Today various personnel of large companies or in corporate settings use computers. Many of these people like to have access to computer services outside of the corporate setting (e.g., web sites, email, and chat rooms). To enable outside access, the corporate information technology (IT) staff sets up firewalls and bastion hosts between the internal and external networks that prevent unauthorized use or entry, yet still allow employees access to useful network resources.
For example, company ABC's IT policy can be approximated as: (a) internal machines are allowed to directly initiate TCP connections to external machines on a specific subset of TCP ports, (b) internal machines may be allowed to use approved proxy hosts for accessing a more general set of external services (e.g., web access), (c) external machines are allowed to tunnel into the company's network only if they have provided appropriate authentication and are running IT-approved software configurations, and (d) email from external machines is routed through appropriate bastion hosts and scanned for viruses. It is important to note that the only unauthenticated form of communication that is initiated by an external party is email, accordingly email is carefully checked before being delivered to employees to ensure security of ABC's (the company) network.
Now consider the problem with respect to voice-over-internet protocol (VOIP). The VOIP telephone or VOIP-enabled computer is on an employee's desk and belongs to the internal corporate network. However, to be useful as a telephone, this same device should be able to receive VOIP telephone calls from people outside of the corporation (e.g., external call). Typically this functionality is implemented by placing a bastion host at the firewall that receives incoming telephone calls and forwards them to the appropriate internal VOIP equipment.
An incoming VOIP telephone call consists of two logical parts: a signaling channel and a bi-directional voice (audio communication) data stream. Current bastion host technology processes the signaling channel and verifies that it appears to be an honest telephone call before passing it on to the end client. However, the voice or media data stream is forwarded without any further security measures. An example of this is, no determination is made to ensure that the data/media stream is in fact what it purports to be, i.e., an audio telephone call or voice data.
The natural concern of IT staffs in general is that the audio communication stream could be used for something other than audio data. It is plausible that an individual outside of the corporation could send a corrupted media stream to an internal VOIP client and attempt to exploit buffer-overrun attacks or other known problems with internal clients. For example, some VOIP telephones or soft telephones (software operating as telephones) have been known to reboot upon receiving a bad data stream. In addition, many soft telephones have known problems that can result in unintended actions on a client machine, such as running out of memory or greatly slowing down the machine. Given these known problems, it is not implausible that someone could inject a virus or remotely gain access to an improperly secured client machine using a data stream.
Current firewall and bastion host implementations act as gatekeepers, but do not modify or validate the audio communication stream, so there are no safeguards once the call has been set up and the media stream established.
There is a need for solutions that implement audio communication security by verifying the subject data streams. The present invention provides such a bi-directional audio data security system and method. In particular, the present invention provides an analysis of audio communications over data networks and performs a particular function if the data is found to be invalid.
In one embodiment of the present invention, the audio data security system includes an audio communication stream and an audio validator that is responsive to the audio communication stream, the audio validator analyzing the audio communication stream to determine if the communication stream is valid. The audio validator can include a data encoding analyzer. The data encoding analyzer can analyze the audio communication stream for a valid digital audio encoding format. The audio validator can include a signal analyzer. The signal analyzer can analyze the audio communication stream for valid speech content and/or valid music content and/or valid environmental noise. The signal analyzer can analyze the audio communication stream for non-environmental noise. The signal analyzer can include at least one member selected from the group consisting of a human speech frequency detection module, a human speech pattern detection module, a music frequency detection module, a human speech prosody detection module, a white noise detection module, and an environmental noise detection module.
In another embodiment, the audio validator can include a supervisor module which combines scores from at least two modules. The supervisor module, based on the combined score, alerts a member of the information technology staff, drops a connection, logs a source and type of connection, and or blocks future connections from a source.
In another embodiment, the present invention can include a data decoder. The data decoder can decode the audio communication stream into a common audio stream format before the audio stream is analyzed by the signal analyzer.
The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular description of preferred embodiments of the invention, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention.
The present invention provides a low-cost solution that monitors audio channels carrying audio communication streams over a data network. The present invention determines whether an audio communication stream is a valid data stream and reports and/or dumps invalid data streams. For example, during a VOIP telephone conversation an internal user on the network may try to send internal data to an external source. During the course of the conversation, the subject invention would determine that a non-valid audio communication stream is being transmitted over the data network and/or report the non-valid audio communication stream and/or drop the connection.
By way of general overview, one embodiment of the present invention includes a computer having one or more network interfaces (e.g., high speed) and an audio validator. The audio validator analyzes the audio communication streams for valid human speech, music, and environmental noise. The audio validator also analyzes the audio communication streams for audio signals that would not be normally generated by human speech, music, or environmental noise, such as white noise. The audio validator can include a data encoding analyzer and/or a signal analyzer.
The data encoding analyzer verifies that the format of the encoded audio communication stream matches with the encoding format specified when the audio communication stream was established.
The signal analyzer can include one or more of the following analysis modules: (1) a human speech frequency detection module; (2) a human speech pattern detection module; (3) a music frequency detection module; (4) a human speech prosody detection module; (5) a white noise detection module; (6) and an environmental noise detection module. It should be known that other detection modules known in the art may also be implemented. The signal analyzer analysis modules may work directly on the encoded audio communication stream, or the signal analyzer may optionally decode the audio communication stream to a common format and the signal analyzer analysis modules may work on the common format.
The audio validator may also include a supervisor module which combines scores from the data encoding analyzer and the signal analyzer analysis modules and takes appropriate action. For example, the supervisor module may alert a member of the informational technology staff, drop the connection, log the source and type of connection, and/or block connections from the source in the future.
The audio validator 104 can include a data decoder 105, a signal analyzer 106, and a data encoding analyzer 107. The data decoder 105 is responsive to the received audio communication stream 102 and decodes the audio communication stream 102 to a common format. After decoding the audio communication stream 102, the signal analyzer 106 determines if the audio communication stream 102 is what it purports itself to be. The data encoding analyzer 107 determines if the audio communication data encoding is what it purports itself to be. The VOIP device 108 can be a VOIP telephone and/or VOIP enabled computer system. The routing network 103 can be the internet, intranet, or other known routing network. Although the audio communication stream 102 is shown to be decoded prior to being analyzed, the audio communication stream 102 can be analyzed without being prior decoded.
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
It will be apparent to those of ordinary skill in the art that methods involved in the present invention may be embodied in a computer program product that includes a computer readable and usable medium. For example, such a computer usable medium may consist of a read only memory device, such as a CD ROM disk or conventional ROM devices, or a random access memory, such as a hard drive device or a computer diskette, having a computer readable program code implementing steps 304, 305, 306, and 307 of
While this invention has been particularly shown and described with references to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the invention encompassed by the appended claims.