Securing VoIP Networks and over one million other books are available for Amazon Kindle. Learn more

Vous voulez voir cette page en français ? Cliquez ici.

Sign in to turn on 1-Click ordering.
Amazon Prime Free Trial required. Sign up when you check out. Learn More
More Buying Choices
Have one to sell? Sell yours here
Start reading Securing VoIP Networks on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures [Paperback]

Peter Thermos , Ari Takanen
4.0 out of 5 stars  See all reviews (1 customer review)
List Price: CDN$ 57.99
Price: CDN$ 47.94 & FREE Shipping. Details
You Save: CDN$ 10.05 (17%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 1 left in stock (more on the way).
Ships from and sold by Gift-wrap available.
Want it delivered Monday, September 22? Choose One-Day Shipping at checkout.


Amazon Price New from Used from
Kindle Edition CDN $27.73  
Paperback CDN $47.94  
Save Up to 90% on Textbooks
Hit the books in's Textbook Store and save up to 90% on used textbooks and 35% on new textbooks. Learn more.
Join Amazon Student in Canada

Book Description

Aug. 1 2007 0321437349 978-0321437341 1

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.


1       Introduction

2       VoIP Architectures and Protocols

3       Threats and Attacks

4       VoIP Vulnerabilites

5       Signaling Protection Mechanisms

6       Media Protection Mechanisms

7       Key Management Mechanisms

8       VoIP and Network Security Controls

9       A Security Framework for Enterprise VoIP Networks

10     Provider Architectures and Security

11     Enterprise Architectures and Security

Special Offers and Product Promotions

  • Join Amazon Student in Canada

Product Details

Product Description

About the Author

Peter Thermos is CTO of Palindrome Technologies, which provides information

security consulting services to government and commercial organizations.

Peter started his career at Bellcore (now Telcordia) as a member of the technical

staff and later as a principal technical expert on key information security and

assurance tasks. He is a frequent speaker at conferences and industry forums

including the IEEE, MIS, IEC, ISACA, VON, and others. Peter is also known

for his contributions to the security community for discovering software

vulnerabilities, the release of SiVuS (The First VoIP Vulnerability Scanner)

and the Forum. Peter holds a Masters Degree in Computer

Science from Columbia University where he is currently furthering his

graduate studies.


Ari Takanen is founder and CTO of Codenomicon. Since 1998, Ari has

focused on information security issues in next-generation networks and security

critical environments. He began at Oulu University Secure Programming Group

(OUSPG) as a contributing member to PROTOS research that studied information

security and reliability errors in WAP, SNMP, LDAP, and VoIP implementations.

Ari and his company, Codenomicon Ltd. provide and commercialize automated

tools using a systematic approach to test a multitude of interfaces on mission-critical

software, VoIP platforms, Internet-routing infrastructure, and 3G devices.

Codenomicon and the University of Oulu aim to ensure new technologies are

accepted by the general public, by providing means of measuring and ensuring

quality in networked software. Ari has been speaking at numerous security and

testing conferences on four continents and has been invited to speak at leading

universities and international corporations.

Excerpt. © Reprinted by permission. All rights reserved.



Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony infrastructure has required the cooperation of both commercial and government organizations to evolve into what it is today. It has also led to the formation of international standard bodies that both direct and support the industry towards an interoperable communication networks.

IP networks are the next step from the traditional telecommunications. For a while, IP family of protocols was only used in the Internet, and the main applications were file transfers and e-mail. With the World Wide Web, the Internet changed into a global and always open information distribution channel. And finally with the advent of VoIP, the Internet is becoming a real-time communication media that integrates with all the earlier multimedia capabilities.

Traditional telecommunication networks are critical to the survival of our society. The PSTN is a closed network and its operational intricacies are known to a few select individuals who have devoted much of their lives to building it. Although operations in PSTN are not entirely a secret, they were and still remain proprietary for several reasons such as competitive advantage and national defense. The PSTN was and remains a closed infrastructure that concentrated its intelligence in its core network elements and left the edge devices very simplistic. The equipment and resources to operate a TDM network require a substantial financial investment. This lack of direct access to core network elements from subscribers and the high price of connectivity alleviated the risk for attacks. Ergo, subscribers demonstrate greater trust for communications through the PSTN compared to the Internet. This is a misconceived trust once you start analyzing the PSTN components and protocols and realize the lack of protection mechanisms.

In the earlier days of the Internet, security was appalling. The Internet was an open network where anyone could attack anyone anonymously and many of the attack tools were, and still are, available. As such, security research became a standard practice in government, commercial, and academic worlds with globally known research groups in organizations such as DARPA, DISA, CERIAS, MIT CIS, Bellcore, Bell Labs, and many others. Things became a bit more complicated with the transition of critical services such as telephony on the Internet along with other multimedia applications such as video and gaming. And due to the performance, availability, and privacy requirements of these applications, their security requires new approaches and methods compared to traditional IP security. Nevertheless the traditional security objectives apply such as confidentiality, integrity, and availability of services.

Before gaining the interest of the academia, the topic of Internet security has been a secret science, or not even a science. The security field was a competition between hackers and system administrators, in a constant race of "patch and penetrate." Very few people knew what they actually were fixing in the systems when they applied new security updates or patches. And very few hackers understood what the attack tools actually did when they penetrated the services they wanted access to. People spoke of threats, attacks, and security measures that needed to be applied to protect from these attacks. The actual core reasons that enabled the existence of the attacks were not understood. For most of the users of communication systems, these weaknesses were hidden in complex, hard-to- understand protocols and components used in the implementations.

VoIP has been discussed at length in many textbooks and thus we avoid long discussions of its origins and details on introductory concepts. Instead the book focuses on the details associated with the security of multimedia communications including VoIP. Our purpose is to extend your knowledge of vulnerabilities, attacks, and protection mechanisms of VoIP and generally Internet multimedia applications. We deviate from listing a series of security tools and products and instead provide detailed discussions on actual attacks and vulnerabilities in the network design, implementation, and configuration and protection mechanisms for signaling and media streams, architectural recommendations, and organizational strategy—thus enabling you to understand and implement the best countermeasures that are applicable to your environment.

The book is structured so that we start by briefly explaining VoIP networks, and then go through the threats, attacks, and vulnerabilities to enable you to understand how VoIP attacks are made possible and their impact. The book discusses in great detail various attacks (published and unpublished) for eavesdropping, unauthorized access, impersonation, and service disruption. These attacks are used as proof of concept, but at the same time they also expose the reader to real-life weaknesses and serve as a mechanism to promote comprehension. In addition, this book discusses VoIP vulnerabilities, their structure, and their categorization as they have been investigated in enterprise and carrier environments.

Following VoIP vulnerabilities and attacks, the book discusses in great detail a number of protection mechanisms. In order to protect against current and emerging threats, there a number of areas that need to be considered when deploying VoIP. The book provides extensive coverage on the intricacies, strengths, and limitations of the protection mechanisms including SIPS, H.235, SRTP, MIKEY, ZTP, and others. Furthermore, the book focuses on identifying a VoIP security framework as a starting point for enterprise networks and provides several recommendations. Security architectures in enterprise and carrier environments are also discussed.

This first edition of the book aims in establishing the landscape of the current state of VoIP security and provides an insight to administrators, architects, security professionals, management personnel, and students who are interested in understanding VoIP security in detail.

Inside This Book (Learn More)
Explore More
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

5 star
3 star
2 star
1 star
4.0 out of 5 stars
4.0 out of 5 stars
Most helpful customer reviews
4.0 out of 5 stars Securing VoIP Jan. 23 2010
An indepth treatment of hardware-specific and net-centered vulenerabilities and threats and a good source of up-to-date countermeasures.
Was this review helpful to you?
Most Helpful Customer Reviews on (beta) 4.5 out of 5 stars  4 reviews
10 of 10 people found the following review helpful
5.0 out of 5 stars If you have any doubt whether VoIP is vulnerable . . . Sept. 16 2007
By Stephen Northcutt - Published on
A quick read of the first 1/3 of the book will cure you of your doubts VoIP can be attacked forever! It was almost painful reading; exploit approach after exploit approach, but I mean that in a good way like the pain you feel in your muscles after exercise.

I was excited when this book came out, I have been following some of the author's Thermos and Takanen work and I think they were the perfect team for this book.

I feel that Chapter 3 and 4, threats and attacks and VoIP vulnerabilities are by far the strongest chapters and they alone are worth the purchase price of the book.

The majority of the rest of the book is focused on mitigating controls and it is solid writing, solid research, but not quite at the level of the pen test side of the book.

Chapters 10 and 11 are invaluable to anyone considering a VoIP deployment including a deployment where you are depending on a service provider. The charts and diagrams are clear and easy to understand, the whole book team is to be commended for that, this is a complex subject.

If you are even thinking about VoIP, you should read this book.
3 of 3 people found the following review helpful
4.0 out of 5 stars Valuable VoIP Security Information April 21 2008
By sixmonkeyjungle - Published on
There are many benefits to VoIP and IP-based communications. However, relying on your network infrastructure to transport your telephone communications renders your telecommunications vulnerable to virtually all of the same issues and threats as your network. On top of that, there are also unique attack vectors introduced by VoIP. As organizations race to deploy VoIP and experience the benefits, most would probably benefit from slowing down to consider the security implications and develop appropriate controls to protect their communications.

In Security VoIP Networks: Threats, Vulnerabilities, and Countermeasures, authors Peter Thermos and Ari Takanen do a superb job of illustrating the insecurities of VoIP. Not to suggest that it is just so inherently insecure that it should never be used, but C-level execs, and IT managers and administrators should be familiar with the information in this book before moving forward to deploy VoIP.

Chapter 2, 'VoIP Architecture and Protocols', provides a solid foundation on the basic components and technologies that make up VoIP. It is the next couple chapters that are the most valuable though. In 'VoIP Vulnerabilities', and 'Threats and Attacks', Thermos and Takanen demonstrate the weaknesses of VoIP and the simplicity with which VoIP communications can be disrupted or intercepted if not set up properly.

Chapters 5 - 8 analyze different security controls and protection mechanisms. One issue I had was that it was difficult to draw a one-to-one correlation and find the security countermeasures to defend against attacks identified earlier. The information is solid though.

The book wraps up by providing a look at what a VoIP security framework should entail, and architecture diagrams to help you create and deploy a secure VoIP solution.
5 of 7 people found the following review helpful
4.0 out of 5 stars Good introduction to VoIP security Nov. 15 2007
By B. Robert Helm - Published on
This book was useful for understanding VoIP security protocols, including somewhat obscure ones such as SIP over TLS. The threats section looks like it will be valuable for convincing managers to take VoIP security seriously. I used the book to evaluate Microsoft's new VoIP products (I work for an analyst firm, Directions on Microsoft, that covers the company) and found it very helpful.

I wish that the book were organized to relate the threats and attacks to the countermeasures more clearly -- I find it easier to understand a security protocol when someone shows me what attacks it can and can't block. I'd like to see a book like this that focuses on SIP/RTP VoIP in more depth and leaves out H.323 -- I know H.323 is more widely deployed, but SIP/RTP seems to be where the big vendors are headed. Still, these are minor quibbles -- I would recommend this book to anyone who needs an introduction to VoIP network security.

Rob Helm
0 of 1 people found the following review helpful
5.0 out of 5 stars Great general book Nov. 12 2011
By J. Turner - Published on
Format:Paperback|Verified Purchase
This is a Great book for fundamental understanding of VoIP security. I recommend this book for anyone looking to learn baseline technology.
Search Customer Reviews
Only search this product's reviews

Look for similar items by category