives rise to different types of risks. First, because of their intricacy and immatureness, Voice Over IP brings a lot of new threats to the active IP networks. Secondly, being a same platform for both voice and data applications, latest risks make the whole network open to new ways. However there are so many measures for the network manager to keep the threats at a minimum level which includes setting-up of different  devices at main interfaces, executing of planned safety requirements on weak Voice Over IP devices, and the initial formulation and enforcement of benchmark actions to bound disclosure of the IP network to attacks. The following are some of the policies and procedures to be applied to maintain security over IP networks:

Maintain current PATCHES levels:

This is the basic level where in insufficient software bits make to network to give exposed to needless risks. These network attacks seem so clever in targeting software to achieve definite aim instead of simply making random trouble. So it is very important to make a prudential approach in viewing and installing patch releases to keep the network applications and the total investment away from risks (Computer society, 2008).

Antivirus system (Installation and its up gradation):

From the VoIP point of view, this anti-virus system helps in protecting the components of voice from those that are very weak to attacks. For example, Juniper Networks Net screen firewalls incorporate anti-virus software in Voice Over IP installation and it’s up gradation along with all other aspects/ elements.

SMBR: A novel NAT traversal mechanism for structured Peer-to-Peer communications

NAT TRANSVERSAL MECHANISM AND ITS SECURITY IMPLEMENTATION:

Previously details of the importance of router usage in infrastructure were provided based on case studies. However by inserting the flow of transport protocols or by translation, other entities called the middle boxes affected the quality of voice packets. IP tunnel, endpoints, markets, proxies, caches, transport relays, etc are widely used to types of middle boxes. (HIP Research group, 2006).This is generally known to public as stumbling blocks to an efficient VoIP communication. The more common terminology for the middle boxes is the VoIP across Network Address Translators,(HIP Research Group,2006) will be discussed next.

Below are certain recommendations made for SMBR: A novel NAT traversal mechanism for structured Peer-to-Peer communications with regards to the security activities that are intrinsic to traversal of NAT mechanisms (HIP Research group, 2006):

To create NAT bindings that are highly sensitive with reference to security actions and opening pinholes in firewalls (i.e., as mentioned earlier regarding firewall rules, allowing packets to traverse).

Using UDP encapsulation to correlate outgoing and incoming signal values reduces complexity of the overall protocol.

NAT extension utility.

END USER AND HOP BY HOP AUTHENTICATION TECHNIQUES:

The report will include a few successful techniques utilized by the end user and hop by hop authentication techniques (Computer Society, 2006).

“Longer IP addresses, 128 bits compared to 32bits: There has been a growth of over 4billion and will continue to grow up to 9billion by 2050, not to include the cross-layered architectural functions which could be sole cause of such increase.

New Support options and data integrity extensions to regulate the traffic flow labeling of packets is a useful option, known as flow labeling capacity. Processing power increases if the headers are simplified. Plug and play automatic configurations are auctioned for a faster VoIP transfer known as a automatic configuration.

The technique that carries information to be processed on each and every node along with a packet traversal path is known as Hop-by-Hop.

voice over internet protocol voip technology

SESSION BORDER PROTCOL AND CARRIER PEERING:

Important security issues for voice over internet protocol voip technology transactions are carrier peering and Session Border Control. Hence before we proceed, it is necessary to clarify the concepts of the above two issues. The ability to interconnect networks is known as the Carrier Peering (Handley, M.1998 p.2). Interconnecting their switching nodes directly is a possibility however found vague and such interconnections do not provide the required control. Hence the utilization of interconnects or peer points to control the traffic. Digital manipulation, parameter interpretation, screening, route prioritization are found to be complex to be processed by Peering. The primary role of peering device is to secure the carrier’s networks and adapt to the specific requirement and protocol changes that are based on the peering point and its location in the network topology. The role is based on SIP protocol which is standard for VoIP communications.

Below are certain factors are a necessity on the functionalities of Carrier peering:

An intrinsic ritual that raises call costs and degrades performance that bundles data into packets according to a specific protocol, causes delay and back to back conversions through a pair of media gateways. Internetworking problems are solved when signals are converted from SIP to H.323 that is widely used in VoIP protocols.

With reference to VoIP and mobile communications, Security Carrier Peering functions as:

Billing: To generate billing records when the service is used to make calls

Routing: when ring tones, announcements are used on a mobile network.

Going to Session Border Controls, commonly also termed as Session Awareness Firewalls, like any security firewall, the device is designed to primarily secure the network. Issues such as Denial of Service and unauthorized interference by illegal users can be eliminated when the SBC performs its functions.  All medium and signaling passes when SBC provides a single or a range of IP addresses. Other functions of SBC are similar to the Carrier Peering, for example- billing and routing devices, traffic flow management.

Sonus and Juniper are 2 such companies that provide the above mentioned services; both these companies are based in California, USA. Session Border Control Solutions is a comprehensive package that includes guarantee in service, hosts NAT traversal mechanism, managed enterprise IP telephony, and most importantly legal formalities.

voip project in java

A known example related to the Skype, security breach can now easily tracked the infrastructure provided (Source: Leyden, J “Say Hello to the Skype Trojan”. published on Oct 18, 2005).

Problem Description: The detection and rectification of the security breach in the windows Skype users have been completed.

Chances of an incorrect file transfers can exist if the Skype URL malfunctions due to break in required parameters, either by the system’s vulnerability or by an attack on the original source code of the web page. This could also occur due to the end user error. Impact on the Skype software before 2.5 can be effective based on the attack that could be fatal. Hence it’s always preferred that the Skype is directly installed from the Skype URL which will help ensuring there are regular updates and monitoring (p.456-498). In case of a windows xp or professional operating system, certification is signed and authenticated by “VeriSign class 3 codes Signing 2009 CA”.

Along with the installation of the software, the end user will also receive a bulletin for security purposes, helps in removing a possible breach. Given below are arrays of base vectors that have a correct reflection, pre-assigned by VeriSign:

Access Vector (AV) Remote
Access Complexity (AC) Low
Authentication(Au) Not Applicable
Confidentiality Impact (C) Partial
Integrity(I) None
Availability Impact(A) None
Impact Bias(B) Confidentiality
   

VOIP Project Report

P2P AND ITS SECURITY IMPLEMENTATIONS IN VOIP NETWORK:

There have been several instances where hackers have been penalized by the law on account of VOIP theft. As per the law, the P2P services have a high ratio. 

There have been instances where organizations have faced theft loss. Security issues in P2P networks have been dominantly significant, and the methodology used to secure these systems will be the focus of the report.

He says that Skype has been the only safest, secure dependable means to deliver P2P VoIP services which functions with a 256 K AES infrastructure.

This is called the public key infrastructure. It is favorable and right to examine the code of signing an authority for the P2P networking client as the report is based on Skype. A market leading authority in protection provision is VeriSign.

A very large number of clients today utilize VeriSign, while the network is indomitable barrier. VeriSign is the monopoly in maintaining the World Wide Web’s root zone file and they process all changes to it, meaning vouching, binding public access to users.

This is performed by carrying out software at a centralized zone, systematizing software at distributed locations.

The public access or keys are then embedded in electronic algorithms that are used to encrypt and decrypt messages transferring from one location to another (Allen, P. 2006).

The end user will be able to electronically make signatures on their messages or emails by using a private key, while the receiver of the email is also given the VeriSign software in order to verify the signature of the original host.

Voice Over Internet Protocol PPT Seminar

VOIP SECURITY ISSUES:

Voice Over Internet Protocol VOIP has no security issues in earlier days. Now that VOIP is gaining void acceptance and becoming one of the main stream communication technologies. Now a day’s security issues have become a major issue. This type of system is called POTS (plain old telephone system).

Identity and Service Theft:

                 Security issues can be solved by using Phreaking (Kind of Hacking) technique. This gathers the information from a service provider. As SIP (Session initiation protocol) encryption technique is not so common that controls the authentication of VOIP. So, the clients trusted data are subjected to theft.

Eavesdropping is a most common technique used by hackers to steal the data. In this technique the intruder acquires phone numbers, names and passwords allowing them to service theft.

Stealing credentials is used to make calls without paying for it and also get business data by using the identity theft.

An intruder can change the packages and plans or make calls using the authenticated users account. The intruder can also access the personal information like voicemails, call forwarding numbers and also can change the user profile.

VOIP Phishing is another technique were a third party person calling you on a fake id (eg: friend) and requesting you for the credentials and often critical information. It is also known as Vishing.

DIFFERENT THREAT IN VOIP:

  • DOS
  • SPIT
  • CALL TAMPERING
  • MAN-IN-THE-MIDDLE ATTACK

Dos:

          Denial of service is an attack on network of systems. It attacks by consuming band width of the network or simply overloading a network.

In VOIP the attacks can be carried out with call signaling messages which degrades the services which ultimately results in premature call drops and halts the call dropping.

Reverse attack can get remote access to the administrative functionalities of a system.

Spit:

          It is also known as spamming over Internet Telephony. Actually spamming means sending mails to people against their will. It is not so common in VOIP yet.

Every account in VOIP has a unique IP address using this spammer’s send their voice mails. As a result voice mails will be blocked. The spams may contain viruses or worms along with them.

Call tampering:

          It is a type of attack where a tampering of phone call progress is involved. Example the quality of a call can be spoiled by injecting noise packets in the communication data stream. Intruder can also delay the delivery of packets.so that communication can become spotty.

Man-in-the-middle attacks:

          In this type of attack the intruder intersect the call signals of SIP messages and masquerades as the calling party to the called party.

Download Voice Over Internet Protocol PPT Seminar

Voice Over Internet Protocol PPT

INTRODUCTION

From the past:

   When the phones were first introduced people needed a physical link between the phones to have a conversation i.e. an interconnection between phones was necessary and also interconnection would be constructed with third party phones which caused congestion in big cities. This process became easier when switching centers were started. The local switching centers were connected to make a multi point network and the size of the network grew enormously it became the Public Switched Telephone Network (PSTN) which we still use where it is become possible for us to make calls from any point of the world to any part of the world.        

MERITS AND DEMERITS OF VOIP TECHNOLOGY:

MERITS

a) Economical: It was mentioned earlier that VoIP to VoIP phone calls are free of cost. Business outsourcing has largely implemented this technology for effective communication with clientele. (VoIP info, 2004)

b) Improved functions and mobility:  Now routing/ connecting international calls to a VoIP phone     is made easy. Also VoIP phones can be used anywhere in the world and there will be no charges such as roaming charges. When the area of operation has network/ internet facilities a messenger can be installed and VoIP calls can be made from any computer from any location. The user has several options while using VoIP such as conference, call forward, auto redialing etc, helps reducing unnecessary work around.

Click Here To Download Voice Over Internet Protocol PPT

Multimedia Application System CSE Seminar Topic

MULTIMEDIA APPLICATION SYSTEM mentions as the method of presentation that is not limited to single medium like animation or text sound which uses two or more media. The software system of interactive multimedia is like a tutor of signal processing of digital audio.

The audio technology refers to presentation of multimedia since it includes sound with text and graphics. Multimedia team and DSP contain in-depth ability in System Integration and Product Design which functions actively on realization of multimedia product.

There are many requirements of customers from different domains such as Automotive electronics, Consumer electronics, Semiconductor, broadcasting, Medical electronics, and Digital media. It provides reusable of Video, Audio, and Speech codecs enhanced on various platforms in application areas with cost effective and time-to-market solutions. The development of end-to-end HW is being provided by video codec solutions

Animation displays images in the sequence of 2-D or 3-D positions of model or artwork to form illusive movement. With the vision persistence phenomenon, animation is a motion of optical illusion demonstrated and created in many methods.

There are many techniques of animation like 2D animation, 3D animation, Paint-on-glass animation, Pinscreen animation, and Sand animation. 2D animation automates versions of techniques of animation like morphing, interpolated rotoscoping, and onion skinning. Animator manipulates digital models in 3D animation.

Conclusion:

It is concluded that digital signal learning environment (DSPLE) is utilized without training like psycho acousticians and composers. A system prototype explores as relationships between graphics, sound, and text in an environment and the feasibility and platform are developed by the available tools.

Download Multimedia Application System CSE Seminar Topic