Voip Security: Thazin Aungsoe (13504163) Rinaldi Munir
Voip Security: Thazin Aungsoe (13504163) Rinaldi Munir
Voip Security: Thazin Aungsoe (13504163) Rinaldi Munir
1)
Thazin Aungsoe(13504163)
2)
Rinaldi Munir
1) if14163@students.if.itb.ac.id
2) rinaldi@informatika.org
Abstract- As new technology just has been
developed, there may be many problems that we need
to solve the problem over time by time. VoIP is the
same.VoIP is good in every aspect though it only has
one problem : VoIP security. Security is meant to
define the many potential security threats to VoIP
deployments, services, and end users. Part of the
challenge of devising effective VoIP security
protections requires identifying these threats in the
first place.
5.HOW TO PREVENT
For threat to Network, There would be a lot of
advantages to using pre-existing protocols to protect
VoIP conversations because these have been
extensively deployed and tested. There are two
existing protocols to consider: SSL/TLS and IPsec.
We can immediately rule out SSL/TLS because those
Layer 4 protocols depend on a reliable transport
method, i.e. TCP. TCP is never used for voice because
the buffering and retransmission behavior of TCP will
exceed the latency budget for voice Qos(Quality of
service). When transmitting voice, the lost, corrupted
or late packets are always discarded and never
retransmitted in order to stay within strict latency
limits. So we are left with protocols that can protect
UDP traffic: IPsec - is a framework of open standards
that helps ensure private, secure communications over
IP networks by using cryptographic security services.
Figure 2. Security Areas
Ping to Death
Teardrop
Land
Counter action
Software restricts the number
of packets to be received in
time slot, if packet exceeds
in defined time slot, log and
drop the packets.
Check IP fragments. Drop
packets if they are not
properly formatted.
RFC2267 software input
filter doesnt allow packets
through if the address is from
internel. Software output
filter does not allow packets
through , if the source
address is not from internal.
Compare source with
destination IP address of
packets, if same , log and
drop the packets.
2.
3.
Rivest Cipher(RC4)
4.
Symmetric key
2.
Public key
3.
Hybrid key
4.
11. KESIMPULAN
DAFTAR REFERENSI