Hasil (
Bahasa Indonesia) 1:
[Salinan]Disalin!
Pencegahan intrusi: Masa depan keamanan VoIP Hak Cipta © 2004 teknologi TippingPoint, Inc Semua Hak, milik. 2Introduction................................................................................................................................. 2 VoIP Building Blocks ................................................................................................................... 3 VoIP skenario ancaman keamanan... 7 Serangan terhadap perangkat VoIP mendasari OS... 7 Konfigurasi kelemahan dalam perangkat VoIP... 8 IP Infrastructure Attacks .......................................................................................................... 9 Kerentanan implementasi protokol VoIP... 9 VoIP aplikasi tingkat serangan... 9The Future of VoIP Security ...................................................................................................... 10 VoIP and TippingPoint............................................................................................................... 11 Summary Voice-over-IP (VoIP) technology has come of age and is quickly gaining momentum on Broadband networks. VoIP packetizes phone calls through the same routes used by network and Internettraffic and is consequently prone to the same cyber threats that plague data networks today. These include denial-ofservice attacks, worms, viruses, and hacker exploitation. In addition to these traditional network security and availabilityconcerns, there are also a plethora of new VoIP protocols that have yet to undergo detailed security analysis and scrutiny. The challenge of VoIP security is not new. History has shown that many other advances and trends in information technology (e.g. TCP/IP, Wireless 802.11, Web Services, etc.) typically outpace the corresponding realistic security requirements that are often tackled only after these technologies have been widely adopted and deployed. TippingPoint’s Intrusion Prevention technology protects networks against the known cyber threats of today, as well as the future VoIP specific vulnerabilities and threats that are beginning to emerge. Introduction VoIP technology in general refers to the set of software, hardware and industry standards that enable “voice” to be transported using the Internet Protocol (IP). The technology has been initially welcomed by many broadband service providers who plan on offering telephony services to their customers. According to some analyst estimates, VoIP will account for 75 percent of the world voice services by 2007 and the IP-based PBX market is estimated to grow to $16 billion worldwide by 2006i. The technology is compelling to a wide audience for several reasons: • VoIP phone bills are typically cheaper than traditional phone bills to the consumer. • VoIP networks offers providers easier IT management and reduction in operating cost for a combined network for voice and data. Copyright ©2004 TippingPoint Technologies, Inc. All rights reserved. 3• VoIP technology is feature rich to support next generation multimedia applications. However, despite the seemingly overwhelming advantages of VoIP to Public Switched Telephone Networks, there are stringent and mandatory requirements that VoIP providers and the technology itself must live up to: • For service providers, a VoIP network must provide emergency services like 911 at all times, and have a similar uptime (99.995%) as the traditional phone network. • To make the end-user experience of a phone call over the IP network comparable to the traditional phone call, VoIP networks must guarantee a Quality-of-Service similar to the traditional phone systems. This implies that the VoIP implementations must effectively deal with lost voice packets and voice packets arriving out-of-order, which are a common occurrence in a typical IP network. • The VoIP network must also guarantee that any communication between the end parties in a call cannot be intercepted or modified by a malicious third party. It should be difficult for a hacker to conduct a man-in-themiddle attack between the end parties. • The VoIP implementation should enforce user authentication and not allow any unauthorized party to make free phone calls. Along with the aforementioned requirements, the convergence of voice and data networks only serves to exacerbate and magnify the security risks of today’s prevalent cyber attacks. Successful attacks against a combined voice and data network can totally cripple the functioning of an enterprise, halt all communications required fo
Sedang diterjemahkan, harap tunggu..
