Slides - Off-Piste Consulting, LLC
Download
Report
Transcript Slides - Off-Piste Consulting, LLC
Secure IP Telephony using
Multi-layered Protection
Brennen Reynolds
Off-Piste Consulting, LLC
(formally of University of California, Davis)
Dipak Ghosal
University of California, Davis
Motivation
What is IP Telephony?
Benefits:
Packetized voice over IP
PSTN access through Media/Signal Gateways (MSG)
Improved network utilization
Next generation services
Growth:
Revenues $1.7 billion in 2001, 6% of international traffic was
over IP, growing [Frost 2002] [Telegeography 2002]
Standardized, deployed protocols (TRIP, SIP, H.323)
Security Is Essential
IP Telephony inherits all properties of the IP
protocol – including security weaknesses
Ensuring the security of a critical service
must be a top priority
Convergence of two global and structurally
different networks introduces new security
weaknesses
Agenda
IP Telephony Enabled Enterprise Networks
IP Telephony Call Setup
Vulnerability Analysis
Detection and Control of Flood-based DoS
Attacks
Preliminary Experimental Results
Future Work
IP Telephony Enabled
Enterprise Network Architecture
Net-to-Net Call Setup
DNS
Server
A request is
sent (SIP
INVITE) to
ESTABLISH a
session
1
SIP IP Phone
DNS Query for
the IP Address
of the SIP Proxy
of the
Destination
2
Domain
The INVITE is
forwarded
The Location Service is
queried to check that the
destination IP address
represents a valid
registered device, and for
its IP Address
4
3
SIP Redirect
Proxy
5
SIP Registrar /
Location Server
The request is forwarded
to the End-Device
SIP Redirect
Proxy
6
Media Transport
Destination device returns
its IP Address to the
originating device and a
media connection is
opened
SIP IP Phone
Vulnerability Analysis
Property oriented approach
Access control to use IP telephony service
Integrity and authenticity of IP telephony
signaling messages
Resource availability and fairness in
providing IP telephony service
Confidentiality and accountability
Access Control
Deny unauthorized users access to IP
telephony service
Central authentication servers
E.g.: RADIUS server
Enable various network elements to query
authentication server
Integrity and Authenticity
of Signaling Messages
Call Based Denial of Service
CANCEL messages, BYE message,
Unavailable responses
Call Redirection
Re-registering with bogus terminal
address, user moved to new address,
redirect to additional proxy
User Impersonation
Payload Encryption
Capture and decoding of voice stream
Can be done in real-time very easily
Capture of DTMF information
Voice mail access code, credit card number,
bank account
Call profiling based on information in
message headers
Resource Fairness
and Availability
Flood based attacks
Network bandwidth between enterprise
and external network
Server resources at control points
SIP Proxy Server
Voice ports in Media/Signaling Gateway
Signaling link between Media/Signaling
Gateway and PSTN
End user
Internet Originated Attack
Enterprise network connection can be flooded
using techniques like SYN flooding
Resources on SIP proxy can be exhausted by
a large flood of incoming calls
End user receives large number of SIP
INVITE requests in a brief period of time
PSTN Originated Attack
Signaling link between M/S gateway and
PSTN STP becomes saturated with messages
Voice ports on the M/S gateway are
completely allocated
Large number of PSTN endpoints attempt to
contact a single individual resulting in a high
volume of INVITE messages
Secure IP Telephony
Architecture
Application Layer
Attack Sensor (ALAS)
Monitors the number of SIP INVITE requests
and the SIP OK (call acceptance) responses
URI level monitor
Aggregate level monitor
Detection Algorithm
Response Algorithm
Proxy or M/S gateway returns temporally busy
messages
Transport Layer
Attack Sensor (TLAS)
Monitors the number of TCP SYN and ACK
packets
Traffic is monitored at an aggregate level
Upon detection of an attack, throttling is
applied by perimeter devices (e.g. firewall)
If attack persists, traceback technologies can be
used to drop malicious traffic at an upstream point
RTP Stream Attack
Sensor (RSAS)
To detect malicious RTP and RTCP streams
Parameters of the RTP streams are known at
connection setup time
Police individual streams
Statistical techniques to determine large flows
Packets corresponding to the malicious
streams are dropped at the firewall
Need cooperation of upstream routers to
mitigate link saturation
Detection Algorithm
for ALAS
Monitoring the volume of connection
attempts vs. volume of complete connection
handshakes can be used to detect an attack
Based on the sequential change point
detection method proposed by Wang, Zhang
and Shin (Infocom 2002) to detect TCP SYN
attacks
Detection Algorithm
All connection setup attempts and complete
handshakes are counted during the
observation period
During each sampling period the difference is
computed and normalized
X ( n)
EA(n) HS (n)
_
C ( n)
_
_
C (n) C (n 1) (1 ) HS (n)
Detection Algorithm Cont.
Under normal operation, the resulting value
should be very close to 0
In the presence of an attack, the result is a
large positive number
A cumulative sum method is applied to detect
short high volume attacks as well as longer
low volume attacks
Recovery Algorithm
Linear Recovery
Exponential Recovery
This is the default behavior of the detection
algorithm
The cumulative sum decreases multiplicatively
once the attack has ceased
Reset after Timeout
The cumulative sum decays linearly decays until a
timer expires at which point it is reset to 0
Preliminary Results
Types of attack
Limited DoS attack
Stealth DoS attack
Multiple users targeted by one or more attackers each
with a low volume of call requests
Aggressive DoS attack
Single user targeted by one or more attackers
Multiple users targeted with high call requests
Ability to detect both aggregate level attacks
as well as attack to individual URIs
Preliminary Results
40
Exponential Recovery
35
Linear Recovery
Calculated Value of Yn
30
25
20
15
10
Threshold
5
0
1
3
5
7
9
11
13
15
17
19
21
23
25
27
Tim e (m inutes)
Limited DoS Attack with 10 calls/min to a single URI
29
Summary of Detection
and Recovery Results
Detection Time
Recovery Time
Attack Type
Detection Time
Recovery
Algorithm
Recovery Time
4 calls/min –
Limited DoS
4 min (URI level)
4 calls/min –
Linear
3 min
10 calls/min –
Limited DoS
2 min (URI level)
10 calls/min –
Linear
17 min
50 URI
Aggressive DoS
6 min (URI level)
8 min (agg. level)
10 calls/min –
Exponential
6 min
200 URI Stealth 4 min (agg. level)
DoS
10 calls/min –
R.a.T.
3 min
Future Work
Detailed analysis
Formal vulnerability analysis
Tradeoff between detection time and false
alarm rate
Additional vulnerabilities with ENUM
Routing layer issues
Vulnerabilities of multihomed networks
Additional Information
Master’s Thesis
Enabling Secure IP Telephony in Enterprise Networks
http://www.off-pisteconsulting.com/research/pubs/reynolds-ms_thesis.pdf
Presentation Slides
http://www.off-pisteconsulting.com/research/pubs/ndss03-slides.ppt
Contact Information:
Brennen Reynolds
Off-Piste Consulting, LLC
[email protected]
Dipak Ghosal, PhD.
University of California, Davis
[email protected]