SIP Protect & Monitoring
SIP Protection &
why it's IMPORTANT
why it's IMPORTANT
Cloud Kinnekt's SIP Protect Module provides protection from attacks on your internet voice solution.
Unprotected CloudPBX systems are very sensitive to attacks such as brute-force break-in attempts and Denial of Service which are quite frequent and an unpredictable threat.
The most common consequences of this kind of network attacks include but are not limited to system downtime, call quality issues due to an overloaded network, direct financial loss due to network instability and unauthorised calls being made on your account to high call rate overseas countries.
Our SIP Protection Module's main purpose is to prevent those attacks and give you peace of mind.
Advanced Threat Detection
Unlike other similar solutions, SIP Protect works with LIVE SIP traffic, constantly monitoring SIP packets being received.
Potential attacks are instantly detected and SIP Protect updates the firewall rules and blocks IP addresses from which the attack is coming for a specific amount of time, these are then listed in the table to the right and updated regularly.
To detect SIP attacks, SIP Protect uses the following advanced detection techniques: Pattern recognition, SIP Scanners protection (immediately blocking known SIP scanners), TFTP brute force protection, and SIP protocol anomaly detection.
Dynamic Blocking and Unblocking
SIP Protect features a fully automated attack protection system which blocks attacks more efficiently than most other solutions.
In the case of an attack, it updates the firewall rules and blocks IP addresses from which the attack is coming for a specific amount of time.
If attacks stop in a certain period of time, SIP Protect unblocks compromised IP addresses automatically.
Auto Provisioning Attack Detection
Auto-provisioning service is generally considered one of the most vulnerable spots of a CloudPBX system.
SIP Protect covers this segment as well through the integrated TFTP Brute Force attack detection. An active attacker can redirect profile provisioning request and change the configuration parameters. Then the attacker can redirect phone calls through a malicious server, change passwords, turn the phone into a bug, and exfiltrate system logs (including those numbers dialed by a user).
SIP Monitor
Why wait for customers to call you about voice quality?
SIP Monitor will send you alerts of any deterioration and supporting statistics to diagnose the cause.