Understanding Voice Over Ip Security

Understanding Voice Over Ip Security

Understanding Voice Over Ip Security

Understanding Voice Over Ip Security

Hardcover(1ST)

$123.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

This authoritative and practical book offers a current and comprehensive understanding of VoIP (Voice over IP) security. Professionals learn how to design and implement secure VoIP networks and services, and how to integrate VoIP securely in existing data networks. The authors explain how IETF SIP and media security standards affect VoIP deployment, and how end-to-end encryption can be deployed to protect all VoIP calls. For readers unfamiliar with Internet security, the book explains security basics and attack types and methods and details all the key security aspects of data and VoIP systems and networks, including identity, authentication, signaling, and media encryption.

Product Details

ISBN-13: 9781596930506
Publisher: Artech House, Incorporated
Publication date: 03/31/2006
Series: Artech House Telecommunications Library
Edition description: 1ST
Pages: 288
Product dimensions: 6.14(w) x 9.21(h) x 0.69(d)

Table of Contents

Forewordxiii
Acknowledgmentsxvii
1Introduction1
1.1VoIP: A Green Field for Attackers2
1.2Why VoIP Security Is Important3
1.3The Audience for This Book4
1.4Organization4
2Basic Security Concepts: Cryptography7
2.1Introduction7
2.2Cryptography Fundamentals7
2.2.1Secret Key (Symmetric) Cryptography10
2.2.2Asymmetric (Public Key) Cryptography12
2.2.3Integrity Protection13
2.2.4Authenticated and Secure Key Exchange17
2.3Digital Certificates and Public Key Infrastructures20
2.3.1Certificate Assertions22
2.3.2Certificate Authorities24
References27
3VoIP Systems29
3.1Introduction29
3.1.2VoIP Architectures29
3.2Components31
3.3Protocols32
3.3.1Session Initiation Protocol32
3.3.2Session Description Protocol39
3.3.3H.32342
3.3.4Media Gateway Control Protocols44
3.3.5Real Time Transport Protocol46
3.3.6Proprietary Protocols46
3.4Security Analysis of SIP48
References49
4Internet Threats and Attacks51
4.1Introduction51
4.2Attack Types51
4.2.1Denial of Service (DoS)51
4.2.2Man-in-the-Middle56
4.2.3Replay and Cut-and-Paste Attacks57
4.2.4Theft of Service58
4.2.5Eavesdropping59
4.2.6Impersonation60
4.2.7Poisoning Attacks (DNS and ARP)60
4.2.8Credential and Identity Theft61
4.2.9Redirection/Hijacking62
4.2.10Session Disruption63
4.3Attack Methods64
4.3.1Port Scans64
4.3.2Malicious Code65
4.3.3Buffer Overflow67
4.3.5Password Theft/Guessing69
4.3.6Tunneling69
4.3.7Bid Down69
4.4Summary70
References70
5Internet Security Architectures73
5.1Introduction73
5.1.1Origins of Internet Security Terminology73
5.1.2Castle Building in the Virtual World74
5.2Security Policy75
5.3Risk, Threat, and Vulnerability Assessment77
5.4Implementing Security79
5.5Authentication80
5.6Authorization (Access Control)82
5.7Auditing82
5.8Monitoring and Logging84
5.9Policy Enforcement: Perimeter Security85
5.9.1Firewalls86
5.9.2Session Border Controller90
5.9.3Firewalls and VoIP92
5.10Network Address Translation93
5.11Intrusion Detection and Prevention95
5.12Honeypots and Honeynets97
5.13Conclusions97
References98
6Security Protocols101
6.1Introduction101
6.2IP Security (IPSec)103
6.2.1Internet Key Exchange105
6.3Transport Layer Security (TLS)107
6.4Datagram Transport Layer Security (DTLS)111
6.5Secure Shell (SecSH, SSH)112
6.6Pretty Good Privacy (PGP)115
6.7DNS Security (DNSSEC)116
References119
7General Client and Server Security Principles121
7.1Introduction121
7.2Physical Security122
7.3System Security122
7.3.1Server Security122
7.3.2Client OS Security124
7.4LAN Security126
7.4.1Policy-Based Network Admission127
7.4.2Endpoint Control128
7.4.3LAN Segmentation Strategies129
7.4.4LAN Segmentation and Defense in Depth130
7.5Secure Administration131
7.6Real-Time Monitoring of VoIP Activity132
7.7Federation Security132
7.8Summary132
References133
8Authentication135
8.1Introduction135
8.2Port-Based Network Access Control (IEEE 802.1x)137
8.3Remote Authentication Dial-In User Service140
8.4Conclusions143
References143
9Signaling Security145
9.1Introduction145
9.2SIP Signaling Security146
9.2.1Basic Authentication146
9.2.2Digest Authentication147
9.2.3Pretty Good Privacy152
9.2.4S/MIME153
9.2.5Transport Layer Security155
9.2.6Secure SIP159
9.3H.323 Signaling Security with H.235160
References161
10Media Security163
10.1Introduction163
10.2Secure RTP164
10.3Media Encryption Keying168
10.3.1Preshared Keys168
10.3.2Public Key Encryption169
10.3.3Authenticated Key Management and Exchange170
10.4Security Descriptions in SDP172
10.5Multimedia Internet Keying (MIKEY)173
10.5.1Generation of MIKEY Message by Initiator177
10.5.2Responder Processing of a MIKEY Message183
10.6Failure and Fallback Scenarios186
10.7Alternative Key Management Protocol-ZRTP188
10.8Future Work190
References190
11Identity193
11.1Introduction193
11.2Names, Addresses, Numbers, and Communication193
11.2.1E.164 Telephone Numbers194
11.2.2Internet Names195
11.3Namespace Management in SIP196
11.3.1URI Authentication196
11.4Trust Domains for Asserted Identity199
11.5Interdomain SIP Identity202
11.5.1SIP Authenticated Identity Body (AIB)203
11.5.2Enhanced SIP Identity204
11.6SIP Certificates Service209
11.7Other Asserted Identity Methods217
11.7.1Secure Assertion Markup Language217
11.7.2Open Settlements Protocol and VoIP219
11.7.3H.323 Identity219
11.7.4Third Party Identity and Referred-By219
11.8Privacy220
References223
12PSTN Gateway Security225
12.1Introduction225
12.2PSTN Security Model225
12.3Gateway Security227
12.3.1Gateway Security Architecture228
12.3.2Gateway Types229
12.3.3Gateways and Caller ID230
12.3.4Caller ID and Privacy231
12.3.5Gateway Decomposition231
12.3.6SIP/ISUP Interworking232
12.4Telephone Number Mapping in the DNS233
References236
13Spam and Spit237
13.1Introduction237
13.2Is VoIP Spam Inevitable?238
13.3Technical Approaches to Combat E-Mail Spam240
13.3.1Filtering Spam Using Identity Information240
13.3.2Grey Listing241
13.3.3Challenge/Response (Sender Verification)242
13.3.4Distributed Checksum Filtering (DCF)242
13.3.5Content Filtering243
13.3.6Summary of Antispam Approaches243
13.4VoIP and Spit243
13.5Summary245
References246
14Conclusions247
14.1Summary247
14.2VoIP Is Still New248
14.3VoIP Endpoints Are New248
14.4VoIP Standards Are Not Complete249
14.5Base VoIP Security on Best Current Security Practices for Data249
14.6VoIP Is a QoS-Sensitive Data Application250
14.7Merging Public and Private VoIP Services Will Be Problematic250
14.8Concluding Remarks251
Index255
From the B&N Reads Blog

Customer Reviews