Despite warnings that VoIP is vulnerable to a new breed of attacks, the biggest threat to VoIP remains weaknesses in general network security, according to a vendor presentation at the RSA Security Conference 2006.Experts are aware of possible attacks that could be made against VoIP protocols, but worms, viruses and other exploits that take down servers or congest networks in general are the exploits that hurt VoIP in practice, says David Endler, chairman of the VoIP Security Alliance (VOIPSA) and director of security research for 3Com’s TippingPoint division.Analysis of IP voice components is key to keeping VoIP networks secure, he says. For instance, some IP PBXs are based on Windows, so any security flaws in Windows are security flaws in the voice network.Customers should check the management platforms of IP voice gear as well, Endler says. For instance, some management uses TFTP protocol, which requires no authentication, so hackers could glean information about the VoIP network that could be valuable in itself or provide information for future attacks, he says. Some VoIP phones include packet capture features that are useful in tracing packets to analyze network performance. But in the wrong hands a network of phones with this feature could be used to sniff networks for sensitive traffic such as passwords, he says. “This could be problem especially if the phones are connected to a hub,” where they could view all traffic passing through.Logically segmenting VoIP traffic on its own VLAN can help keep it clear of attacks against data traffic, he says. To protect VoIP networks, Endler recommends:* Patching gear regularly against known threats.* Changing default passwords on all gear.* Following vendors’ check lists for securing gear when installed.* Using intrusion prevention gear.* Using VoIP aware firewalls to protect IP PBXs. Attacks against VoIP in particular are coming and probably soon, he says, but no one can be sure when. One likely form of attack will be fuzzing, the practice of sending malformed packets within VoIP protocols. For example, putting a string of integers in a packet when the protocol expects letters might cause IP PBXs to shut down. Methodical testing of VoIP protocols with such malformed packets at Finland’s University of Oulu have already revealed some such vulnerabilities, he says. Related content news US will take decades for supply chain independence in chips: Nvidia CEO Jensen Huang pointed out that Nvidia’s latest AI servers have 35,000 parts from all over the world, including Taiwan. By Sam Reynolds Nov 30, 2023 4 mins CPUs and Processors Technology Industry news Why are 5G private networks failing to take off in India? Lack of clarity on spectrum allocation coupled with high capital expenditure are leading to low uptake of 5G-enabled private networks in India. By Gagandeep Kaur Nov 30, 2023 5 mins Private 5G news HPE goes all-in for AI with new hybrid cloud compute, storage products At its annual Discover conference, HPE debuted a range of hybrid cloud offerings designed to allow enterprises to optimize generative AI model development and implementation. By Sascha Brodsky Nov 30, 2023 6 mins CPUs and Processors Flash Storage Generative AI news Dell provides $150M to develop an AI compute cluster for Imbue Helping the startup build an independent system to create foundation models may help solidify Dell’s spot alongside cloud computing giants in the race to power AI. By Elizabeth Montalbano Nov 29, 2023 4 mins Generative AI Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe