Security for Asterisk
Security designed specifically for telephony
SECAST
»
TECHNOLOGY
Built for Telephony Security
Detects attacks unique to VoIP telephony
Integrates deeply with Asterisk to monitor user activity in realtime
Leverages massive database of VoIP specific hacker IP addresses and fraud related phone numbers
Offers ability to create responses unique to each attack using SecAst’s Event Handler system
Created in C++ for low resource consumption, fast attack detection, and rapid response
Major Modules
The Intrusion Analysis Engine is at the heart of SecAst, monitoring inputs from Asterisk, the operating system, behavioral history, and proprietary security databases. User and device activities are constantly being profiled looking for suspicious behavior and SecAst maintains risk scores for every existing connection and attempted connection. Based on administrator defined thresholds, SecAst will block or restrict activities of any user or device to ensure fraud is mitigated and hacking is prevented.
SecAst monitors network connections, attempted network connections, network traffic, device profiles and more. These inputs are derived from SecAst’s proprietary network sensors which continually feed data to SecAst. The Intrusion Analysis Engine uses these inputs to prevent a connection, flag a connection for further monitoring, or even detect unusual traffic patterns.
SecAst integrates deeply with Asterisk to monitor dialplan operations, and more specifically the behavior of individual connections. Data such as call setup frequency, dialing rates, etc. all serve as inputs to the Intrusion Analysis Engine.
A best practice common to computing environment hardening is to keep attackers off the internal network. SecAst offers an API to communicate with virtually any external firewall to block, unblock, and monitor undesirable IP addresses at the network edge. SecAst includes sample handlers for firewalls from Cisco, Mikrotik, pfSense, and more.