
CHAPTER 14 Security
Mediant 4000 SBC | User's Manual
Intrusion Detection System
The device's Intrusion Detection System (IDS) feature detects malicious attacks on the device and
reacts accordingly. A remote host is considered malicious if it has reached or exceeded a user-
defined threshold (counter) of specified malicious attacks.
If malicious activity is detected, the device can do the following:
■
Block (blacklist) remote hosts (IP addresses / ports) considered by the device as malicious.
The device automatically blacklists the malicious source for a user-defined period after which it
is removed from the blacklist.
■
Send SNMP traps to notify of malicious activity and/or whether an attacker has been added to
or removed from the blacklist. For more information, see
The Intrusion Detection System (IDS) is an important feature as it ensures legitimate calls are not
being adversely affected by attacks and to prevent Theft of Service and unauthorized access.
There are many types of malicious attacks, the most common being:
■
Denial of service:
This can be Denial of Service (DoS) where an attacker wishing to prevent a
server from functioning correctly directs a large amount of requests – sometimes meaningless
and sometimes legitimate, or it can be Distributed Denial of Service (DDoS) where the attacker
controls a large group of systems to coordinate a large scale DoS attack against a system:
●
Message payload tampering: Attacker may inject harmful content into a message, e.g., by
entering meaningless or wrong information, with the goal of exploiting a buffer overflow at
the target. Such messages can be used to probe for vulnerabilities at the target.
●
Message flow tampering: This is a special case of DoS attacks. These attacks disturb the
ongoing communication between users. An attacker can then target the connection by
injecting fake signaling messages into the communication channel (such as CANCEL
messages).
●
Message Flooding: The most common DoS attack is where an attacker sends a huge
amount of messages (e.g., INVITEs) to a target. The goal is to overwhelm the target’s
processing capabilities, thereby rendering the target inoperable.
■
SPAM over Internet Telephony (SPIT):
VoIP spam is unwanted, automatically dialed, pre-
recorded phone calls using VoIP. It is similar to e-mail spam.
■
Theft of Service (ToS):
Service theft can be exemplified by phreaking, which is a type of
hacking that steals service (i.e., free calls) from a service provider, or uses a service while
passing the cost to another person.
The IDS configuration is based on IDS Policies, where each policy can be configured with a set of
IDS rules. Each rule defines a type of malicious attack to detect and the number of attacks during
an interval (threshold) before an SNMP trap is sent. Each policy is then applied to a target under
attack (SIP interface) and/or source of attack (Proxy Set and/or subnet address).
Enabling IDS
By default, IDS is disabled. You can enable it, as described below.
➢
To enable IDS:
1.
Open the IDS General Settings page (
Setup
menu >
Signaling & Media
tab >
Intrusion
Detection
folder >
IDS General Settings
).
2.
From the 'Intrusion Detection System' drop-down list, select
Enable
.
- 145 -
Summary of Contents for Mediant 4000 SBC
Page 1: ...User s Manual AudioCodes Series of Session Border Controllers SBC Mediant 4000 SBC Version 7 2...
Page 40: ...Part I Getting Started with Initial Connectivity...
Page 48: ...Part II Management Tools...
Page 113: ...Part III General System Settings...
Page 118: ...Part IV General VoIP Configuration...
Page 525: ...Part V Session Border Controller Application...
Page 654: ...Part VI Cloud Resilience Package...
Page 663: ...Part VII High Availability System...
Page 685: ...Part VIII Maintenance...
Page 759: ...Part IX Status Performance Monitoring and Reporting...
Page 844: ...Part X Diagnostics...
Page 888: ...Part XI Appendix...