Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Networking

    Experts: Enterprises Must Focus on VOIP Security

    Written by

    Brian Prince
    Published July 3, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      As the number of VOIP deployments is expected to continue to increase, IT professionals and researchers are urging enterprises not to forget about security.

      Voice-over-IP security threats are viewed as more theoretical than actual. But the few cases that have come to light have been brazen and costly. For example, investigators arrested two people in 2006 for a scam in which they were accused of hacking into the networks of several unnamed companies and hijacking their VOIP bandwidth for resale.

      With IP phone use growing, some security specialists are saying it is a mistake to downplay the danger and its time to learn what the threats are as well as how to counter them.

      In a report, analysts from In-Stat predicted that the number of business IP phones sold would grow from 9.9 million in 2006 to 45.8 million in 2010. Yet more than 40 percent of the enterprises it surveyed dont have any specific security plans for their VOIP deployments. When asked to rate their VOIP security knowledge, most of the 250 IT professionals surveyed ranked themselves “somewhat knowledgeable”-the lowest rating the survey offered.

      “Theres a gap between traditional data security and VOIP security,” said Bogdan Materna, chief technology officer and vice president of engineering with VOIPshield Systems, of Ottawa.

      “VOIP is unique and brings with it a whole new set of challenges, which existing solutions are not able to address. IP communications are conducted in real time and theres a whole new set of protocols and applications [that] must be supported. VOIP-specific solutions blend security and telecommunications requirements, along with industry research and intelligence that just arent available in existing data security solutions,” Materna said.

      “For example, a data security IPS [intrusion prevention system] may cover a dozen or so VOIP vulnerabilities,” he said. “That is really the tip of the iceberg, as every protocol and application in the VOIP network should be locked down.”

      In many ways, dealing with VOIP security will require users to reapply old lessons about the Internet; after all, VOIP systems are vulnerable to the same failure modes as the rest of an organizations IP network. The ease with which VOIP numbers can be acquired and disposed of means people will need to accept that such numbers are about as trustworthy as e-mail, said Adam ODonnell, director of emerging technologies at Cloudmark, a network security technology company based in San Francisco.

      /zimages/4/28571.gifAre small and midsize businesses too confident about VOIP security? Click here to read more.

      “Constructing layered security features for VOIP may present a challenge, as there is no easy way to layer end-to-end cryptography and authentication on top of VOIP networks, especially with the large number of desktop VOIP terminals, which are essentially thin clients with proprietary software,” ODonnell said.

      Early VOIP attacks were DoS (denial-of-service) attacks launched against specific VOIP implementations, ODonnell said. Currently, however, hackers are focused more on what can be done with VOIP to improve old attacks, such as phishing via VOIP, dubbed “vishing,” and scams such as faking the calling phone number of credit collection agencies, he said.

      Though evidence of massive attacks of SPIT (spam over Internet telephony) is scant, Materna said he expects spam, toll fraud and DoS attacks to increase as VOIP implementation grows.

      More toll fraud could mean trouble for VOIP providers. Stealth Communications, a data communications company based in New York, estimates that VOIP thieves already steal 200 million minutes every month, at a value of $26 million.

      “As losses grow there will be significant impact,” said Paul Henry, vice president of Technology Evangelism at Secure Computing, based in San Jose, Calif. “Hackers are stealing minutes every day and are creating a growing underground currency in the resale of those minutes. Further, ask any provider what percentage of new accounts is using stolen credit cards-everywhere you look in the food chain there is fraud.”

      So, where does that leave users? While most of securing VOIP is in fact relearning old lessons, the use of IP addresses and Caller ID for authentication while operating in a connectionless UDP (User Datagram Protocol) environment prone to easy spoofing requires extra vigilance, Henry said.

      He suggested, among other things, that companies fully validate protocols and applications and use a gateway device that simulates a connected protocol for UDP.

      Materna stressed that securing VOIP requires unique tools that work in conjunction with data security tools. “Any organization deploying or currently using VOIP should be taking a proactive approach to VOIP security built on the idea of protecting against attacks … if they do get through using VOIP-specific IPS offerings and Session Border Controllers, and then mitigating attacks if they do occur using a combination of approaches,” he said.

      “Any approach should include education of end users on the types of threats. We all understand what spam is, and the same care should be taken so that users understand how VOIP is being exploited and how they may be targeted,” he said.

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.