TEL 500 VOICE COMMUNICATIONS REACTION PAPER 2 SUBMITTED TO: Dr. JOHN MARSH/ RONNY BULL SUBMITTED BY: VAMSI KRISHNA KARNATI 10/03/13 SUMMARY OF MISUSE PATTERNS IN VoIP This paper, Misuse Patterns in VoIP was written by Juan C Pelaez, Eduardo B Fernandez, M M Larrondo Petrie and Christian Wieser. Juan C Pelaez worked for the Researxch Lab of U.S. Army , Eduardo B Fernandez and M.M. Larrondo Petrie worked for Florida Atlantic University. Christian Wieser worked in the Electrical and Info. Eng. Department of University of Oulu. The threats posed to a system should be studied before designing a secure system. To implement the security patterns successfully, the novices of security should be aware about the enemies. The nature of attacks should be understood by the system to defend it from those type of attacks. The authors of this paper have proposed “the attack pattern” to discover the different vulnerabilities present in the VoIP networks. The attack pattern will be described from the attacker’s side. This pattern will describe the types of attacks, ways to prevent the attack and analysing the situation when the attack takes place. The forensic process of VoIP network should be integrated with the misuse patterns. VoIP network consists of many vulnerable parts which can be learned only through the misuse patterns. It will also help in securing the network better. Many threats are posed in the case of the deployment of VoIP network both from internal sources and external domains as well. The main aim of these researchers is to protect the VoIP network from such threats or attacks. A template is used to explain about this kind of pattern which is used for security patterns and architectural patterns. There are certain segments in a VoIP which are not monitored and misuse patterns help in solving a case where the hacker hacks into that segment of the network. By using the template, the misuse patterns help in making sure that all the evidence sources and contexts have been considered. Using a sequence diagram, the authors found out the result of the proposed approach. Objects derived from classes are used in the sequence diagram normally. The messages can be related to the classes of the system. The message contains data. Information related to the attack can be found using the combination of the class diagrams and sequence diagrams. The authors have illustrated the attack pattern in this paper using misuse patterns for theft of service, call interception and DoS. SIP and H.323 are the signalling standards used in VoIP networks. In this paper, the authors have considered the H.323 conditions. SIP attacks are regarded as a different pattern. The different components of H.323 are connected using layer 2 switches. A voice call will be placed on IP network from a PSTN through a gateway. Analog phones and PBX switches are used by the PSTN. The traffic will be filtered using the firewalls and routers which are present in the IP network. The calls will be processed by an IP – PBX server. This helps in setting up the calls and also routing them to other devices. Softphones will be installed on wireless devices or PCs. A flood of messages will be sent to disrupt the VoIP network in the case of a DoS attack. With this disruption of the network, the quality of the messages will degrade eventually which prevents the users from using the network or the service. Denial of Service attack takes place making use of few vulnerabilities. They are listed as follows: Lack of security standards and expertise. The deployment process of VoIP focused more on the functionality part and not on the security part. This implies that strong authentication is absent in the VoIP networks. Because of being analog, VoIP is more prone to this attack. Presence of implementation flaws is possible because of the rush in implementing the VoIP networks and standards. During the communication of the enterprise VoIP with the other parts of a LAN, Internet can play the role of an untrusted network where the interception of packets is easy. Because of the continuous transfer of media by the VoIP network over the IP packets, the traffic of VoIP can act as protection against the DoS attacks. By flooding a VoIP server, DoS attack can be launched. This leads to the non-availability of the voice services and also degradation. This kind of attack can be made against devices/networks accepting signalling like the components of VoIP network, gateways or IP phones. To gain similar results, the attackers will also make use of resource starvation attack or the TCP SYN flood attack. Huge flood of packets will be generated using multiple systems in a distributed denial of service attack. The process used in launching a massive distributed DoS is that the attacker will infect the terminal devices using some malicious software and will later trigger that device. A way to monitor the RTCP transmission and the voice packets is provided by the VoIP call interception. This attack is something similar to tapping a wire in a PSTN. Calls traversing in a network should be intercepted. This attack can be successful because of few vulnerabilities like: Few implementations lack security mechanisms. RTP is an incomplete protocol. Information in the case of RTP is stored on the header of the packet. Softphones are more prone to malicious software and so it is easy for the virus to spread through it. WEP products can be cracked using the software available in public in the case of wireless VoIP. Video and voice packets are more prone to the attacks in the wireless environment. The data present in these packets will be exposed in this case. The potential of call interception will be increased in few instances because packet sniffers are available online which can be downloaded and used. The attacker can record or listen to the conservations which are made in private through VoIP call interception. The content present in the hacked packets can be modified by the attacker by intercepting the packets. In this case, the attacker acts as man in the middle. In this data and signalling are affected as a result of this attack. Access to the data present on the VoIP network can be gained by an attacker by means of the theft of service attack. The attacker imitates the subscriber and makes free calls. To reach the maximum communication load, adequate capacity is required by the VoIP system. This is the case where a user without authorization is trying to make a call which is very expensive and also this attack can be made utilising few vulnerabilities, like: Because of insufficient security mechanisms, this attack takes place by passing malicious software to the terminal devices. Calls can be placed in the name of other user by stealing their user details. Manipulation of billing systems and the usage of phone is possible. There is risk involved in the accessibility and portability of a phone. IP telephone not attended. Spoofing of MAC address is easy. Legitimate users disclose their data used for authentication. Many techniques are used to accomplish this attack. The hacker can place a call using the identification or authorization details of other users. This is done without the consent of the actual user whose identification has been stolen. Placing a rogue IP phone is a complex process. RESOURCES USED: The authors referred to many Conference and IEEE papers to carry out this research efficiently. In this research, the authors basically discussed about three types of attacks of misuse patterns in VoIP. For each attack, they set up a sequential diagram or a class diagram. They quoted a problem and carried out a research and gave a solution to that problem.With this they also mentioned the consequences as well as countermeasures. In each class diagram, they used devices like terminal device, layer 2 switch, gatekeeper, IP-PBX, router, firewall, PBX, PSTN, analog phone, VoIP network and other devices. They placed calls while testing each type of attack and studied the reasons for the attacks and the preventive measures to be taken. REPEATABILITY OF THE RESEARCH: This research can definitely be repeated by a group of SUNYIT students. This will be a practical way of learning how the attacks are caused. It is not difficult to setup the required environment as the authors have performed the labs using real time situation where the resources used are available out in the market. By performing this research, they might come up with new questions which will help them carry forward the research. EXTENDABILITY OF THE RESEARCH: This research can be extended by a group of SUNYIT students by further studying about more attacks which take place in the VoIP network. I am sure that there are more threats other than the mentioned three threats. With the enhancement in technology, different problems and new attacks emerge every day. REACTION/CRITIQUE: This paper was a clear explanation about Denial of Service attack, call interception in VoIP, theft of service in VoIP. More attacks should have been mentioned that take place in the VoIP environment. A more detailed solution for each attack would have been better. The class diagrams helped in better understanding of the attacks.