Upload
ahmed-gad
View
30
Download
0
Embed Size (px)
Citation preview
Computer Networks Research TrendsAhmed Fawzy Gad
MenoufiaUniversityFaculty of computers and information
جامعة المنوفية
Research Trends
•Software-Defined Networking (SDN)
•Data Security
•Virtualization
• Internet of Things (IoT)
•Datacenter Networking
•Wireless Sensor Networks
•VoIP
VoIP Survey Papers
• Keromytis, Angelos D. "A survey of Voice over IP security research." Information Systems Security. Springer Berlin Heidelberg, 2009. 1-17.
• Keromytis, Angelos D. "A comprehensive survey of voice over IP security research." Communications Surveys & Tutorials, IEEE 4.2 (2012): 514-537.
• Srihari, V., P. Kalpana, and R. Anitha. "Security aspects of SIP based VoIP networks: A survey." Current Trends in Engineering and Technology (ICCTET), 2014 2nd International Conference on. IEEE, 2014.
Objectives
Objectives
VoIP Networks
Objectives
VoIP NetworksVoIP Security Threats
Objectives
VoIP NetworksVoIP Security ThreatsVoIP Research
Voice Networks
•Public Switched Telephone Networks (PSTN)
•IP Network
PSTN Networks
PSTN Networks
PSTN Networks
PSTN Networks
PSTN Networks
PSTN Networks
PSTN Networks
IP Networks
IP Networks
IP Networks
IP Networks
IP Networks
IP Networks
IP Networks
IP Networks
IP Network + PSTN
Merging IP Network &Voice
Merging IP Network &Voice
Device
Merging IP Network &Voice
Device Protocol
Merging IP Network &Voice
Device ProtocolUser Agents
Registration Server
Proxy Server
Redirect Server
AD/DA Converters
Merging IP Network &Voice
Device ProtocolUser Agents
Registration Server
Proxy Server
Redirect Server
AD/DA Converters
UDP
SIPRTP
RTCP
IP
SDPRSVPSAP
SIPSignaling protocol
Application Layer Protocol
Text-based Like HTTP
SIP Scenario
SIP Vulnerabilities:Flooding/DoS attack
SPam over IP Telephony (SPIT)
SPam over IP Telephony (SPIT)
SPam over IP Telephony (SPIT)
SPam over IP Telephony (SPIT)
SPam over IP Telephony (SPIT)
Man-In-The MiddleBilling Fraud
Registration Hijacking
SPITSPam over Internet Telephony
SPIT is Spam
Voice
SPIT is Spam
Detection Complexity
User Interaction
User Interruption
Email Voice
Detection Complexity
Email Voice
Spam Detector
Detection Complexity
Email Voice
Spam Detector
Spam Solutions
Spam Detector
Level 1Level 2Level 3
Level N
.
.
.
SPIT Solutions
SPIT Solutions
Caller
SPIT Solutions
Caller
Spam
SPIT Solutions
Details
Caller
Spam
SPIT Solutions
Accept / Reject
Details
Caller
Spam
SPIT Solutions
Accept / Reject
Details
Caller
Spam
Spam Detector
Spam Detection Data
Signaling
Media Content
Signaling Example
Car
rie
r G
rad
e V
oic
e O
ver
IP
Signaling Example
Car
rie
r G
rad
e V
oic
e O
ver
IP
SPIT: Signaling
SPIT: Signaling
Caller
SPIT: Signaling
Caller
Spam
SPIT: Signaling
Caller Details
Caller
Spam
SPIT: Signaling
Accept / Reject
Caller Details
Caller
Spam
SPIT: Signaling
Accept / Reject
Caller Details
Caller
Spam
Spam Detector
SPIT: Signaling
Accept / Reject
Caller Details
Caller
Spam
Spam Detector
Data
SPIT: Signaling
Accept / Reject
Caller Details
Caller
Spam
Spam Detector
Data
Callee
Signaling Example
Car
rie
r G
rad
e V
oic
e O
ver
IP
Signaling Example
Car
rie
r G
rad
e V
oic
e O
ver
IP
Signaling Example
Car
rie
r G
rad
e V
oic
e O
ver
IP
Signaling Example
Car
rie
r G
rad
e V
oic
e O
ver
IP
Signaling Example
Car
rie
r G
rad
e V
oic
e O
ver
IP
Spam Detection Using SignalingResearch• Geneiatakis, Dimitris, Nikos Vrakas, and Costas
Lambrinoudakis. "Utilizing bloom filters for detecting flooding attacks against SIP based services." computers & security 28.7 Elsevier (2009): 578-591.
• Quittek, Juergen, Saverio Niccolini, Sandra Tartarelli, and Roman Schlegel. "On spam over internet telephony (SPIT) prevention." Communications Magazine, IEEE 46, no. 8 (2008): 80-86.
SPIT: Media
SPIT: Media
Caller
SPIT: Media
Caller
Spam
SPIT: Media
Caller
Spam
Call Data
SPIT: Media
Caller
Spam
Call Data
Processing
SPIT: Media
Caller
Spam
Spam Detector
Call Data
Processing
SPIT: Media
Caller
Spam
Spam Detector
Call Data
Callee
Processing
SPIT: Media
SPIT: Media
Caller
SPIT: Media
Caller
Spam
SPIT: Media
Caller
Spam
External Data
SPIT: Media
Caller
Spam
External Data
Processing
SPIT: Media
Caller
Spam
Spam Detector
External Data
Processing
SPIT: Media
Caller
Spam
Spam Detector
External Data
ProcessingAccept / Reject
SPIT: Media
SPIT: Media
Caller
SPIT: Media
Caller
Spam
SPIT: Media
Caller
Spam
External Data
SPIT: Media
Caller
Spam
External Data
Processing
SPIT: Media
Caller
Spam
Spam Detector
External Data
Processing
SPIT: Media
Caller
Spam
Spam Detector
External Data
Processing Accept / Reject
SPIT: Media
Caller
Spam
Spam Detector
External Data
Processing Accept / Reject
SPIT: Media
Caller
Spam
Spam Detector
External Data
Processing Accept / Reject
Call Data
SPIT: Media
Caller
Spam
Spam Detector
External Data
Processing Accept / Reject
Call Data
SPIT: Media
Caller
Spam
Spam Detector
External Data
Processing Accept / Reject
Call Data
SPIT: Media
Caller
Spam
Spam Detector
External Data
Callee
Processing Accept / Reject
Call Data
Spam Detection Using MediaResearch• Sengar, Hemant, Xinyuan Wang, and Arthur Nichols. "Call
Behavioral analysis to Thwart SPIT attacks on VoIP networks." Security and Privacy in Communication Networks. SpringerBerlin Heidelberg, 2011. 501-510.
• Quittek, Jürgen, et al. "Detecting SPIT calls by checking human communication patterns." Communications, 2007. ICC'07. IEEE International Conference on. IEEE, 2007.
Which solution to use?
Metric Signaling Media
1 Early Detection
2 Fast
3 Accuracy