TDoS - Telephony Denial of Service

 

What is Telephony Denial of Service?

You may have seen reports of DDos attacks in the news, where bad actors flood data systems with bogus traffic to overload and paralyze major businesses.

Well, Telephony Denial of Service (TDos) attacks are similar, but they target your voice systems.

Can you afford that kind of downtime?

TDos-Telephony-Denial-of-Service

Common TDoS Attack Profiles

Thanks to automation, Telephony Denial of Service attacks are easy to generate and don't require a high volume of malicious calls to wreak havoc. 

Simple Attacks
come from a single origination point and sometimes use spoofed phone numbers. Small organizations are the most targeted, since they rely on critical voice lines but may have limited resources to respond quickly.   

Complex Attacks
fly under the radar using spoofed numbers, which are tough to spot for small and large companies alike.

Distributed & Complex Attacks
employ sophisticated spoofing technology with calls appearing to originate from all over the country. Large companies that can't afford to lose legitimate callers are most at risk. In this scenario, early detection is mission-critical.


Legacy Countermeasures

The textbook approaches to fighting Telephony Denial of Service / TDoS Attacks are simply not enough for the modern age.

Organizations that use SIP Trunking (many users sharing a few communication paths) often rely on Session Border Controllers (SBCs) for basic blacklist and whitelist capabilities. But SBCs were not built to handle large-scale, automated floods of traffic.

Your Voice Service Provider may have some basic security tools, but capabilities vary greatly provider to provider. Plus, response times won't be enough to protect your business operations from disruption. 


SecureLogix's Solutions

SecureLogix's solutions can be deployed in both SIP and TDM networks, and it integrates well with common network infrastructures. We support both large and small sites, and use nimble policies for detection and mitigation.

Better yet, newly built business rules and policies are fed by call attributes and SIP signaling attributes, without impacting underlying software.

  • Cloud-based deployment
  • Call-control options
  • Supports semi-static and dynamic white and black lists
  • Customizable network queries on source number, number type checks, call authentication, etc.
  • Accommodates industry regulatory requirements without changing software
 

Industries at Increased Risk of Attack

 
 

Are You a Target?

Does your business rely on voice and data lines daily? If voice networks are mission-critical, so is voice security.

 
 

Customer Stories

 
If you don’t have solutions like what SecureLogix brings forward, it’s not a matter of if, it’s a matter of when you get attacked.
— Cybersecurity Researcher
Department of Homeland Security
Customer Stories
 

In the News: TDoS Attacks