VoIP Survey - Spam over Internet Telephony (SPIT)

Post on 21-Apr-2017

27 views 0 download

Transcript of VoIP Survey - Spam over Internet Telephony (SPIT)

Computer Networks Research TrendsAhmed Fawzy Gad

ahmed.fawzy@ci.menofia.edu.eg

MenoufiaUniversityFaculty of computers and information

جامعة المنوفية

Research Trends

•Software-Defined Networking (SDN)

•Data Security

•Virtualization

• Internet of Things (IoT)

•Datacenter Networking

•Wireless Sensor Networks

•VoIP

VoIP Survey Papers

• Keromytis, Angelos D. "A survey of Voice over IP security research." Information Systems Security. Springer Berlin Heidelberg, 2009. 1-17.

• Keromytis, Angelos D. "A comprehensive survey of voice over IP security research." Communications Surveys & Tutorials, IEEE 4.2 (2012): 514-537.

• Srihari, V., P. Kalpana, and R. Anitha. "Security aspects of SIP based VoIP networks: A survey." Current Trends in Engineering and Technology (ICCTET), 2014 2nd International Conference on. IEEE, 2014.

Objectives

Objectives

VoIP Networks

Objectives

VoIP NetworksVoIP Security Threats

Objectives

VoIP NetworksVoIP Security ThreatsVoIP Research

Voice Networks

•Public Switched Telephone Networks (PSTN)

•IP Network

PSTN Networks

PSTN Networks

PSTN Networks

PSTN Networks

PSTN Networks

PSTN Networks

PSTN Networks

IP Networks

IP Networks

IP Networks

IP Networks

IP Networks

IP Networks

IP Networks

IP Networks

IP Network + PSTN

Merging IP Network &Voice

Merging IP Network &Voice

Device

Merging IP Network &Voice

Device Protocol

Merging IP Network &Voice

Device ProtocolUser Agents

Registration Server

Proxy Server

Redirect Server

AD/DA Converters

Merging IP Network &Voice

Device ProtocolUser Agents

Registration Server

Proxy Server

Redirect Server

AD/DA Converters

UDP

SIPRTP

RTCP

IP

SDPRSVPSAP

SIPSignaling protocol

Application Layer Protocol

Text-based Like HTTP

SIP Scenario

SIP Vulnerabilities:Flooding/DoS attack

SPam over IP Telephony (SPIT)

SPam over IP Telephony (SPIT)

SPam over IP Telephony (SPIT)

SPam over IP Telephony (SPIT)

SPam over IP Telephony (SPIT)

Man-In-The MiddleBilling Fraud

Registration Hijacking

SPITSPam over Internet Telephony

SPIT is Spam

Email

Voice

SPIT is Spam

Detection Complexity

User Interaction

User Interruption

Email Voice

Detection Complexity

Email Voice

Spam Detector

Detection Complexity

Email Voice

Spam Detector

Spam Solutions

Spam Detector

Level 1Level 2Level 3

Level N

.

.

.

SPIT Solutions

SPIT Solutions

Caller

SPIT Solutions

Caller

Spam

SPIT Solutions

Details

Caller

Spam

SPIT Solutions

Accept / Reject

Details

Caller

Spam

SPIT Solutions

Accept / Reject

Details

Caller

Spam

Spam Detector

Spam Detection Data

Signaling

Media Content

Signaling Example

Car

rie

r G

rad

e V

oic

e O

ver

IP

Signaling Example

Car

rie

r G

rad

e V

oic

e O

ver

IP

SPIT: Signaling

SPIT: Signaling

Caller

SPIT: Signaling

Caller

Spam

SPIT: Signaling

Caller Details

Caller

Spam

SPIT: Signaling

Accept / Reject

Caller Details

Caller

Spam

SPIT: Signaling

Accept / Reject

Caller Details

Caller

Spam

Spam Detector

SPIT: Signaling

Accept / Reject

Caller Details

Caller

Spam

Spam Detector

Data

SPIT: Signaling

Accept / Reject

Caller Details

Caller

Spam

Spam Detector

Data

Callee

Signaling Example

Car

rie

r G

rad

e V

oic

e O

ver

IP

Signaling Example

Car

rie

r G

rad

e V

oic

e O

ver

IP

Signaling Example

Car

rie

r G

rad

e V

oic

e O

ver

IP

Signaling Example

Car

rie

r G

rad

e V

oic

e O

ver

IP

Signaling Example

Car

rie

r G

rad

e V

oic

e O

ver

IP

Spam Detection Using SignalingResearch• Geneiatakis, Dimitris, Nikos Vrakas, and Costas

Lambrinoudakis. "Utilizing bloom filters for detecting flooding attacks against SIP based services." computers & security 28.7 Elsevier (2009): 578-591.

• Quittek, Juergen, Saverio Niccolini, Sandra Tartarelli, and Roman Schlegel. "On spam over internet telephony (SPIT) prevention." Communications Magazine, IEEE 46, no. 8 (2008): 80-86.

SPIT: Media

SPIT: Media

Caller

SPIT: Media

Caller

Spam

SPIT: Media

Caller

Spam

Call Data

SPIT: Media

Caller

Spam

Call Data

Processing

SPIT: Media

Caller

Spam

Spam Detector

Call Data

Processing

SPIT: Media

Caller

Spam

Spam Detector

Call Data

Callee

Processing

SPIT: Media

SPIT: Media

Caller

SPIT: Media

Caller

Spam

SPIT: Media

Caller

Spam

External Data

SPIT: Media

Caller

Spam

External Data

Processing

SPIT: Media

Caller

Spam

Spam Detector

External Data

Processing

SPIT: Media

Caller

Spam

Spam Detector

External Data

ProcessingAccept / Reject

SPIT: Media

SPIT: Media

Caller

SPIT: Media

Caller

Spam

SPIT: Media

Caller

Spam

External Data

SPIT: Media

Caller

Spam

External Data

Processing

SPIT: Media

Caller

Spam

Spam Detector

External Data

Processing

SPIT: Media

Caller

Spam

Spam Detector

External Data

Processing Accept / Reject

SPIT: Media

Caller

Spam

Spam Detector

External Data

Processing Accept / Reject

SPIT: Media

Caller

Spam

Spam Detector

External Data

Processing Accept / Reject

Call Data

SPIT: Media

Caller

Spam

Spam Detector

External Data

Processing Accept / Reject

Call Data

SPIT: Media

Caller

Spam

Spam Detector

External Data

Processing Accept / Reject

Call Data

SPIT: Media

Caller

Spam

Spam Detector

External Data

Callee

Processing Accept / Reject

Call Data

Spam Detection Using MediaResearch• Sengar, Hemant, Xinyuan Wang, and Arthur Nichols. "Call

Behavioral analysis to Thwart SPIT attacks on VoIP networks." Security and Privacy in Communication Networks. SpringerBerlin Heidelberg, 2011. 501-510.

• Quittek, Jürgen, et al. "Detecting SPIT calls by checking human communication patterns." Communications, 2007. ICC'07. IEEE International Conference on. IEEE, 2007.

Which solution to use?

Metric Signaling Media

1 Early Detection

2 Fast

3 Accuracy