You are on page 1of 25

SESSION BORDER CONTROLLER

SIP SECURITY ON VOICE IP


MEMBERS

Mr. Nguyen Tran Xuan Dang


Truong Xuan Quan
Supervisor Participant

Nguyen Nhu Tri Vuong Duy Han

Participant Participant
CONTENT 3

1 Overview

2 Preliminary Solution

3 Expected Results

4 Evaluation Methods

5 Milestone

CMC Telecom
01

OVERVIEW
• Demands
• Benefits
• Drawbacks
OVERVIEW: VOIP 5

• VoIP (Voice over Internet Protocol) is a


technology that allows voice
transmission using the IP network
protocol, based on the existing
infrastructure of the internet.

• VoIP is one of the most interesting


telecommunication technologies today
not only for operators, manufacturers
but also for service users.
CMC Telecom
OVERVIEW: SIP TRUNK 6

• What is SIP protocol ?


• Operating on UDP/TCP Port 5060.
• SIP messages are sent from peer and
redirected to another peer.
• SIP trunk
• Enable one end’s PBX to receive
and send calls via Internet.
• SIP trunk requires a level of
Authentication within it, contains
Registration and Call Initiation.
CMC Telecom
OVERVIEW: SIP SECURITY 7

• What is SBC (Session Border Controller) ?

SIP
SIP SECURITY
SIP Trunk

Analog CAS
BRI
TDM PBX
Phone KTS Phone KTS
Business Lines Business Lines

• A session border controller (SBC) is a network


element deployed to protect SIP based voice over
Internet Protocol (VoIP) networks.

CMC Telecom
OVERVIEW: SIP SECURITY 8

• How does SBC work ?

Calls to High
IP-PBX Toll Fraud
Countries

IP-PBX
SBC
DEMANDS 9

• Why Security is Important with VoIP ?


• $166k lost in a single weekend

• IP network is susceptible to Denial of


Service, eavasdropping and other attacks.

• Fully authenticated and authorized users


must be allowed to use.

• Critical network elements such as voice


application servers must be protected.

CMC Telecom
TYPES OF 10

ATTACKS
 Scanning on the Internet and
• Reconnaissance collecting information of business ‘s
VoIP service.

• Toll Fraud  Hackers cheat $$$ by accessing


your phone system

 A Man-in-middle type attack,


• Eavesdropping hackers listen to VoIP
conversations
CMC Telecom
BENEFITS 11

• SECURITY: Maintain voice services for customers and


employees before, during, and after denial-of-service
attacks

• SIGNIFICANTLY REDUCE losses to fraud and service theft.

• ASSURED RELIABILITY: Always on, always aware,


completely customizable high availability for voice

• SIP ENABLEMENT: Voice-quality monitoring and short


resolution cycles

CMC Telecom
DRAWBACKS/ 12

RISKS
• SBC is not frequently updated

• Maybe not real-time alert

• Have not routinely evaluated to


ensure it can against unknow
threats

• New security system, the


guidelines are limited also
debugging.
CMC Telecom
02

PRELIMINARY
SOLUTION
• Process
• Topology
PROCESS 14

Build PBX Attempt Cyber attacking


Switchboard

01
0
3
02 04

Configure SBC Debugging and Fixing


Security

CMC Telecom
TOPOLOGY 15

• IP-PBX with SBC Firewall

CMC Telecom
TOPOLOGY 16

• Remote IP-Phone Security with SBC

CMC Telecom
TOPOLOGY 17

• SIP Trunk with SBC

CMC Telecom
03
EXPECTED
RESULTS
EXPECTED RESULTS 19

SIP Trunking
Security
Cloud Phone
Remote Systems
Workers

CMC Telecom
04

EVALUATION
METHODS
EVALUATION METHODS 21

EVALUATION METHODS RESULT


• Prevent attacks
Efficiency •Protect internal network
• Monitor the traffic
Level of complexity ★★★☆☆

Accuracy • Prevent the risk effectively up to 80%

CMC Telecom
05

MILESTONE
MILESTONE 23

CMC Telecom
MILESTONE 24

CMC Telecom
Th an k Yo u Fo r
Li sten in g

You might also like