The Role of Session Border Controllers in the DMZ of Voice over IP(VoIP) Networks

نویسندگان

  • Huihong Chen
  • Zhigang Chen
چکیده

SBCs usually sit between two service provider networks in a peering environment, or between an access network and a backbone network to provide service to residential and/or enterprise customers. They provide a variety of functions to enable or enhance session-based multi-media services (e.g., Voice over IP). This thesis analyzes the internet structure of SBC and shows single-box and dual-box SBCs in the DMZ and introduces firewalls and network address translation. And then explain how the SBC cooperates with the firewalls to ensure that VoIP signaling and media traverses the DMZ without compromising the security of the trusted network. And finally, describes topology hiding and bad protocol detection of other DMZ processing. Border Controllers (SBCs) have become an important element of modern Voice over IP(VoIP) networks, as service providers look to protect the integrity of their networks and business models while offering diverse services to their customers. Most people would agree that an SBC is a kind of firewall for Voice over IP traffic. However, as soon as you start to look beyond this initial consensus, there is considerable disagreement as to what an SBC actually is, and what function it should offer! This is partly because SBC vendors are pushing out to cover a wide variety of niches in order to compete for market share, and partly due to the genuine range of scenarios where service providers are looking for solutions. An SBC is a VoIP session-aware device that controls call admission to a network at the border of that network. Optionally (depending on the device), it can also perform a host of call-control functions to ease the load on the call agents within the network. 1.1 Internal structure of an SBC An SBC device breaks down into two logically distinct pieces. • The Signaling SBC function (SBC-SIG) controls access of VoIP signaling messages to the core of the network, and manipulates the contents of these messages. It does this by acting as a Back-to-Back User Agent (B2BUA). • The Media SBC function (SBC-MEDIA) controls access of media packets to the network, provides differentiated services and QoS for different media streams, and prevents service theft. It does this by acting as an RTP proxy. Some SBC devices offer both functions in a single box (referred to hereafter as single-box SBCs). Others take a distributed approach, and separate SBC-SIG and SBC-MEDIA onto separate machines (referred to hereafter as dual-box SBCs), using …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Securing Large and Distributed Enterprise VoIP Infrastructure Using Border Elements

Despite an increasing enterprise adoption of IPbased real-time communication systems, large and distributed enterprises have not yet fully realized the benefits of such deployments. Our work explores the architectural challenges and security concerns of a fully IP-based real-time communication infrastructure in such large, multi-site, multivendor enterprises. In this paper, we propose a novel h...

متن کامل

SIP Trunking - General Requirements for Interconnecting Enterprise Networks

Based on defined User-to-Network Interconnection (UNI) as well as Network-to-Network Interconnection (NNI) types various interconnection modes are practicable. These modes allow a further description of interconnection models as well as architecture models including interconnection functions and related interfaces. Topics covered in this article comprise functional entities and related interfac...

متن کامل

A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes

Voice over IP (VoIP) service has been widely deployed over the prevalent Internet due to the advanced technologies of digital voice compression, communication protocols, and wired/wireless networks. VoIP then benefitmuch lower cost of equipment, operation, and better integrationwith data applications than voice communications over telephony networks. On the other hand, VoIP further introduce se...

متن کامل

Securing Voice over Internet Protocol ( Ip ) Networks

Voice over IP (VOIP) the transmis­ sion of voice over traditional packetswitched IP networks is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and security challenges. Lower cost and greater flexibility are among the prom­ ises of VOIP for the enterprise, but security administrators will face signif­ icant issues. Administrators m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer and Information Science

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2008