Intrusion Prevention: The Future of VoIP Security Copyright ©2004 Tipp terjemahan - Intrusion Prevention: The Future of VoIP Security Copyright ©2004 Tipp Bahasa Indonesia Bagaimana mengatakan

Intrusion Prevention: The Future of

Intrusion Prevention:
The Future of VoIP Security
Copyright ©2004 TippingPoint Technologies, Inc. All rights reserved. 2
Introduction.................................................................................................................................2
VoIP Building Blocks ...................................................................................................................3
VoIP Security Threat Scenarios...................................................................................................7
Attacks against the underlying VoIP devices’ OS.....................................................................7
Configuration Weaknesses in VoIP devices.............................................................................8
IP Infrastructure Attacks ..........................................................................................................9
VoIP Protocol Implementation Vulnerabilities...........................................................................9
VoIP Application Level Attacks ................................................................................................9
The Future of VoIP Security ......................................................................................................10
VoIP and TippingPoint...............................................................................................................11
Summary
Voice-over-IP (VoIP) technology has come of age and is quickly gaining
momentum on Broadband networks. VoIP packetizes phone calls through the
same routes used by network and Internettraffic and is consequently prone to
the same cyber threats that plague data networks today. These include denial-ofservice attacks, worms, viruses, and hacker exploitation. In addition to these
traditional network security and availabilityconcerns, there are also a plethora of
new VoIP protocols that have yet to undergo detailed security analysis and
scrutiny. The challenge of VoIP security is not new. History has shown that many
other advances and trends in information technology (e.g. TCP/IP, Wireless
802.11, Web Services, etc.) typically outpace the corresponding realistic security
requirements that are often tackled only after these technologies have been
widely adopted and deployed.
TippingPoint’s Intrusion Prevention technology protects networks against the
known cyber threats of today, as well as the future VoIP specific vulnerabilities
and threats that are beginning to emerge.
Introduction
VoIP technology in general refers to the set of software, hardware and industry
standards that enable “voice” to be transported using the Internet Protocol (IP).
The technology has been initially welcomed by many broadband service
providers who plan on offering telephony services to their customers. According
to some analyst estimates, VoIP will account for 75 percent of the world voice
services by 2007 and the IP-based PBX market is estimated to grow to $16
billion worldwide by 2006
i
. The technology is compelling to a wide audience for
several reasons:
• VoIP phone bills are typically cheaper than traditional phone bills to the
consumer.
• VoIP networks offers providers easier IT management and reduction in
operating cost for a combined network for voice and data.
Copyright ©2004 TippingPoint Technologies, Inc. All rights reserved. 3
• VoIP technology is feature rich to support next generation multimedia
applications.
However, despite the seemingly overwhelming advantages of VoIP to Public
Switched Telephone Networks, there are stringent and mandatory requirements
that VoIP providers and the technology itself must live up to:
• For service providers, a VoIP network must provide emergency services
like 911 at all times, and have a similar uptime (99.995%) as the traditional
phone network.
• To make the end-user experience of a phone call over the IP network
comparable to the traditional phone call, VoIP networks must guarantee a
Quality-of-Service similar to the traditional phone systems. This implies
that the VoIP implementations must effectively deal with lost voice packets
and voice packets arriving out-of-order, which are a common occurrence
in a typical IP network.
• The VoIP network must also guarantee that any communication between
the end parties in a call cannot be intercepted or modified by a malicious
third party. It should be difficult for a hacker to conduct a man-in-themiddle attack between the end parties.
• The VoIP implementation should enforce user authentication and not allow
any unauthorized party to make free phone calls.
Along with the aforementioned requirements, the convergence of voice and data
networks only serves to exacerbate and magnify the security risks of today’s
prevalent cyber attacks. Successful attacks against a combined voice and data
network can totally cripple the functioning of an enterprise, halt all
communications required fo
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
Pencegahan intrusi: Masa depan keamanan VoIP Hak Cipta © 2004 teknologi TippingPoint, Inc Semua Hak, milik. 2Introduction................................................................................................................................. 2 VoIP Building Blocks ................................................................................................................... 3 VoIP skenario ancaman keamanan... 7 Serangan terhadap perangkat VoIP mendasari OS... 7 Konfigurasi kelemahan dalam perangkat VoIP... 8 IP Infrastructure Attacks .......................................................................................................... 9 Kerentanan implementasi protokol VoIP... 9 VoIP aplikasi tingkat serangan... 9The Future of VoIP Security ...................................................................................................... 10 VoIP and TippingPoint............................................................................................................... 11 Summary Voice-over-IP (VoIP) technology has come of age and is quickly gaining momentum on Broadband networks. VoIP packetizes phone calls through the same routes used by network and Internettraffic and is consequently prone to the same cyber threats that plague data networks today. These include denial-ofservice attacks, worms, viruses, and hacker exploitation. In addition to these traditional network security and availabilityconcerns, there are also a plethora of new VoIP protocols that have yet to undergo detailed security analysis and scrutiny. The challenge of VoIP security is not new. History has shown that many other advances and trends in information technology (e.g. TCP/IP, Wireless 802.11, Web Services, etc.) typically outpace the corresponding realistic security requirements that are often tackled only after these technologies have been widely adopted and deployed. TippingPoint’s Intrusion Prevention technology protects networks against the known cyber threats of today, as well as the future VoIP specific vulnerabilities and threats that are beginning to emerge. Introduction VoIP technology in general refers to the set of software, hardware and industry standards that enable “voice” to be transported using the Internet Protocol (IP). The technology has been initially welcomed by many broadband service providers who plan on offering telephony services to their customers. According to some analyst estimates, VoIP will account for 75 percent of the world voice services by 2007 and the IP-based PBX market is estimated to grow to $16 billion worldwide by 2006i. The technology is compelling to a wide audience for several reasons: • VoIP phone bills are typically cheaper than traditional phone bills to the consumer. • VoIP networks offers providers easier IT management and reduction in operating cost for a combined network for voice and data. Copyright ©2004 TippingPoint Technologies, Inc. All rights reserved. 3• VoIP technology is feature rich to support next generation multimedia applications. However, despite the seemingly overwhelming advantages of VoIP to Public Switched Telephone Networks, there are stringent and mandatory requirements that VoIP providers and the technology itself must live up to: • For service providers, a VoIP network must provide emergency services like 911 at all times, and have a similar uptime (99.995%) as the traditional phone network. • To make the end-user experience of a phone call over the IP network comparable to the traditional phone call, VoIP networks must guarantee a Quality-of-Service similar to the traditional phone systems. This implies that the VoIP implementations must effectively deal with lost voice packets and voice packets arriving out-of-order, which are a common occurrence in a typical IP network. • The VoIP network must also guarantee that any communication between the end parties in a call cannot be intercepted or modified by a malicious third party. It should be difficult for a hacker to conduct a man-in-themiddle attack between the end parties. • The VoIP implementation should enforce user authentication and not allow any unauthorized party to make free phone calls. Along with the aforementioned requirements, the convergence of voice and data networks only serves to exacerbate and magnify the security risks of today’s prevalent cyber attacks. Successful attacks against a combined voice and data network can totally cripple the functioning of an enterprise, halt all communications required fo
Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2025 I Love Translation. All reserved.

E-mail: