networks via security policies and audio CAPTCHA PhD Thesis Yannis - - PowerPoint PPT Presentation

networks via security policies and
SMART_READER_LITE
LIVE PREVIEW

networks via security policies and audio CAPTCHA PhD Thesis Yannis - - PowerPoint PPT Presentation

SPAM prevention in Voice over IP networks via security policies and audio CAPTCHA PhD Thesis Yannis Soupionis Department of Informatics, Athens University of Economics and Business July 4, 2011 Outline 2 Introduction Spam over


slide-1
SLIDE 1

PhD Thesis Yannis Soupionis

Department of Informatics, Athens University of Economics and Business

SPAM prevention in Voice over IP networks via security policies and audio CAPTCHA

July 4, 2011

slide-2
SLIDE 2

Outline

2

 Introduction  Spam over Internet Telephony (SPIT)  Session Initiation protocol (SIP)  Security policy  CAPTCHA  Formal Verification  Methodology  Research approach  Security policy  CAPTCHA  System architecture - Modules  Formal Verification & Experimental Evaluation  Contribution & Further research

slide-3
SLIDE 3

Spam over Internet Telephony (SPIT)

 Bulk unsolicited set of sessions  Call initiations  Instant messages  Presence requests

3 Introduction

Methodology Research contribution Security policy CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

Πηγή: Rosenberg J., Jennings C., The Session Initiation Protocol (SIP) and Spam, Technical Report RFC 5039, Network Working Group, January 2008

slide-4
SLIDE 4

Session Initiation Protocol

 An application-layer control (signaling) protocol for multimedia

sessions

 Initiation  Modification  Termination

4 Πηγή: J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, E. Schooler, Session Initiation Protocol (SIP), RFC 3261, June, 2002 Introduction

Methodology Research contribution Security policy CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-5
SLIDE 5

SPIT Phenomenon

5

 Implementation of mechanisms for tackling SPIT attacks by

well-known companies as NEC and Microsoft.

 Recorded SPIT attacks  4 million spam texts sent every day - telegraph.co.uk  Stop Spam And Unwanted Calls - cbsnews.com  Environmental burden due to SPAM/SPIT  Carbon Footprint of Spam ≈ 3 million cars -

thegreenitreview.com – McAfee

 Economic benefits for SPAM response rates ≈ 0,00001% -

ACM CCS 2008

Introduction

Methodology Research contribution Security policy CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-6
SLIDE 6

Research approach

6

 Composing security policy for handling SPIT

phenomenon

 Identification and evaluation of audio CAPTCHA  Implementing an original audio CAPTCHA  Design of the proposed mechanism architecture  Implementation (adaptive)  Formal Verification  Security policy mechanism  Policy integration into VoIP protocol

Introduction

Methodology Research contribution Security policy CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-7
SLIDE 7

Security Policy

 A set of rules or regulations, which has been

introduced by the system owner and is related to maintaining an acceptable level of the system security

 Standards  Procedures  Guidelines

 The proposed policy is automated

 It works as an electronic/web service

7 Πηγή: Γκρίτηαλθσ Δ. Αςφάλεια ςτισ Τεχνολογίεσ Πλθροφοριϊν & Επικοινωνιϊν: Εννοιολογικι κεμελίωςθ, Τμιμα Πλθροφορικισ, Οικονομικό Πανεπιςτιμιο Ακθνϊν Introduction

Methodology Research contribution Security policy CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-8
SLIDE 8

CAPTCHA

 Completely Automated Public Tests to tell Computers

and Humans Apart

8

 CAPTCHA categories:

 Visual: Text or images  Audio : Spoken characters  Logical : Simple questions

We have a natural mother and her daughter. Who is younger?

Πηγή: L. Ahn, M. Blum, J. Langford, "Telling humans and computers apart automatically", Communications of the ACM, p. 56-60, Vol. 47 I. 2, February 2004 Introduction

Methodology Research contribution Security policy CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-9
SLIDE 9

Formal methods

 Formal Methods refers to mathematically

rigorous techniques and tools for the specification, design and verification of software and hardware systems

 Intel Pentium (1994) -> a floating point unit flaw,

contained in the (60-100MHz) Pentium processors -> Cost: 400 million $

9 Πηγζσ: Edmund Clarke, Allen Emerson, and Joseph Sifakis, "Model Checking: Algorithmic Verification and Debugging", ACM 2007 Turing Award INTEL FDIV Replacement Program ,California., December, 1994 (http://www.intel.com/support/processors/pentium/fdiv/) Introduction

Methodology Research contribution Security policy CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-10
SLIDE 10

Methodology

10

INVITE INVITE ACCEPT REJECT REJECT HELP!!! RESULT CAPTCHA PUZZLE

Introduction

Methodology

Research contribution Security policy CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-11
SLIDE 11

Methodology

11

Identified SPIT Threats

Adaptive anti-SPIT Policy Framework (ASPF)

Theoretical Step Implementation Step

Formal Verification & Experimental Evaluation

Attack Scenarios Condition & Countermeasures XML Policy Schema Detection Module Event Module CAPTCHA Module Monitor Module Enforcement Module

Introduction

Methodology

Research contribution Security policy CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-12
SLIDE 12

12

Vulnerability Classification

  • “Anonymous” in From field
  • Sequential requests for registering and altering to registrar

Impersonation

  • Handling messages with code 301
  • Handling messages with code 403

Routing altering & Error Silencing

  • Handling responses to messages code 300
  • Use of Allow, Suspend and Supported fields

Information Drilling

  • Display-name field
  • Alert-Info and Call-Info fields

Immediate SPIT Threats

Introduction Methodology

Research contribution Security policy

CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-13
SLIDE 13

13

Attack Scenario

Introduction Methodology

Research contribution Security policy

CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-14
SLIDE 14

SPIT Attack Graph

Node Description 1

Find and collect users’ addresses

2

Send bulk messages

3

Proxies-in-the-middle attack

4

Maximize profit

5

Hide identity-track when setting-up an attack

6

Hide identity-track when sending a SPIT call/message

7

Encapsulate SPIT in SIP messages

1

Find and collect users’ addresses

5

Hide identity-track when setting-up an attack

7

Encapsulate SPIT in SIP messages

14

Introduction Methodology

Research contribution Security policy

CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-15
SLIDE 15

Scenario

The caller’s user agent receives a response with a 300 message /code (Multiple Choices), which includes a new address in Contact field

Attribute Message 300 Attribute Contact Field New SIP address Sub-condition Code=300 Sub-condition Contact  One Condition Code=300  Contact  One

Policy Element / Rule

15

Introduction Methodology

Research contribution Security policy

CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-16
SLIDE 16

Condition Code=300  Contact  One

Suggested Countermeasures

1. The UAC uses the specific address to compose upcoming messages 2. The UAC renews the entries for the specific UAS 3. User is informed for the new SIP addresses. 4. The UAC rejects the call and returns a Message 403 (Forbidden) 5. The UAC rejects the call and returns a message 606 (Not Acceptable) 6. The UAC forwards SIP message to another entity and returns a message 183 (Session in Progress)

Policy Element / Rule (2)

𝐷𝑝𝑜𝑒𝑗𝑢𝑗𝑝𝑜 = 𝑔 𝑑1, 𝑑2, … , 𝑑𝑙 = 𝑑1 ⋄ 𝑑2 ⋄ ⋯ ⋄ 𝑑𝑙

, where ci sub-condition and ⋄ logical operator

16

Introduction Methodology

Research contribution Security policy

CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-17
SLIDE 17

anti-SPIT Policy Creation

Set of attack scenarios

Suggested Countermeasures SPIT condition

Attack scenario

SPIT condition + Applied action

Policy Instance

Set of SIP response messages Notification method

Policy Element Policy Element Policy Element Policy Element

. . .

Attribute Attribute

. . .

Notify Block

. . .

Sub-condition Sub-condition

. . .

SPIT condition

Attack scenario Attribute Attribute

. . .

Sub-condition Sub-condition

. . .

Policy Element

17 Πηγή: Y. Soupionis, S. Dritsas, D. Gritzalis, "An adaptive policy-based approach to SPIT management", in Proc. of the 13th European Symposium

  • n Research in Computer Security (ESORICS 2008), Lopez J., Jajodia S. (Eds.), pp. 446-460, Springer, Malaga, October 2008.

Introduction Methodology

Research contribution Security policy

CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-18
SLIDE 18

18

XML Schema

RuleItem Subject Rule Action Condition Trigger

Caller Callee Proxy Domain Caller Domain Callee

Πηγή: Y. Soupionis, S. Dritsas, D. Gritzalis, "An adaptive policy-based approach to SPIT management", in Proc. of the 13th European Symposium

  • n Research in Computer Security (ESORICS 2008), Lopez J., Jajodia S. (Eds.), pp. 446-460, Springer, Malaga, October 2008.

Introduction Methodology

Research contribution Security policy

CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-19
SLIDE 19

19

XML Schema

Πηγή: Y. Soupionis, S. Dritsas, D. Gritzalis, "An adaptive policy-based approach to SPIT management", in Proc. of the 13th European Symposium

  • n Research in Computer Security (ESORICS 2008), Lopez J., Jajodia S. (Eds.), pp. 446-460, Springer, Malaga, October 2008.

Introduction Methodology

Research contribution Security policy

CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further research

slide-20
SLIDE 20

CAPTCHA

20

INVITE INVITE ACCEPT REJECT REJECT HELP!!! RESULT CAPTCHA PUZZLE

Introduction Methodology

Research contribution

Security policy

CAPTCHA

Architecture & Modules Verification & Evaluation Contribution & Further research

slide-21
SLIDE 21

CAPTCHA

21

 Every proposed CAPTCHA must be:

 Easy for humans to solve.  Easy for a tester machine to generate and grade.  Hard for a software bot to solve.

 The ideal CAPTCHA should tackle 100% of attacks

 In real life > 97%

Πηγή: Chellapilla K, Larson K, Simard P, and Czerwinski M (2005), “Designing Human Friendly Human Interaction Proofs (HIPs),” in Conference on Human factors In computing systems, CHI 2005. ACM Press

Introduction Methodology

Research contribution

Security policy

CAPTCHA

Architecture & Modules Verification & Evaluation Contribution & Further research

slide-22
SLIDE 22

CAPTCHA Implementation and Evaluation Process

22

Decision

No

Estimate Bot Success Estimate User Success Create CAPTCHA Final CAPTCHA

Yes

Select CAPTCHA attributes

Decision: Until (UR>ā) AND (BR<ē) UR: User Success Rate BR: Bot Success Rate ā: User Rate Threshold ē: Bot Rate Threshold

Introduction Methodology

Research contribution

Security policy

CAPTCHA

Architecture & Modules Verification & Evaluation Contribution & Further research

slide-23
SLIDE 23

CAPTCHA Attributes

23

Audio CAPTCHA Vocabulary Duration

Language Requirements Data field Variable Character Number Character Between Characters Total Intermediate

Production Procedure

CAPTCHA Reappearence Automated Background

Noise

Πηγή: Soupionis Y., Tountas G., Gritzalis D., "Audio CAPTCHA for SIP-based VoIP", in Proc. of the 24th International Information Security Conference (SEC-2009), pp. 25-38, Gritzalis D., Lopez J. (Eds.), IFIP AICT 297, Springer, Cyprus, May 2009.

Introduction Methodology

Research contribution

Security policy

CAPTCHA

Architecture & Modules Verification & Evaluation Contribution & Further research

slide-24
SLIDE 24

CAPTCHA Selected Attributes

24

Different announcers Intermediate noise Random positioning

  • f each digit

Different duration Background noise Proposed CAPTCHA Digits {0,…,9}

Introduction Methodology

Research contribution

Security policy

CAPTCHA

Architecture & Modules Verification & Evaluation Contribution & Further research

slide-25
SLIDE 25

Software Bots for CAPTCHA solving

25

SPHINX – Speech recognition tool:

+ has a large community of developers who use and

maintain it

+ has pluggable language/grammar and acoustic

models, therefore no training is needed

  • consumes “great” computational resources
  • is ineffective to “particular” environmental

conditions

Introduction Methodology

Research contribution

Security policy

CAPTCHA

Architecture & Modules Verification & Evaluation Contribution & Further research

slide-26
SLIDE 26

Software Bots for CAPTCHA solving

26

The frequency and energy pick detection bots:

+ have been proven effective + are easy to implement + require limited time to solve a CAPTCHA + occupy a small amount of system recourses

  • require a training session, where a human identifies a

number of selected CAPTCHA

Introduction Methodology

Research contribution

Security policy

CAPTCHA

Architecture & Modules Verification & Evaluation Contribution & Further research

slide-27
SLIDE 27

Software Bots for CAPTCHA solving

27

  • Frequency

and energy pick detection bots

Introduction Methodology

Research contribution

Security policy

CAPTCHA

Architecture & Modules Verification & Evaluation Contribution & Further research

slide-28
SLIDE 28

Bot experiments

28

Stage 1 SPIT Stage 0 Stage 2 Correct?

Yes No

BOT DOMAIN DOMAIN2 UA2

Introduction Methodology

Research contribution

Security policy

CAPTCHA

Architecture & Modules Verification & Evaluation Contribution & Further research

slide-29
SLIDE 29

Bot applicability

29

10 20 Captcha Playback Wait for Answer

timeout answer

x

 Conditions:  6 sec to respond  maximum number of

attempts = three (3)

Stage Step Duration (sec) 1 Reform audio Identify digits ~ 1.00 ~ 0.15 2 Create SIPp message Send SIPp message ~ 0.40 ~ 0.00 Total Duration (sec) ~ 1.55

Introduction Methodology

Research contribution

Security policy

CAPTCHA

Architecture & Modules Verification & Evaluation Contribution & Further research

slide-30
SLIDE 30

Commercial CAPTCHA characteristics

30 Audio CAPTCHA Attributes Google MSN Recaptcha eBay Secure image captcha Mp3 Captcha Captchas. net bokehman slashdot Authorize AOL Digg User success rate

60% 80% 50% 95% 98% 98% 98% 98% 95% 95% 95% 95%

Background noise

voice, noise voice, noise noise voice, noise noise none none none none none voice noise

Intermediate noise

noise noise none none none none none none none none noise none

Data field

0-9 0-9 phrases 0-9 A-Z, a-z,0-9 A-Z, a-z, 0-9 a-z, 0-9 A-Z, a-z,0-9 word (a-z) A-Z, a-z,0-9 A-Z, a-z, 0-9 A-Z, a- z, 0-9

Spoken characters variation

5-10 10 yes 6 4 4 6 4 <9 5 8 5

Streaming reproduction

yes yes yes yes no yes yes no no yes yes yes

Rare reappearance

yes yes yes yes yes yes yes yes no yes yes yes

Production process

not applicable not applicable not applicable not applicabl e automated automat ed automated automated not applicable not applicable not applica ble not applic able

Language requirements

multiple languages multiple languages en multiple language s en en , fr , it, de en, de , it , nl , fr en en en en en

Various speakers

yes no yes yes no no no no no no yes No

Duration (sec)

0:10-0:15 0:05-0:09 ~0:04 ~0:04 ~0:04 ~0:04 ~0:08 0:04-0:05 0:03-0:04 0:05 0:10 0:08

Beeps (before, after)

3,0 3,2

Πηγή: Soupionis Y., Gritzalis D., "Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony", Computers & Security, Vol. 29, Νο. 5, pp. 603-618, 2010

Introduction Methodology

Research contribution

Security policy

CAPTCHA

Architecture & Modules Verification & Evaluation Contribution & Further research

slide-31
SLIDE 31

Commercial CAPTCHA characteristics

31 Audio CAPTCHA Attributes Google MSN Recaptcha eBay Secure image captcha Mp3 Captcha Captchas. net bokehman slashdot Authorize AOL Digg User success rate

60% 80% 50% 95% 98% 98% 98% 98% 95% 95% 95% 95%

Background noise

Φωνζσ, ιχοσ Φωνζσ, ιχοσ Ήχοσ Φωνζσ, ιχοσ Ήχοσ Όχι Όχι Όχι Όχι Όχι Φωνζσ Ήχοσ

Intermediate noise

Ήχοσ Ήχοσ Όχι Όχι Όχι Όχι Όχι Όχι Όχι Όχι Ήχοσ Όχι

Data field

0-9 0-9 Λζξεισ 0-9 A-Z, a-z,0-9 A-Z, a-z, 0-9 a-z, 0-9 A-Z, a-z, 0-9 Λζξεισ A-Z, a-z,0-9 A-Z, a-z, 0-9 A-Z, a- z, 0-9

Spoken characters variation

5-10 10 10-20 6 4 4 6 4 <9 5 8 5

Streaming reproduction

Ναι Ναι Ναι Ναι Ναι Ναι Ναι Ναι Όχι Ναι Ναι Ναι

Rare reappearance

Ναι Ναι Ναι Ναι Όχι Ναι Ναι Όχι Όχι Ναι Ναι Ναι

Production process

Άγνωςτθ Άγνωςτθ Άγνωςτθ Άγνωςτθ Αυτόματθ Αυτόματθ Αυτόματθ Αυτόματθ Άγνωςτθ Άγνωςτθ Άγνωςτ θ Άγνως τθ

Language requirements

Πολλζσ γλϊςςεσ Πολλζσ γλϊςςεσ en Πολλζσ γλϊςςεσ en en, fr, it, de en, de, it, nl, fr en en en en en

Various speakers

Ναι Όχι Ναι Όχι Ναι Όχι Όχι Όχι Όχι Όχι Ναι Όχι

Duration (sec)

0:10-0:15 0:05-0:09 ~0:04 ~0:04 ~0:04 ~0:04 ~0:08 0:04-0:05 0:03-0:04 0:05 0:10 0:08

Beeps (before, after)

3,0 0,0 0,0 0,0 0,0 0,0 0,0 0,0 0,0 0,0 3,2 0,0

10 Όχι Όχι 60% Λζξεισ – Α-Ζ

Πηγή: Soupionis Y., Gritzalis D., "Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony", Computers & Security, Vol. 29, Νο. 5, pp. 603-618, 2010

4 4

Introduction Methodology

Research contribution

Security policy

CAPTCHA

Architecture & Modules Verification & Evaluation Contribution & Further research

slide-32
SLIDE 32

Proposed CAPTCHA

Different announcers Background noise Intermediate noise Digit distribution Training CAPTCHA Stage 1 1 20 Stage 2 7  50 Stage 3 7  100 Stage 4 7  100 Stage 5 7  100

32 of 18

32

Πηγζσ: Soupionis Y., Gritzalis D., "Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony", Computers & Security, Vol. 29, Νο. 5, pp. 603-618, 2010 Gritzalis D., Marias G., Rebahi Y. Soupionis Y., Elhert S., “SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT)”, Journal of Computer Security, (to appear)

Introduction Methodology

Research contribution

Security policy

CAPTCHA

Architecture & Modules Verification & Evaluation Contribution & Further research

slide-33
SLIDE 33

Προτεινόμενο CAPTCHA

Διαφορετικοί εκφωνητζσ Θόρυβοσ υποβάθρου Ενδιάμεςοσ θόρυβοσ Κατανομή ψηφίων CAPTCHA εκπαίδευςησ Στάδιο 1 1 20 Στάδιο 2 7  50 Στάδιο 3 7  100 Στάδιο 4 7  100 Στάδιο 5 7  100

33 of 18

Στάδιο 1 Στάδιο 2 Στάδιο 3 Στάδιο 5

33

Πηγζσ: Soupionis Y., Gritzalis D., "Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony", Computers & Security, Vol. 29, Νο. 5, pp. 603-618, 2010 Gritzalis D., Marias G., Rebahi Y. Soupionis Y., Elhert S., “SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT)”, Journal of Computer Security, (to appear)

Proposed VoIP CAPTCHA Attributes

User success rate 88% Rare reappearance yes Background noise music, noise Production process automated Intermediate noise voice, music, noise Language requirements multiple languages Data field 0-9 Various speakers yes Spoken characters variation 3-4 Duration (sec) 2-6 Streaming reproduction yes Beeps (before, after)

Introduction Methodology

Research contribution

Security policy

CAPTCHA

Architecture & Modules Verification & Evaluation Contribution & Further research

slide-34
SLIDE 34

ASPF Modules

34

  • Stores XML policy documents for the VoIP domains and users

Policy Repository

  • Retrieves the appropriate XML policy instance document and the

SIP message attributes, and decides whether the SIP message is a SPIT threat or not

Policy Decision Module

  • Enforces the decisions made by the Policy Decision Module
  • Belongs in application layer

Policy Enforcement Module

  • Stores information regarding SPIT ( characteristics of messages)

History Event Log Module

Introduction Methodology

Research contribution

Security policy CAPTCHA

Architecture & Modules

Verification & Evaluation Contribution & Further research

slide-35
SLIDE 35

ASPF Modules

35

  • Supervises the consumption of the computational resources

(memory and CPU). Two upper thresholds, MemΤ and CPUΤ

Monitor Module

  • Is being activated when the Policy Decision Module sends it a

message

  • Executes evaluation procedure

Event Module

  • Sends and evaluates CAPTCHA

CAPTCHA Module

Introduction Methodology

Research contribution

Security policy CAPTCHA

Architecture & Modules

Verification & Evaluation Contribution & Further research

slide-36
SLIDE 36

Evaluation Procedure

36

 The number of messages that were initiated in a certain time

frame from a specific user

 The number of missed calls in a certain time frame  The number of calls to "bogus" numbers in a certain time

frame

 Identifying patterns for SIP addresses  SIP message characteristics (header fields)

Πηγζσ: S. Dritsas, Y. Soupionis, M. Theoharidou, J. Mallios, D. Gritzalis, ”SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned”, in

  • Proc. of the IFIP 23st International Information Security Conference (SEC-2008), pp. 381-395, Springer, Milan, Italy, September 2008.

Marias G., Theoharidou M., Soupionis Y., Ehlert S., Gritzalis D., "SIP vulnerabilities for SPIT, SPIT identification criteria and anti-SPIT mechanisms evaluation framework", in IP Handbook: Services, Technologies, and Security of Session Initiation Protocol, Ilyas M., Ahson S. (Eds.), CRC Press, USA, 2008.

Introduction Methodology

Research contribution

Security policy CAPTCHA

Architecture & Modules

Verification & Evaluation Contribution & Further research

slide-37
SLIDE 37

Evaluation Procedure

37 Πηγζσ: S. Dritsas, Y. Soupionis, M. Theoharidou, J. Mallios, D. Gritzalis, ”SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned”, in

  • Proc. of the IFIP 23st International Information Security Conference (SEC-2008), pp. 381-395, Springer, Milan, Italy, September 2008.

Marias G., Theoharidou M., Soupionis Y., Ehlert S., Gritzalis D., "SIP vulnerabilities for SPIT, SPIT identification criteria and anti-SPIT mechanisms evaluation framework", in IP Handbook: Services, Technologies, and Security of Session Initiation Protocol, Ilyas M., Ahson S. (Eds.), CRC Press, USA, 2008.

 Call Duration  SIP messages’ characteristics analysis

ch = Number of “suspicious” characteristics mt = address motives

Introduction Methodology

Research contribution

Security policy CAPTCHA

Architecture & Modules

Verification & Evaluation Contribution & Further research

slide-38
SLIDE 38

ASPF architecture

38 Policy Elements (Condition, Actions) SIP Message SIP Message Attributes Decision Module Event Module Policy Repository History/Event Log

1 2 2

Enforcement Module

3 7 8 5 4

XML Policy Monitor Module

9

CAPTCHA Module

6

Πηγή: Soupionis Y., Gritzalis D., “ASPF: An Adaptive anti-SPIT Policy-based Framework”, in Proc. of the 6th International Conference

  • n Availability, Reliability and Security (ARES-2011), Pernul G., et al. (Eds.), Austria, August 2011 (to appear).

Introduction Methodology

Research contribution

Security policy CAPTCHA

Architecture & Modules

Verification & Evaluation Contribution & Further research

slide-39
SLIDE 39

Experimental Evaluation

39

 Performance depends on two questions/metrics:

 How much of our system resources are consumed? ,

and

 Is the time needed for handling SIP messages a

noticeable delay?

 Two testing environments:

 Laboratory  Simulation (modelnet)

Introduction Methodology

Research contribution

Security policy CAPTCHA Architecture & Modules

Verification & Evaluation

Contribution & Further research

slide-40
SLIDE 40

Laboratory Environment

 A SIP SER server  An ASPF platform  A number of internal clients  Various external clients

40

Introduction Methodology

Research contribution

Security policy CAPTCHA Architecture & Modules

Verification & Evaluation

Contribution & Further research

slide-41
SLIDE 41

Scenario & Results

 6 external and 1000 internal clients  60000 messages were sent including 15153 SPIT (25,3%)  Every internal client has a different policy instance  Only 312 SPIT messages were forwarded to legitimate

users

 Average message processing time 424 ms

41

Introduction Methodology

Research contribution

Security policy CAPTCHA Architecture & Modules

Verification & Evaluation

Contribution & Further research

slide-42
SLIDE 42

Simulation Environment

IP Phone Messages Domains Legitimate SPIT 1 5000 2,3 2 1000 4000 2,3 3 5000 1 4 6000 3 5 10000 1,3 6 3000 7000 1,3 7 5000 1 8 4000 2 9 6000 1,2

Introduction Methodology Anti-SPIT policy ASPF Modules ASPF architecture

Experimental evaluation

Conclusions and further research

42

slide-43
SLIDE 43

Simulation Environment

IP Phone Messages Domains Legitimate SPIT 1 5000 2,3 2 1000 4000 2,3 3 5000 1 4 6000 3 5 10000 1,3 6 3000 7000 1,3 7 5000 1 8 4000 2 9 6000 1,2

ASPFs Messages

Served Rejected Lost Domain 1 16895 3122 79 Domain 3 25598 6641 41 IP phone 1 7112 IP phone 3 3087 363 IP phone 4 2832 874 IP phone 5 3100 IP phone 9 7102

43

Introduction Methodology

Research contribution

Security policy CAPTCHA Architecture & Modules

Verification & Evaluation

Contribution & Further research

slide-44
SLIDE 44

Formal Verification

44

 Model checking communication protocols  A finite state model representing at a suitable abstraction level

  • f the system behavior where the protocol runs in one or more

concurrent protocol sessions

 Correctness properties  Assertions or temporal logic formulae that are algorithmically

validated by state exploration across all possible execution paths

 Operational errors or security flaws  Detected in the form of safety or liveness property violations  Tool used is SPIN  A popular open-source software tool

Introduction Methodology

Research contribution

Security policy CAPTCHA Architecture & Modules

Verification & Evaluation

Contribution & Further research

slide-45
SLIDE 45

ASPF & SIP – SPIN model

45

  • 1. A model for a single SIP protocol session according to the protocol

specification was created (PROMELA).

  • 2. The collected time data values from the experiments were integrated in

the SPIN.

  • 3. A second protocol entity (Callee) were created (parallel SIP session).
  • 4. The ASPF policy integrated into the SPIN SIP model.
  • 5. SPIN’s state exploration functions allowed model checking to identify
  • 1. possible deadlocks,
  • 2. states that potentially violate SIP functional properties
  • 3. timely session establishment (Linear Temporal Logic)

Πηγζσ: Soupionis Y., Basagiannis S., Katsaros P., Gritzalis D., “A formally verified mechanism for countering SPIT”, in Proc. of the 5th International Conference on Critical Information Infrastructure Security (CRITIS-2010), Xenakis C., Wolthusen S. (Eds.), Springer, Greece, September 2010. Soupionis Y., Basagiannis S., Katsaros P., Gritzalis D., "Formal analysis of a robust policy to counter SPIT using model checking", (submitted, Journal of Computer Security).

Introduction Methodology

Research contribution

Security policy CAPTCHA Architecture & Modules

Verification & Evaluation

Contribution & Further research

slide-46
SLIDE 46

ASPF & SIP – SPIN model

46

Message codes:

 INVITE (Caller)  2xx successful response (Callee)  3xx redirection response (Domain 2)  4xx request failure (Domain 2)  6xx global failure (Domain 2)  ACK (Caller)

Omitted messages:

 1xx provisional

Introduction Methodology

Research contribution

Security policy CAPTCHA Architecture & Modules

Verification & Evaluation

Contribution & Further research

slide-47
SLIDE 47

ASPF & SIP – SPIN model

47

Κωδικοί μθνυμάτων:

 INVITE (Καλϊν)  2xx επιτυχισ απάντθςθ (Καλοφμενοσ)  3xx ανακατεφκυνςθ response (Τομζασ 2)  4xx αποτυχία αίτθςθσ (Τομζασ 2 )  6xx αποτυχία ςυςτιματοσ(Τομζασ 2 )  ACK (Καλϊν)

Παράλθψθ Μθνυμάτων:

 1xx προαιρετικά

Q1: [](q  p)

Formula Temporal

  • perator

Left associative implication

Introduction Methodology

Research contribution

Security policy CAPTCHA Architecture & Modules

Verification & Evaluation

Contribution & Further research

slide-48
SLIDE 48

ASPF & SIP – SPIN model

48

Κωδικοί μθνυμάτων:

 INVITE (Καλϊν)  2xx επιτυχισ απάντθςθ (Καλοφμενοσ)  3xx ανακατεφκυνςθ response (Τομζασ 2)  4xx αποτυχία αίτθςθσ (Τομζασ 2 )  6xx αποτυχία ςυςτιματοσ(Τομζασ 2 )  ACK (Καλϊν)

Παράλθψθ Μθνυμάτων:

 1xx προαιρετικά

Q1: [](q  p)

sessions==0

time<4000

Introduction Methodology

Research contribution

Security policy CAPTCHA Architecture & Modules

Verification & Evaluation

Contribution & Further research

slide-49
SLIDE 49

Verification Results

49

 Absence of deadlocks  Executions either terminate with successfully completed initiated

sessions or with failed sessions, due to dispatched messages that declare an error.

 Call establishment timeliness for all error-absent execution

paths

 For both versions of the model.

Property Description States Transitions Memory (MB)

Session Establishment < 4000 ms 3.8e+06 7.181e+06 585.309 Parallel Session Successful Completion < 6500 ms 3.8e+06 7.246e+06 616.11 Full State Space with no errors (Deadlock absence) 3.8e+06 7.181e+06 585.309

Introduction Methodology

Research contribution

Security policy CAPTCHA Architecture & Modules

Verification & Evaluation

Contribution & Further research

slide-50
SLIDE 50

ASPF vs. other anti SPIT mechanisms

50 Κριτιρια Anti-SPIT Mechanisms SPIT Rate Reliability Rapidity User transparency Resources consumption Implementation cost Vulnerability Privacy Scalability Adaptive Availability

ASPF

         

Spit Mitigation

   

SIP –SPAM Detection

Gray-leveling

  

VoIP Seal

SPIT Prevention Framework

   

VSD

   

CallRank

Trust Chain

Introduction Methodology

Research contribution

Security policy CAPTCHA Architecture & Modules

Verification & Evaluation

Contribution & Further research

slide-51
SLIDE 51

Contribution

 Composing security policy

for handling SPIT phenomenon

  • C1. Y. Soupionis, S. Dritsas, D. Gritzalis, "An adaptive policy-

based approach to SPIT management", in Proc. of the 13th European Symposium on Research in Computer Security (ESORICS 2008), Lopez J., Jajodia S. (Eds.), pp. 446-460, Springer, Malaga, October 2008.

  • C2. Dritsas S., Soupionis Y. , Theoharidou M., Mallios J. ,

Gritzalis D., ”SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned”, in Proc. of the IFIP 23st International Information Security Conference (SEC-2008), pp. 381-395, Springer, Milan, Italy, September 2008.

  • B1. Marias G., Theoharidou M., Soupionis Y., Ehlert S.,

Gritzalis D., "SIP vulnerabilities for SPIT, SPIT identification criteria and anti-SPIT mechanisms evaluation framework", in IP Handbook: Services, Technologies, and Security of Session Initiation Protocol, Ilyas M., Ahson S. (Eds.), CRC Press, USA, 2008.

  • J1. Gymnopoulos L, Tsoumas V., Soupionis Y., Gritzalis S., “A

Generic Grid Security Policy Reconciliation Framework”, Internet Research, Emerald Group Publishing Limited, 2005 Volume: 15, Issue: 5, Page: 508 – 517.

51

Introduction Methodology Research contribution Security policy CAPTCHA Architecture & Modules Verification & Evaluation

Contribution & Further Research

slide-52
SLIDE 52

Contribution

 Identification, evaluation

and implementation of audio CAPTCHA

  • C1. Y. Soupionis, S. Dritsas, D. Gritzalis, "An adaptive policy-

based approach to SPIT management", in Proc. of the 13th European Symposium on Research in Computer Security (ESORICS 2008), Lopez J., Jajodia S. (Eds.), pp. 446-460, Springer, Malaga, October 2008.

  • C2. Dritsas S., Soupionis Y. , Theoharidou M., Mallios J. ,

Gritzalis D., ”SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned”, in Proc. of the IFIP 23st International Information Security Conference (SEC-2008), pp. 381-395, Springer, Milan, Italy, September 2008.

  • B1. Marias G., Theoharidou M., Soupionis Y., Ehlert S.,

Gritzalis D., "SIP vulnerabilities for SPIT, SPIT identification criteria and anti-SPIT mechanisms evaluation framework", in IP Handbook: Services, Technologies, and Security of Session Initiation Protocol, Ilyas M., Ahson S. (Eds.), CRC Press, USA, 2008.

  • J1. Gymnopoulos L, Tsoumas V., Soupionis Y., Gritzalis S., “A

Generic Grid Security Policy Reconciliation Framework”, Internet Research, Emerald Group Publishing Limited, 2005 Volume: 15, Issue: 5, Page: 508 – 517.

52

  • J2. Gritzalis D., Marias G., Rebahi Y., Soupionis Y., Elhert S.,

“SPIDER: A platform for managing SIP-based Spam

  • ver Internet Telephony (SPIT)”, Journal of Computer

Security, (to appear)

  • J3. Soupionis Y., Gritzalis D., "Audio CAPTCHA: Existing

solutions assessment and a new implementation for VoIP telephony", Computers & Security, Vol. 29, Νο. 5,

  • pp. 603-618, 2010.
  • C3. Soupionis Y., Tountas G., Gritzalis D., "Audio CAPTCHA

for SIP-based VoIP", in Proc. of the 24th International Information Security Conference (SEC-2009), pp. 25-38, Gritzalis D., Lopez J. (Eds.), IFIP AICT 297, Springer, Cyprus, May 2009.

  • C4. Gritzalis D., Soupionis Y., "Human or Bot? Let an audio

CAPTCHA decide", in Proc. of the 4th Workshop on Practical Aspects of Security (PRACSE '09), Dimitriou T. (Ed.), Athens, June 2009.

Introduction Methodology Research contribution Security policy CAPTCHA Architecture & Modules Verification & Evaluation

Contribution & Further Research

slide-53
SLIDE 53

 Design and

implementation of the proposed mechanism

 Formal Verification

  • C1. Y. Soupionis, S. Dritsas, D. Gritzalis, "An adaptive policy-

based approach to SPIT management", in Proc. of the 13th European Symposium on Research in Computer Security (ESORICS 2008), Lopez J., Jajodia S. (Eds.), pp. 446-460, Springer, Malaga, October 2008.

  • C2. Dritsas S., Soupionis Y. , Theoharidou M., Mallios J. ,

Gritzalis D., ”SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned”, in Proc. of the IFIP 23st International Information Security Conference (SEC-2008), pp. 381-395, Springer, Milan, Italy, September 2008.

  • B1. Marias G., Theoharidou M., Soupionis Y., Ehlert S.,

Gritzalis D., "SIP vulnerabilities for SPIT, SPIT identification criteria and anti-SPIT mechanisms evaluation framework", in IP Handbook: Services, Technologies, and Security of Session Initiation Protocol, Ilyas M., Ahson S. (Eds.), CRC Press, USA, 2008.

  • J1. Gymnopoulos L, Tsoumas V., Soupionis Y., Gritzalis S., “A

Generic Grid Security Policy Reconciliation Framework”, Internet Research, Emerald Group Publishing Limited, 2005 Volume: 15, Issue: 5, Page: 508 – 517.

53

  • J2. Gritzalis D., Marias G., Rebahi Y., Soupionis Y., Elhert S.,

“SPIDER: A platform for managing SIP-based Spam

  • ver Internet Telephony (SPIT)”, Journal of Computer

Security, (to appear)

  • J3. Soupionis Y., Gritzalis D., "Audio CAPTCHA: Existing

solutions assessment and a new implementation for VoIP telephony", Computers & Security, Vol. 29, Νο. 5,

  • pp. 603-618, 2010.
  • C3. Soupionis Y., Tountas G., Gritzalis D., "Audio CAPTCHA

for SIP-based VoIP", in Proc. of the 24th International Information Security Conference (SEC-2009), pp. 25-38, Gritzalis D., Lopez J. (Eds.), IFIP AICT 297, Springer, Cyprus, May 2009.

  • C4. Gritzalis D., Soupionis Y., "Human or Bot? Let an audio

CAPTCHA decide", in Proc. of the 4th Workshop on Practical Aspects of Security (PRACSE '09), Dimitriou T. (Ed.), Athens, June 2009.

  • C5. Soupionis Y., Gritzalis D., “ASPF: An Adaptive anti-SPIT

Policy-based Framework”, in Proc. of the 6th International Conference on Availability, Reliability and Security (ARES-2011), Pernul G., et al. (Eds.), Austria, August 2011 (to appear).

  • C6. Soupionis Y., Basagiannis S., Katsaros P., Gritzalis D., “A

formally verified mechanism for countering SPIT”, in

  • Proc. of the 5th International Conference on Critical

Information Infrastructure Security (CRITIS-2010), Xenakis C., Wolthusen S. (Eds.), Springer, Greece, September 2010.

  • J4. Soupionis Y., Basagiannis S., Katsaros P., Gritzalis D.,

"Formal analysis of a robust policy to counter SPIT using model checking", (submitted, Journal of Computer Security).

Contribution

Introduction Methodology Research contribution Security policy CAPTCHA Architecture & Modules Verification & Evaluation

Contribution & Further Research

slide-54
SLIDE 54

Further Research

54

 Formal verification:

 Correctness properties  Study error scenarios that will be generated with a powerful

intruder model entity

 Handling SPIT phenomenon:

 Enhance a distributed perspective to ASPF

 Audio CAPTCHA:

 Evaluation of CAPTCHA's effectiveness and its attributes by some

additional audio/speech recognition tools

 Regulatory framework:

 Study National and European institutional and regulatory

framework

Introduction Methodology Research contribution Security policy CAPTCHA Architecture & Modules Verification & Evaluation

Contribution & Further Research

slide-55
SLIDE 55

Thank you

55

Introduction Methodology Research contribution Security policy CAPTCHA Architecture & Modules Verification & Evaluation Contribution & Further Research

slide-56
SLIDE 56

56

References

  • 1. Dritsas S., Tsoumas B., Dritsou V., Konstantopoulos, P., Gritzalis D., “OntoSPIT: SPIT Management through

Ontologies”, Computer Communications, vol. 32, no. 2, pp. 203-212, 2009.

  • 2. Gritzalis D., Mallios J., “A SIP-based SPIT management framework”, Computers & Security, vol. 27, no. 5-6, pp. 136-

153, 2008.

  • 3. Gritzalis D., Marias G., Rebahi Y., Soupionis Y., Ehlert, S., “SPIDER: A platform for managing SIP-based spam over

Interent Telephony”, Journal of Computer Security, vol. 19, no. 5, pp. 835-867, 2011.

  • 4. Gritzalis S., Gritzalis D., “A digital seal solution for deploying trust on commercial transactions”, Information

Management & Computer Security Journal, vol. 9, no. 2, pp. 71-79, March 2001.

  • 5. Kandias M., Virvilis N., Gritzalis D., “The insider threat in Cloud Computing”, Proc. of the 6th International Workshop on

Critical Infrastructure Security, pp. 93-103, Springer (LNCS 6983), Switzerland, 2011.

  • 6. Kandias M., Mylonas A., Virvilis N., Theoharidou M., Gritzalis D., “An Insider Threat Prediction Model”, Proc. of the

7th International Conference on Trust, Privacy and Security in Digital Business, pp. 26-37, Springer (LNCS 6264), Spain, 2010.

  • 7. Soupionis Y., Gritzalis D., “ASPF: An adaptive anti-SPIT policy-based framework”, Proc. of the 6th International

Conference on Availability, Reliability and Security, pp. 153-160, Austria, 2011.

  • 8. Soupionis Y., Tountas G., Gritzalis D., “Audio CAPTCHA for SIP-based VoIP”, Proc. of the 24th International

Information Security Conference, pp. 25-38, Springer (IFIP AICT 297), Cyprus, 2009.

  • 9. Soupionis Y., Dritsas S., Gritzalis D., “An adaptive policy-based approach to SPIT management”, Proc. of the 13th

European Symposium on Research in Computer Security, pp. 446-460, Springer, Spain, 2008.

  • 10. Soupionis Y., Gritzalis D., “Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP

telephony”, Computers & Security, vol. 29, nο. 5, pp. 603-618, 2010.

  • 11. Soupionis Y., Basagiannis S., Katsaros P., Gritzalis D., “A formally verified mechanism for countering SPIT”, in Proc.
  • f the 5th International Conference on Critical Information Infrastructure Security, pp. 128-139, LNCS-6712, Springer, Greece,

September 2010.

  • 12. Tsoumas V., Dritsas S., Gritzalis D., “An ontology-based approach to network security management”, Proc. of the 3rd

International Conference on Mathematical Models, Methods and Architectures for Computer Network Security, pp. 151-164, Springer, September 2005.