Skip to:Content
|
Bottom
Cover image for Understanding Voice over IP security
Title:
Understanding Voice over IP security
Personal Author:
Publication Information:
Boston, MA : Artech House, 2006
ISBN:
9781596930506
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010106357 TK5105.8865 J63 2006 Open Access Book Book
Searching...
Searching...
30000010183376 TK5105.8865 J63 2006 Open Access Book Book
Searching...
Searching...
30000010128469 TK5105.8865 J63 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

The authors introduce the basics of security as they apply to Internet communication in general, and VoIP specifically, considering VoIP security from architectural, design and high-level deployment points of view. This book should enable an engineer or manager to appreciate the issues associated with VoIP.


Author Notes

Alan B. Johnston holds a B.E.(Hons) in electrical and electronic engineering from the University of Melbourne, Australia and a Ph.D. in electrical engineering from Lehigh University.

Johnston is an advisory engineer at WorldCom and an adjunct at Washington University.

050


Table of Contents

Forewordp. xiii
Acknowledgmentsp. xvii
1 Introductionp. 1
1.1 VoIP: A Green Field for Attackersp. 2
1.2 Why VoIP Security Is Importantp. 3
1.3 The Audience for This Bookp. 4
1.4 Organizationp. 4
2 Basic Security Concepts: Cryptographyp. 7
2.1 Introductionp. 7
2.2 Cryptography Fundamentalsp. 7
2.2.1 Secret Key (Symmetric) Cryptographyp. 10
2.2.2 Asymmetric (Public Key) Cryptographyp. 12
2.2.3 Integrity Protectionp. 13
2.2.4 Authenticated and Secure Key Exchangep. 17
2.3 Digital Certificates and Public Key Infrastructuresp. 20
2.3.1 Certificate Assertionsp. 22
2.3.2 Certificate Authoritiesp. 24
Referencesp. 27
3 VoIP Systemsp. 29
3.1 Introductionp. 29
3.1.2 VoIP Architecturesp. 29
3.2 Componentsp. 31
3.3 Protocolsp. 32
3.3.1 Session Initiation Protocolp. 32
3.3.2 Session Description Protocolp. 39
3.3.3 H.323p. 42
3.3.4 Media Gateway Control Protocolsp. 44
3.3.5 Real Time Transport Protocolp. 46
3.3.6 Proprietary Protocolsp. 46
3.4 Security Analysis of SIPp. 48
Referencesp. 49
4 Internet Threats and Attacksp. 51
4.1 Introductionp. 51
4.2 Attack Typesp. 51
4.2.1 Denial of Service (DoS)p. 51
4.2.2 Man-in-the-Middlep. 56
4.2.3 Replay and Cut-and-Paste Attacksp. 57
4.2.4 Theft of Servicep. 58
4.2.5 Eavesdroppingp. 59
4.2.6 Impersonationp. 60
4.2.7 Poisoning Attacks (DNS and ARP)p. 60
4.2.8 Credential and Identity Theftp. 61
4.2.9 Redirection/Hijackingp. 62
4.2.10 Session Disruptionp. 63
4.3 Attack Methodsp. 64
4.3.1 Port Scansp. 64
4.3.2 Malicious Codep. 65
4.3.3 Buffer Overflowp. 67
4.3.5 Password Theft/Guessingp. 69
4.3.6 Tunnelingp. 69
4.3.7 Bid Downp. 69
4.4 Summaryp. 70
Referencesp. 70
5 Internet Security Architecturesp. 73
5.1 Introductionp. 73
5.1.1 Origins of Internet Security Terminologyp. 73
5.1.2 Castle Building in the Virtual Worldp. 74
5.2 Security Policyp. 75
5.3 Risk, Threat, and Vulnerability Assessmentp. 77
5.4 Implementing Securityp. 79
5.5 Authenticationp. 80
5.6 Authorization (Access Control)p. 82
5.7 Auditingp. 82
5.8 Monitoring and Loggingp. 84
5.9 Policy Enforcement: Perimeter Securityp. 85
5.9.1 Firewallsp. 86
5.9.2 Session Border Controllerp. 90
5.9.3 Firewalls and VoIPp. 92
5.10 Network Address Translationp. 93
5.11 Intrusion Detection and Preventionp. 95
5.12 Honeypots and Honeynetsp. 97
5.13 Conclusionsp. 97
Referencesp. 98
6 Security Protocolsp. 101
6.1 Introductionp. 101
6.2 IP Security (IPSec)p. 103
6.2.1 Internet Key Exchangep. 105
6.3 Transport Layer Security (TLS)p. 107
6.4 Datagram Transport Layer Security (DTLS)p. 111
6.5 Secure Shell (SecSH, SSH)p. 112
6.6 Pretty Good Privacy (PGP)p. 115
6.7 DNS Security (DNSSEC)p. 116
Referencesp. 119
7 General Client and Server Security Principlesp. 121
7.1 Introductionp. 121
7.2 Physical Securityp. 122
7.3 System Securityp. 122
7.3.1 Server Securityp. 122
7.3.2 Client OS Securityp. 124
7.4 LAN Securityp. 126
7.4.1 Policy-Based Network Admissionp. 127
7.4.2 Endpoint Controlp. 128
7.4.3 LAN Segmentation Strategiesp. 129
7.4.4 LAN Segmentation and Defense in Depthp. 130
7.5 Secure Administrationp. 131
7.6 Real-Time Monitoring of VoIP Activityp. 132
7.7 Federation Securityp. 132
7.8 Summaryp. 132
Referencesp. 133
8 Authenticationp. 135
8.1 Introductionp. 135
8.2 Port-Based Network Access Control (IEEE 802.1x)p. 137
8.3 Remote Authentication Dial-In User Servicep. 140
8.4 Conclusionsp. 143
Referencesp. 143
9 Signaling Securityp. 145
9.1 Introductionp. 145
9.2 SIP Signaling Securityp. 146
9.2.1 Basic Authenticationp. 146
9.2.2 Digest Authenticationp. 147
9.2.3 Pretty Good Privacyp. 152
9.2.4 S/MIMEp. 153
9.2.5 Transport Layer Securityp. 155
9.2.6 Secure SIPp. 159
9.3 H.323 Signaling Security with H.235p. 160
Referencesp. 161
10 Media Securityp. 163
10.1 Introductionp. 163
10.2 Secure RTPp. 164
10.3 Media Encryption Keyingp. 168
10.3.1 Preshared Keysp. 168
10.3.2 Public Key Encryptionp. 169
10.3.3 Authenticated Key Management and Exchangep. 170
10.4 Security Descriptions in SDPp. 172
10.5 Multimedia Internet Keying (MIKEY)p. 173
10.5.1 Generation of MIKEY Message by Initiatorp. 177
10.5.2 Responder Processing of a MIKEY Messagep. 183
10.6 Failure and Fallback Scenariosp. 186
10.7 Alternative Key Management Protocol-ZRTPp. 188
10.8 Future Workp. 190
Referencesp. 190
11 Identityp. 193
11.1 Introductionp. 193
11.2 Names, Addresses, Numbers, and Communicationp. 193
11.2.1 E.164 Telephone Numbersp. 194
11.2.2 Internet Namesp. 195
11.3 Namespace Management in SIPp. 196
11.3.1 URI Authenticationp. 196
11.4 Trust Domains for Asserted Identityp. 199
11.5 Interdomain SIP Identityp. 202
11.5.1 SIP Authenticated Identity Body (AIB)p. 203
11.5.2 Enhanced SIP Identityp. 204
11.6 SIP Certificates Servicep. 209
11.7 Other Asserted Identity Methodsp. 217
11.7.1 Secure Assertion Markup Languagep. 217
11.7.2 Open Settlements Protocol and VoIPp. 219
11.7.3 H.323 Identityp. 219
11.7.4 Third Party Identity and Referred-Byp. 219
11.8 Privacyp. 220
Referencesp. 223
12 PSTN Gateway Securityp. 225
12.1 Introductionp. 225
12.2 PSTN Security Modelp. 225
12.3 Gateway Securityp. 227
12.3.1 Gateway Security Architecturep. 228
12.3.2 Gateway Typesp. 229
12.3.3 Gateways and Caller IDp. 230
12.3.4 Caller ID and Privacyp. 231
12.3.5 Gateway Decompositionp. 231
12.3.6 SIP/ISUP Interworkingp. 232
12.4 Telephone Number Mapping in the DNSp. 233
Referencesp. 236
13 Spam and Spitp. 237
13.1 Introductionp. 237
13.2 Is VoIP Spam Inevitable?p. 238
13.3 Technical Approaches to Combat E-Mail Spamp. 240
13.3.1 Filtering Spam Using Identity Informationp. 240
13.3.2 Grey Listingp. 241
13.3.3 Challenge/Response (Sender Verification)p. 242
13.3.4 Distributed Checksum Filtering (DCF)p. 242
13.3.5 Content Filteringp. 243
13.3.6 Summary of Antispam Approachesp. 243
13.4 VoIP and Spitp. 243
13.5 Summaryp. 245
Referencesp. 246
14 Conclusionsp. 247
14.1 Summaryp. 247
14.2 VoIP Is Still Newp. 248
14.3 VoIP Endpoints Are Newp. 248
14.4 VoIP Standards Are Not Completep. 249
14.5 Base VoIP Security on Best Current Security Practices for Datap. 249
14.6 VoIP Is a QoS-Sensitive Data Applicationp. 250
14.7 Merging Public and Private VoIP Services Will Be Problematicp. 250
14.8 Concluding Remarksp. 251
Indexp. 255
Go to:Top of Page