You are on page 1of 7

International Journal of Recent Advancement in Engineering & Research

Volume 2, Issue 8 August -2016

Surveying Attacks on Communication over Internet


Dipti Patel
Student,MCA,Bhavnagar University

Abstract- VoIP is a correspondence convention which is by and large broadly utilized and voice
brings are transmitted over an IP system, for example, web rather than Public Switched Telephone
Networks (PSTN).
VoIP changes over voice into computerized signal that goes over the web and the sound yield gadget
makes the advanced to sound discussion at the collector side. In today's opportunity individuals are
utilizing these advancements as a part of their day by day life, for correspondence over the web
however they don't know with the security issues on VoIP discussion. There are diverse sorts of
security issues with VoIP discussion. The fundamental spotlight on this paper is to present distinctive
security assaults and safeguard approaches for security assaults on VoIP discussion.
Keywords: VoIP, Security Attacks, Defence Approaches.
I. INTRODUCTION
Voice over web tradition (VoIP) is coordinating of voice discourse over the web or IP based
framework. The flood of voice data over the web in the VoIP system firstly human voice must be
changed over into digitized structure. By then it is compacted to extra information exchange limit
and on the other hand encryption can similarly be used to shield the examination from sniffing. By
then the voice tests are installed into data bundles to be done over the IP frameworks. Progressing
Transport Protocol which describes the regulated package plan for passing on the sound or video
over the web, RTP group have header field to hold the data and it is relied upon to precisely reaccumulate pack into voice signal on the other end[5]. By then voice package passed on by UDP
tradition as a result of its low overhead. In the blink of an eye at the other side, the system is pivoted.
Packages are disassembled and put into honest to goodness solicitation and data are removed from
the groups and uncompressed it and changed over into mechanized to straightforward.

Figure 1: Voice data processing in VoIP network

II.
VOIP PROTOCOLS &STANDARDS
VoIP has been implemented in various ways using both protocols and standards.

14

International Journal of Recent Advancement in Engineering & Research


Volume 2, Issue 8 August -2016

2.1 H.323
H.323 is a proposal from ITU Telecommunication Standardization Sector (ITU-T) in 1996 that
characterizes the Protocol to give varying media transmission over the web. It is both dependable and
questionable correspondence, both sort of correspondence give by the system. H. 323 utilizing the
standard for security. H. 235 standard of H. 323 to give security, addresses the security issues
including verification, uprightness and protection and so on. It additionally utilizes the safe
attachment Layer for transport-layer security [8][2].
2.2 Session Initiation Protocol (SIP)
The SIP is an Internet Engineering Task Force (IETF). It is an Applicationlayer convention and
flagging Protocol which sets up, changes and ends the sessions. It is keep running on Transport
Layer Protocol (TCP), User Datagram Protocol
(UDP), or Stream Control Transmission Protocol. It is Text-based convention, including a few
components of Hypertext exchange Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP).
For security SIP utilizing the two systems: end to-end and bounce to-jump. In end-to-end assurance,
HTTP gives the authentication[8][3].
2.3 Media Gateway Control Protocol (MGCP)
The Media Gateway control Protocol is "an Internet Engineering Task Force" and it is a flagging and
calls control convention utilized by VoIP systems[8]. 2.4 Real-time Transport convention (RTP) The
Real-time Protocol characterizes an institutionalize bundle position for conveying sound and video
over the web. RTP is indicated by IETF. RTP is intended for endto-end, continuous, exchange of
information. RTP determined two sub conventions is Data exchange convention, RTP, which
manages the exchange of continuous information and RTP Control
Convention (RTCP) used to screen data in an on-going gathering. It is utilized to give the criticism
on nature of administrations (QoS) being given by the RTP. 2.5 Session Description Protocol (SIP)
SDP planned for portraying sight and sound sessions with the end goal of session declaration and
different types of mixed media start. While starting sight and sound video conferencing, VoIP calls
or other session. There is a necessity of media points of interest, transport addresses and other
session depiction to the members. SDP gives the session portrayal of the members, how that data is
transported.
2.6 Jingle XMPP
It is an augmentation of Extensible Messaging and nearness convention (XMPP) which adds to peer
- to-associate session control for VoIP and video conferencing correspondence. It is composed by
Google and the XMPP Standards Foundation. XMPP is a correspondences convention for message
arranged middleware in view of XML (Extensible Markup Language).
III. SECURITY ATTACKS AND DEFENSE APPROACHES
In beginning of VoIP, there was no enormous worry about security issues identified with it.
Individuals were generally worried with its expense and usefulness however now days VoIP is
turning into a one of standard correspondence advancements, security turn into a noteworthy issue.
Aggressors focus on the VoIP application. In this segment we exhibit the investigation of assaults on
VoIP discussion and we likewise talk about methodologies that have been received to counter the
assaults. 3.1 Denial of Services (DoS) DoS assault is positioned first in the main five VoIP security
dangers of 2008 (Higdon, 2008). Foreswearing of administrations (DoS) assault is an assault on a
15

International Journal of Recent Advancement in Engineering & Research


Volume 2, Issue 8 August -2016

system or gadget precluding it from securing an administration or network. It should be possible by


devouring its data transfer capacity or over-burdening
over burdening the system. DoS assault is endeavor to make a
machine or system asset distracted to its studied clients. In VoIP DoS assault did by the flooding.
This causes calls to drop rashly and ends the
the call. Once the objective is prevented from claiming the
administration, assailant can get remote control of regulatory offices of the framework. There are
distinctive sorts of DoS assault. A VoIP association is set up utilizing two conventions, a flaggi
flagging
convention and media convention. Another kind of assault is passage assault, where a door goes
about as a switch between various systems.
3.1.1 VoIP Signalling DoS attack
The aggressor can attacks on hailing tradition to conducts a Denial of Services strike. In the essential
kind of attack the attacker sends the various "welcome" requesting to skip. Meanwhile Alice also
sends the "appreciated" sales to weave, however influence can't take request from Alice. In this kind
of DoS strike does not have samee LAN need, simply needs of immeasurable volume of requesting to
surge the victim[4][7].

Figure 2(a): Start signal DoS

In the second case, the attacker use cancellation to cancel all pending call set up signals by sending a
CANCEL, GOOD- BYE or PORT U
UNREQUACHABLE

Figure 2(c) Teardown signal DoS

message. The aggressor needs to disturb the telephone calls by sending the pernicious hang
hang-up
messages to the beneficiary as though they same from the guest. In the fig 2. (b) it demonstrates an
illustration
n where caricature CANCEL message by the aggressor to avert call setup. In Fig (c) where
GOODBYE message is parodied by the aggressor to forestall call setup or tear down the build up

16

International Journal of Recent Advancement in Engineering & Research


Volume 2, Issue 8 August -2016

associations. In this sort of assault requires the aggressor to have the capacity to fill certain header of
the right message. The assailant can assemble the system information
information.
3.1.2 VoIP Media DoS attack
In this sort of assault, the aggressors can surge the entryway, IP telephone and other media VoIP
parts with vast quantities
ties of RTP packets.[4][3] It is a typical and well known approach to refuse any
assistance to clients is to surge a system with activity. At the point when data transfer capacity is
overwhelmed, this can likewise upset VoIP administrations. Since there is insufficient

Figure 2(b) Teardown signal DoS bandwidth or resources left for the normal users of the services.
Furthermore the attacker might knock key components like gateway offline.

Figure 3 Media data DoS [2]

IV.

SOLUTION FOR DoS ATTACK:

Monitoring & Firewalls


Channel the undesirable action. Keep up the summary of unauthenticated and suspicious customers
and deny those customers from working up sessions. Regardless, isolating actuates the time put off
that diminishes nature of organizations.
organizations. VoIP uses an Internet affiliation and no 'physical wire' is
required, it doesn't have the same security as telephone lines. Square endeavor and aggravation don't
ought to be physical to achieve hurt, and these strikes can start from wherever on the fra
framework.
That is the reason VoIP firewalls are basic. They give the same level of protection for VoIP
development as ordinary firewalls fulfill for applications and data traffic[4][7].

17

International Journal of Recent Advancement in Engineering & Research


Volume 2, Issue 8 August -2016

Figure 4: Generic CELP encoder


Authentication
The course of action is to plan affirmation on VoIP application. To affirm the identity of a customer
before sending his/her messages. Approval may require two bestowing VoIP contraptions to affirm
each other before the genuine correspondence starts. This regular confirmation might be established
on a common riddle that is known going before the correspondence making it troublesome if not
incredible for an attacker to mask identities[1][5].
Stateless proxy
To reduce the risk of memory exhaustion attacks (DoS) thus can be used to perform other
security checks such as authenticating users, registering third party, and filtering spam sources.
3.2 Eavesdropping
While a large portion of the general population know about the way that discussion might be listen in
over the Public Switched Telephone system. Clients once in a while imagine that somebody could
listen to their VoIP calls. Through spying outsider can acquire names, passwords and telephone
number, permit them to pick up control over phone message. Phrase Spotting strategy used to listen
stealthily on VoIP discussion. In
Phrase Spotting Technique as opposed to listening stealthily
on
entire
discussion
theattacker essentially needs to discover amid the discussion if a particular
phrase or
word articulated. What
makes the assault conceivable is the CodeExcited Linear
Prediction (CELP) [6] method utilized by the voice CODEC's. Most basic CODEC's depend
on method called CELP. In this
technique,
CELP CODEC's utilization the codebooks for
mapping the every discourse test to the
particular codebook section which is nearest to the first
discourse design then the code book passage are put in the encoded VoIP parcel and bundles are to
be sent over the system.

18

International Journal of Recent Advancement in Engineering & Research


Volume 2, Issue 8 August -2016

Solution for Eavesdropping Attacks [5][4]


Long (2002) recommends four strategies to prevent eavesdropping [5]:

Employing flawless hardware.

Ensuring that access to wiring closets is restricted to authorize personnel only.

Implementing port-based
based MAC address security on any vulnerable network point; for
example, on reception courtesy phone.

Initiating a procedure to regularly scan the network for devices running in promiscuous
mode.
3.2.1 CBR CODEC's
Using CBR CODEC's is defence approach against Phrase spotting attack. Constant Bit Rate
encoding means that the rate at which a codec's output data should be consumed is constant or fixed
size packets. If payload is encrypted then the correlation
correlation between speech and correspondence bit is
completely destroyed and making this attack inapplicable.
3.2.2 VBR CODEC's
Variable Bit Rate is another defence approach against the attack. This achieved by
continuously changing the bit rate during the encoding process on the nature of audio. But this is not
completely eliminate the eavesdropping attack
3.2.3 Padding to a fixed length
This is the technique which completely eliminates the possibility of eavesdropping on a
encrypted VoIP conversation.
nversation. That is padding the each and every packet to a constant length.
3.2.4 Apply Encryption Selectively
Encryption is necessary to defeat eavesdropping attack. Many different algorithm can be used
such as DES, 3DES, AES, RC4 and RC5. Transport
Transport layer security and IP sec are main encryption
methods.
3.3 Packet Spoofing & Masquerading VoIP can likewise be acknowledged as a disguising assault
in VoIP systems. Disguising is sort of assault where the aggressor claims to be approved client of the
framework to access it or to increase more noteworthy advantaged than they are approved for. A
disguising might be endeavored using stolen logon IDs and passwords, through discovering security
crevices in projects, or through by passing the verificati
verification
on system. Disguising assaults can be utilized
to confer misrepresentation, unapproved access to touchy data and even administration disturbance.
Maybe the most pessimistic scenario is that the assailants imagines or assumes control over
somebody's character
er in the administration.

19

International Journal of Recent Advancement in Engineering & Research


Volume 2, Issue 8 August -2016

Figure 5: Masquerading attack

An effective authentication module combined with encryption would be an effective solution to


Masquerading and spoofing attacks. Only authorized user can access the system.
3.4 VoIP Spam and Phishing
Before VoIP got to be famous, phishing assaults were made through spam email messages. Vishing
is another word for VoIP Phishing which includes a gathering calling you faking a dependable
association (e.g. your bank) and asking for private and regularly basic data. Phishing is an assault
against information protection whereby the casualty himself gives out his own information, in the
wake of gnawing the trap. Phishing is a kind of assault that is picking up prominence now days, and
is a less demanding path for information hoodlums to get what they need. Phishing works this way:
an information hoodlum sends you an email message or a phone message making it appear as though
it is an official message from an organization you have money related or different premiums with,
similar to your bank, PayPal, eBay and so forth. In the message, you are educated around an issue
which places you in caution and are asked for to go to a site or telephone a number where you need
to give your own information like Mastercard number, passwords and so forth.

V.
CONCLUSION
The paper plots security issues and protection approaches for security assault. VoIP need to manage
the security issue. Once the calls are commandeered, It is less demanding to eardrop the discussion
and change it significantly Proper encryption is important to secure the secrecy. Assailant can
likewise dispatch the disavowal of administrations assaults by sending expansive quantities of
parody bundles for call setup. They can likewise send substantial number of RTP bundles. The
relocation methodology is to send firewalls and IPS framework. VoIP particular Firewalls ought to
be conveyed in voice system to keep the pernicious information activity. VoIP security would be
impeding to open's trust in the innovation. Resistance in Depth is a key of shielding VoIP
REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.

9.

V.Srihari, P.Kalpana, and R.Anitha, Security Aspects of SIP based VoIP Networks: A Survey ( IEEE), 2014
Ram Dantu, Sonia Fahmy, henning
Schulzrinne and Joao Cangussu, Issues and challenges in securing VoIP, (ELSEVIER), 2009.
Amor Lazzez, VoIP Technology: Security Issues Analysis,(IJETTCS), August 2013
Santi
Phithakkitnukoon,
Ram Dantu,
and
Enkh-Amgalan Baatarjav, VoIP security-attack
and solutions, Information Security Journal: A Global Perspective, pp. 114-123, 2008.
Vaisly prokopov, and Oleksii Chykov, Eavesdropping on encrypted VoIP conversation: phrase spotting attack and
defense approaches, 2011.
Shankar R, Karthikeyan E. A VOIP security assessment using verifiable secret sharing. Indian Journal of
Engineering, 2015, 12(30), 326-334
M. Gruber, F. Fankhauser, S. Taber, C. Schanes, and T. Grechenig, Security Status of VoIP Based on the
Observation of Real-World Attacks on a Honeynet, in The Third IEEE International Conference on Information
Privacy, Security, Risk and Trust (PASSAT), 2011, pp. 1041 1047.
Jianqiang Xin, Security Issues and Countermeasure for VoIP, SANS Institute, 2007.(report style)

20

You might also like