Title: IMS Security and Protection
1IMS Security and Protection
- Micaela GiuhatVP Product Management
- Sipera Systemsemail micaela_at_sipera.com
2Outline
- Open system security
- VoIP security requirements
- Industry approach and strategies
- IMS security requirements
- IMS vulnerabilities
- Attack examples
- Solution
- Summary
3Open Systems can be attacked
Internal Web Servers
Traditional voice network is closed
system VS Internet which is open
E-mail Servers
External Web Servers
Core Network
- Denial of Service Attacks
- Viruses
- SPYware
- Blended Attacks
- E-mail SPAM
Internet
4The Internet Security Industry
- Applications Protected
- Web Apps
- E-mail
- Database
Internal Web Servers
E-mail Servers
Network Security Logs Correlation
SPAM Filter
IPS
External Web Servers
IDS
Firewall
Core Network
But Problems still persist
Internet
5Enter VoIP
Internal Web Servers
- VoIP is different
- Real time
- Peer-to-peer
- Protocol rich
- Complex state machine (several dozen states)
E-mail Servers
Network Security Logs Correlation
SPAM Filter
IPS
External Web Servers
IDS
Firewall
Core Network
Communication Servers
- Feature rich (several hundred services)
- Separate signaling media planes
- Low tolerance to false positives negatives
Internet
6Current Industry Approach
Approach is unworkable 1. Not real time 2.
Cannot handle encrypted traffic 3. Cant keep up
with new feature addition
Internal Web Servers
E-mail Servers
Network Security Logs Correlation
SPAM Filter
IPS
External Web Servers
IDS
Firewall
Core Network
Communication Servers
Current Industry thinking is to add VoIP
sensibilities to all the existing security boxes
Although nothing is actually available yet
Internet
7Current Strategies
Security Agent
May block Good calls
- Hard to manage
- Will not meet performance specifications
- Does not address multi vendor
- Cannot keep up with new features
- Not available yet
Protect against Windows OS vulnerabilities
Opens pinholes
ALG is vulnerable
FW/ALG
Event Correlation Remediation
VoIP Traffic analysis Signature/Anomaly
Filtering
IDS/IPS
Limited signatures
Core switch
Scrub IP DoS/DDoS Traffic
PSTN GW
Guard
Cannot stop Spoofed Caller IDs
Certs
Authentication Encryption
8Desired Approach
Integrated, real time VoIP security solution that
comprehensively tackles all VoIP vulnerabilities,
both Enterprise Carrier
Internal Web Servers
E-mail Servers
Network Security Logs Correlation
SPAM Filter
IPS
External Web Servers
IDS
Firewall
Core Network
Communication Servers
Internet
9Tolerance for False Negatives Email Vs Voice
10Typical Solution vs. Desired Solution
11Comprehensive IMS Security System
- A Comprehensive IMS Security System must
- Prevent unauthorized usage
- Protect end-user privacy
- Protect IMS infrastructure from attacks
- Protect end-users from attacks
- Handle voice SPAM
12Security Aspects addressed in IMS
13Security Aspects addressed in IMS
User Traffic Behavioral Learning
Call State Service aware
IMS/SIP/H.248/RTP/MPEG aware
Not addressed
Peer - Peer
Real time
IP Traffic
Web
Database
VoIP
IMS
IP TV
E-mail
TCP/UDP/ICMP/FTP/HTTP/SQL aware
Client - Server
Existing Internet Security Solutions
Non-Real time
Characteristics
14IMS reference architecture
Rf
/Ro
Rf
/Ro
Charging
Charging
Sh
Sh
HSS
HSS
Functions
Functions
AS
AS
Dh
Dh
ISC
Cx
Cx
ISC
Cx
Cx
Dx
Dx
SLF
SLF
Mw
Mw
I
-
CSCF
I
-
CSCF
S
-
CSCF
S
-
CSCF
Mw
Mw
Mi
Mi
Mi
Mi
SIP
BGCF
BGCF
Mw
Mw
H.248
Mr
Mj
Mr
Mj
Mg
Mg
DIAMETER
P
-
CSCF
P
-
CSCF
MGCF
MGCF
MRFC
MRFC
Gq
PDF
Mp
Mn
Mp
Mn
PSTN
MRFP
MRFP
MRFP
MGW
GGSN
UE
UE
IP Transport (Access and Core)
IP Transport (Access and Core)
15IMS Vulnerabilities
HSS
Apps
Chrg
- IMS SIP enable a rich feature set of Converged
Services .. but also open up the network to IP
based vulnerabilities
Call Server
SIP Server
MGCF MRFC BGCF SGF
P/S/I CSCF SLF/PDF/IBCF/IWF
IMS core
MGW MRFP T-MGF
ABGF IBGF
IP-IP GW
Media Gateway
- IMS SIP vulnerabilities include
- OS level vulnerabilities
- IP Layer 3 vulnerabilities
- IMS Framework related vulnerabilities
- SIP/RTP/H.248/etc. protocol vulnerabilities
- VoIP/Video/PoC/etc. Application vulnerabilities
- VoIP SPAM
16IMS Architecture Vulnerabilities Some Examples
- Compromised mobile phones
- Zombie hard/soft phones
- Modified phone with malicious intent
- Malicious/Malformed/Spoofed signaling attacks
- Malicious/Malformed/Spoofed media attacks
- Spoofed IMS Emergency session attacks
- Presence update attacks
- Initiating Conferencing to block the network
resources - UE having direct access to the IMS core network
- Charging fraud - Signaling directly to S-CSCF to
avoid charging - Misconfigured/partially configured UEs and/or
Network elements - Non-GPRS access such as WLAN or BB can be
attacked directly from the internet without a
subscription - SPAM
17IMS Application Level Attacks
Human attackers
Spammer
Spoofed Packets
- Attack Types
- Flood Denial of Service
- Signaling
- Media
- Distributed DoS
- Stealth DoS
- Target individual or group of users
- Blended attacks
- Recruit zombies and use them to launch an attack
- SPAM
- SPAM over Internet Telephony (SPIT)
HSS
Apps
Chrg
Zombie attackers
SIP Server
Call Server
MGCF MRFC BGCF SGF
P/S/I CSCF SLF/PDF/IBCF/IWF
MMD core
MGW MRFP T-MGF
ABGF IBGF
IP-IP GW
Media Gateway
Both Network Subscribers can be attacked
18IMS Vulnerability Protection System Reference
Architecture
Human attackers
HSS
Apps
Chrg
IMS Vulnerability Protection System
Call Server
SIP Server
MGCF MRFC BGCF SGF
P/S/I CSCF SLF/PDF/IBCF/IWF
Spammer
IMS core
Zombie attackers
MGW MRFP T-MGF
ABGF IBGF
IP-IP GW
Media Gateway
IMS Vulnerability Protection System is distinct
from the IMS core infrastructure
19Attack Summary
- An IMS network built to 3GPP or TISPAN
specifications compliance has numerous
vulnerabilities - An attack on the network could cause network-wide
outages including bringing down HSSs, App
Servers, SIP servers, Call Servers, Media
Gateways and IP-IP Gateways - Attacks towards specific targeted individual
users could cause them extreme annoyance and
disrupt their service in insidious ways - Sipera Systems research team has identified over
90 distinct categories of attacks - These attacks require hackers with varying levels
of sophistication, but many attacks are possible
even by so called script kiddies