Thilo Ewald
Thilo Ewald
Thilo Ewald
joint work of
Loria-Inria and NEC Laboratories Europe
VoIP Security
• We are experiencing the migration from circuit switched
(PSTN) to packet switched (VoIP) telephony
– Next Generation Networks (NGN)
• Today’s VoIP is an insecure technology
– Not sufficiently prepared for defense against attacks
– New threat models and attacks
• Security is very important when VoIP gets deployed
massively like in Next Generation Networks (NGN)
• Lack of secure solutions threatens to significantly reduce
VoIP business
• Providing secure solutions is required for continuing
strong growth
– there will not be THE solution
VoIP Security Threats
SIP signaling
Media Stream
Media Stream
Accounting data
• VoIP protocols are vulnerable to attacks Sniffing
PSTN
Internet PCM
RTP-
RTCP
Gateway
VoIP: the need for Event Correlation
SIP phone
PSTN
SIP phone
PSTN
Gateway
200 OK 200 OK
event INVITE-200OK event INVITE-200OK
Single PairWithWindow
Cond = INVITE Window = 2s
BYE ACK
event INVITE-200OK-BYE event broken handshaking
Call-ID,
From + To tags
PairWithWindow SingleWithThreshold
Window = 5s Threshold = 10
RTP
Shellcmd notify.sh Shellcmd notify.sh
“broken handshaking DoS” “broken handshaking DoS”
Call-ID,
From + To tags Rule set to detect broken
Rule set to detect BYE-
handshaking flooding
CANCEL Attack
Diagram of SEC Rule sets
Anomaly detection (using events)
• User behavior, Group of users behavior, Software
behavior, Traffic model
• User behavior :
– Stationary :
– Bin = one hour (different level of aggregation)
– Event = call
– Metric = number of calls, number of different recipients, duration of
a call
– Defining long and short terms
– Long term profile = one month
– Short term profile = one day
– Distance = Euclidean, Quadratic, etc.
– Non stationary :
– Comparing changing of a distribution to detect sudden bursts of
changes= Distribution of calls over callees, shape of the callee list
size over all dialed calls
Implementation
• “tosec” module in OpenSER server acting as a
FIFO queue towards the SEC engine
• Graphical interface
with a round robin
database to update
traffic shape
• Implementing
misuse detection
rule sets
of well known
signatures
Detection of a DoS pitch
Conclusion and Future works
• Holistic security monitoring approach
– VoIP honey pot (supposed to be effective mainly against SPIT,
Vishing)
– Two layers event correlation framework (for misuse detection)
– SEC extensions different from other work in literature
– not only based on the network traffic
– covers a large set of events (log messages, CDRs).
– events can be treated differently based on the priority of the related
agent
– (e.g. : SIP server against phone)
• VoIP IDS / SEC prototype successfully tested in lab
environment
– ready to go to production environment
• Future work:
– Real life tests and performance evaluation
– Investigating network anomaly detection and machine learning
inspired paradigms
– A dynamic threshold adjustment model to resolve the adversary
adaptation and enhance defense against “tester attackers”