VoIP Network: Vulnerabilities and Threats

Operating System Tips, Tricks and Hack which include Windows 10 and others, CentOS, Linux, MAC OS, iOS
Post Reply
User avatar
Ahmad
The Super Geek
The Super Geek
Posts: 1746
Joined: Nov 04, 2007
Location: Lahore

VoIP Network: Vulnerabilities and Threats

Post by Ahmad » Dec 17, 2008 Views: 1232

Voice-over-Internet Protocol has been a subject of interest almost since the first computer network. By 1973, voice was being transmitted over the early Internet. The technology for transmitting voice conversations over the Internet has been available to end-users since at least the early 1980s. In 1996, a shrink-wrapped software product called VocalTec Internet Phone (release 4) provided VoIP along with extra features such as voice mail and caller ID. However, it did not offer a gateway to the PSTN, so it was only possible to speak to other Vocaltec Internet Phone users. In 1997, Level 3 began development of its first softswitch (a term they invented in 1998); softswitches were designed to replace traditional hardware telephone switches by serving as gateways between telephone networks.

Revenue in the total VoIP industry in the US is set to grow by 24.3% in 2008 to $3.19 billion. Subscriber growth will drive revenue in the VoIP sector, with numbers expected to rise by 21.2% in 2008 to 16.6 million.

Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over the Internet or other packet-switched networks. Other terms frequently encountered and synonymous with VoIP are IP telephony and Internet telephony, as well as voice over broadband, broadband telephony, and broadband phone, when the network connectivity is available over broadband Internet access.

VoIP systems usually interface with the traditional public switched telephone network (PSTN) to allow for transparent phone communications worldwide.

VoIP can be a benefit for reducing communication and infrastructure costs by routing phone calls over existing data networks and avoiding duplicate network systems. Skype and Vonage are notable service provider examples that have achieved widespread user and customer acceptance and market penetration.

Voice-over-IP systems carry telephony speech as digital audio, typically reduced in data rate using speech data compression techniques, packetized in small units of typically tens of milliseconds of speech, and encapsulated in a packet stream over IP.
As VoIP becomes increasingly popular and preferred mode of communication, it increasingly faces threats. Some of the vulnerabilities include:

  • IP infrastructure: Vulnerabilities on related non-VoIP systems can lead to compromise of VoIP infrastructure.
  • Underlying operating system: VoIP devices inherit the same vulnerabilities as the operating system or firmware they run on. Operating systems are Windows and Linux.
  • Configuration: In their default configuration most VoIP devices ship with a surfeit of open services. The default services running on the open ports may be vulnerable to DoS attacks, buffer overflows, or authentication bypass.
  • Application level: Immature technologies can be attacked to disrupt or manipulate service. Legacy applications (DNS, for example) have known problems.


Denial-of-Service or VoIP Service Disruption: Denial-of-service (DoS) attacks can affect any IP-based network service. The impact of a DoS attack can range from mild service degradation to complete loss of service. There are several classes of DoS attacks. One type of attack in which packets can simply be flooded into or at the target network from multiple external sources is called a distributed denial-of-service (DDoS) attack.

DoS attacks are difficult to defend against, and because VoIP is just another IP network service, it is just as susceptible to DoS attack as any other IP network services. Additionally, DoS attacks are particularly effective against services such as VoIP and other real-time services, because these services are most sensitive to adverse network status. Viruses and worms are included in this category as they often cause DoS or Distributed DoS (DDoS) due to the increased network traffic that they generate as part of their efforts to replicate and propagate.

VoIP systems must meet stringent service availability requirements. Following are some example DoS threats can cause the VoIP service to be partially or entirely unavailable by preventing successful call placement (including emergency/911), disconnecting existing calls, or preventing use of related services like voicemail. Note that this list is not exhaustive but illustrates some attack scenarios.

  • TLS Connection Reset
  • VoIP Packet Replay Attack
  • Data Tunneling (Not exactly an attack…)
  • QoS Modification Attack
  • VoIP Packet Injection
  • DoS against Supplementary Services
  • Control Packet Flood
  • Wireless DoS
  • Bogus Message DoS
  • Invalid Packet DoS
  • Immature Software DoS
  • VoIP Protocol Implementation DoS
  • Packet of Death DoS
  • IP Phone Flood DoS
  • Call interception
  • Eavesdropping

Post Reply

Return to “Operating System Tricks”