analysis of sip security

16
Analysis of SIP security Ashwini Sanap (006312787) Deepti Agashe (006331234)

Upload: candie

Post on 07-Jan-2016

30 views

Category:

Documents


2 download

DESCRIPTION

Analysis of SIP security. Ashwini Sanap (006312787) Deepti Agashe (006331234). Agenda. Introduction SIP Entities and messages Security Mechanism Security Attacks Conclusion. Introduction. Session Initiation Protocol (SIP) Application Layer Signaling Protocol - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Analysis of SIP security

Analysis of SIP security

Ashwini Sanap (006312787)

Deepti Agashe (006331234)

Page 2: Analysis of SIP security

Agenda

Introduction SIP Entities and messages Security Mechanism Security Attacks Conclusion

Page 3: Analysis of SIP security

Introduction

Session Initiation Protocol (SIP)

Application Layer Signaling Protocol

Create, Terminate and Manage Session

Similar to HTTP (Request/Response)

SIP Identity (URI)

Page 4: Analysis of SIP security

SIP Entities and Messages

Page 5: Analysis of SIP security

Security Mechanisms

SIP Security

Application Layer Transport Layer Network Layer

HTTP Basic Authentication

Secure MIMEHTTP Digest Authentication

TLS IPSec

Page 6: Analysis of SIP security

Digest Authentication

Challenge based AuthenticationEncryption

not provided

Confidentiality lost

Page 7: Analysis of SIP security

Secure MIME

Multipurpose Internet Mail Extension End to End security Encrypts MIME body using public key of

receiver PK Exchanged thru Certificates Entity Authentication

Page 8: Analysis of SIP security

Transport Layer Security (TLS)

TCP->TLS SIPS (Similar to HTTPS) SIPS ensures parameters passed

securely SRTP ensures media is also secured SIPS+SRTP = Protection

Page 9: Analysis of SIP security

IPSec

Network Layer Security Hop by Hop Creates VPN between sites Provides Encryption (DES,IDEA), Authentication and

Integrity(MD5, SHA)

Page 10: Analysis of SIP security

SIP Based network attacks

Registration Hijacking Authenticate originators of requests

Page 11: Analysis of SIP security

SIP Based network attacks

Session Hijacking

Page 12: Analysis of SIP security

SIP Based network attacks

Impersonating a Server

Page 13: Analysis of SIP security

SIP Based network attacks :

Tearing Down Sessions

Page 14: Analysis of SIP security

SIP Based network attacks :

Other attacks include :

Tampering with Message Bodies

Denial of Service and Amplification

Bots and DDOS Attacks

Page 15: Analysis of SIP security

Conclusion

SIP is expected to be the future VoIP protocol of choice.

Use SIP-optimized firewalls, which both support use of standards-based security and provide the best possible protection where system-wide standards-based security is not possible.

Page 16: Analysis of SIP security