SlideShare une entreprise Scribd logo
1  sur  17
IPTV Security
Presented by 	

Syarif	

!
!
Seminar Keamanan IT Nasional	

Bandung,April 9 2011	

Politeknik Pos Indonesia
Agenda
• IPTV Overview	

• IPTV feature	

• IPTV Architecture	

• IPTV Security & Threat
IPTV Overview
• Background :	

• 1940 : first TV broadcast	

• 1969 :Arpanet was created	

• 1983 : NCP to TCP/IP	

• merged both of them = IPTV	

• IPTV ( Internet Protocol Television )
IPTV Overview
• Is a new technology and first in Indonesia	

• more flexibility to manage contents	

• triple play	

• Integrated system : 	

• core network	

• access network 	

• content	

• application, CPE
IPTV Services
• Basic Services 	

• deliver with middleware devices, CA/
DRM, andVoD	

• no need integration with other system 	

• Advanced Services	

• need added application server	

• need integration with other system
IPTV Services
• Basic Services :	

• Broadcast TV (Live TV)	

• Video on Demand (VoD )	

• TV on Demand ( TVoD )	

• Time Shift TV ( TSTV )	

• Game on Demand	

• IPTV Web Portal
IPTV Services
• Advanced Services :	

• Karaoke on Demand	

• TV Push message	

• Advertising	

• Voting	

• Interactive Quiz	

• Commerce
IPTV Architecture
IPTV Architecture
• Must be connected and integrated :	

• HeadEnd	

• VoD Server	

• CA / DRM	

• Middleware	

• Home Gateway	

• Set Top Box ( STB )	

• Support System ( OSS / BSS )	

• Content Delivery Network ( CDN )
IPTV System
IPTV Security & Threats
• Content Security ( CA/DRM )	

• Services Security	

• Infrastructure Security	

• User Security
IPTV Security & Threats
• Services Security :	

• Authentication System	

• Subscriber login	

• Service access	

• VAS subscription	

• Authorization System	

• user profile & session	

• log system
IPTV Security & Threats
• Infrastructure Security	

• Server Security 	

• {virus,worm,trojan,vuln}	

• Network Security 	

• {malicious attack, accidential damage}	

• Flooding	

• Firewall , IDS & IPS	

• DMZ
User Security
• Set Top Box security	

• virus, worm	

• validation	

• Managable Home Gateway security	

• Monitored by OSS ( Operation Support
System )	

• SNMP v2 & v3
References
• Telekomunikasi Tbk, PT, 2011, IPTV, Bandung	

• Alcatel - lucent, 2008, IPTV Security, UK
Q & A
• twitter : fl3xu5	

• http://fl3x.us
Thank you :)

Contenu connexe

Tendances

Multimedia networking
Multimedia networkingMultimedia networking
Multimedia networkingKikima Jimmy
 
INTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPTINTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPTAnil Mahapatra
 
Chapter 2 - Multimedia Communications
Chapter 2 - Multimedia CommunicationsChapter 2 - Multimedia Communications
Chapter 2 - Multimedia CommunicationsPratik Pradhan
 
Video Streaming - 4.ppt
Video Streaming - 4.pptVideo Streaming - 4.ppt
Video Streaming - 4.pptVideoguy
 
IPTV, Internet Video and Adaptive Streaming Technologies
IPTV, Internet Video and Adaptive Streaming TechnologiesIPTV, Internet Video and Adaptive Streaming Technologies
IPTV, Internet Video and Adaptive Streaming TechnologiesCisco Canada
 
Video signal-ppt
Video signal-pptVideo signal-ppt
Video signal-pptDeepa K C
 
Streaming media presentation
Streaming media presentationStreaming media presentation
Streaming media presentationKyra Walton
 
INTERNET PROTOCOL TELEVISION
INTERNET PROTOCOL TELEVISIONINTERNET PROTOCOL TELEVISION
INTERNET PROTOCOL TELEVISIONSubhashree Mishra
 
Digital Audio Broadcasting By SAIKIRAN PANJALA
Digital  Audio Broadcasting By SAIKIRAN PANJALADigital  Audio Broadcasting By SAIKIRAN PANJALA
Digital Audio Broadcasting By SAIKIRAN PANJALASaikiran Panjala
 
Internet Protocol Television - IPTV
Internet Protocol Television - IPTVInternet Protocol Television - IPTV
Internet Protocol Television - IPTVDulith Kasun
 
Chapter 1 - Multimedia Fundamentals
Chapter 1 - Multimedia FundamentalsChapter 1 - Multimedia Fundamentals
Chapter 1 - Multimedia FundamentalsPratik Pradhan
 
MPEG video compression standard
MPEG video compression standardMPEG video compression standard
MPEG video compression standardanuragjagetiya
 

Tendances (20)

Video coding standards ppt
Video coding standards pptVideo coding standards ppt
Video coding standards ppt
 
Set Top Box
Set Top BoxSet Top Box
Set Top Box
 
Multimedia networking
Multimedia networkingMultimedia networking
Multimedia networking
 
Digital Audio
Digital AudioDigital Audio
Digital Audio
 
INTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPTINTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPT
 
Chapter 2 - Multimedia Communications
Chapter 2 - Multimedia CommunicationsChapter 2 - Multimedia Communications
Chapter 2 - Multimedia Communications
 
Video Streaming - 4.ppt
Video Streaming - 4.pptVideo Streaming - 4.ppt
Video Streaming - 4.ppt
 
H261
H261H261
H261
 
Multimedia systems
Multimedia systemsMultimedia systems
Multimedia systems
 
IPTV
IPTVIPTV
IPTV
 
IPTV, Internet Video and Adaptive Streaming Technologies
IPTV, Internet Video and Adaptive Streaming TechnologiesIPTV, Internet Video and Adaptive Streaming Technologies
IPTV, Internet Video and Adaptive Streaming Technologies
 
Video signal-ppt
Video signal-pptVideo signal-ppt
Video signal-ppt
 
Streaming media presentation
Streaming media presentationStreaming media presentation
Streaming media presentation
 
INTERNET PROTOCOL TELEVISION
INTERNET PROTOCOL TELEVISIONINTERNET PROTOCOL TELEVISION
INTERNET PROTOCOL TELEVISION
 
Digital Audio Broadcasting By SAIKIRAN PANJALA
Digital  Audio Broadcasting By SAIKIRAN PANJALADigital  Audio Broadcasting By SAIKIRAN PANJALA
Digital Audio Broadcasting By SAIKIRAN PANJALA
 
Internet Protocol Television - IPTV
Internet Protocol Television - IPTVInternet Protocol Television - IPTV
Internet Protocol Television - IPTV
 
Media streaming
Media streamingMedia streaming
Media streaming
 
Hdtv technology
Hdtv technologyHdtv technology
Hdtv technology
 
Chapter 1 - Multimedia Fundamentals
Chapter 1 - Multimedia FundamentalsChapter 1 - Multimedia Fundamentals
Chapter 1 - Multimedia Fundamentals
 
MPEG video compression standard
MPEG video compression standardMPEG video compression standard
MPEG video compression standard
 

En vedette (7)

Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
 
Information gath
Information gathInformation gath
Information gath
 
iCrOSS 2013_Pentest
iCrOSS 2013_PentestiCrOSS 2013_Pentest
iCrOSS 2013_Pentest
 
Social Network Security & Backdooring email
Social Network Security & Backdooring emailSocial Network Security & Backdooring email
Social Network Security & Backdooring email
 
Wireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek KominfoWireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek Kominfo
 
My pwk & oscp journey
My pwk & oscp journeyMy pwk & oscp journey
My pwk & oscp journey
 
Prepare Yourself to Become Infosec Professional
Prepare Yourself to Become Infosec ProfessionalPrepare Yourself to Become Infosec Professional
Prepare Yourself to Become Infosec Professional
 

Similaire à IPTV Security (20)

IPTV
IPTVIPTV
IPTV
 
iptv over ngn
iptv over ngniptv over ngn
iptv over ngn
 
DEFCON 23 - Fatih Ozavci - the art of voip workshop
DEFCON 23 - Fatih Ozavci - the art of voip workshopDEFCON 23 - Fatih Ozavci - the art of voip workshop
DEFCON 23 - Fatih Ozavci - the art of voip workshop
 
IPTV Architecture and Challenges
IPTV  Architecture and ChallengesIPTV  Architecture and Challenges
IPTV Architecture and Challenges
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
 
Iptv slide
Iptv slideIptv slide
Iptv slide
 
IP networks and mutlimedia
IP networks and mutlimediaIP networks and mutlimedia
IP networks and mutlimedia
 
How to Implement SDN Technology in ITB
How to Implement SDN Technology in ITBHow to Implement SDN Technology in ITB
How to Implement SDN Technology in ITB
 
IMS based IPTV
IMS based IPTVIMS based IPTV
IMS based IPTV
 
Vp ns
Vp nsVp ns
Vp ns
 
IP BASED MEDIA SERVICES
IP BASED  MEDIA SERVICESIP BASED  MEDIA SERVICES
IP BASED MEDIA SERVICES
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Iptv
IptvIptv
Iptv
 
Iptv2
Iptv2Iptv2
Iptv2
 
Iptv lecture 02-15-2013
Iptv lecture 02-15-2013Iptv lecture 02-15-2013
Iptv lecture 02-15-2013
 
How to use IPTV
How to use IPTVHow to use IPTV
How to use IPTV
 
Null mumbai-iot top 10
Null mumbai-iot top 10Null mumbai-iot top 10
Null mumbai-iot top 10
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
IPTV
IPTVIPTV
IPTV
 

Dernier

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Dernier (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

IPTV Security

  • 1. IPTV Security Presented by Syarif ! ! Seminar Keamanan IT Nasional Bandung,April 9 2011 Politeknik Pos Indonesia
  • 2. Agenda • IPTV Overview • IPTV feature • IPTV Architecture • IPTV Security & Threat
  • 3. IPTV Overview • Background : • 1940 : first TV broadcast • 1969 :Arpanet was created • 1983 : NCP to TCP/IP • merged both of them = IPTV • IPTV ( Internet Protocol Television )
  • 4. IPTV Overview • Is a new technology and first in Indonesia • more flexibility to manage contents • triple play • Integrated system : • core network • access network • content • application, CPE
  • 5. IPTV Services • Basic Services • deliver with middleware devices, CA/ DRM, andVoD • no need integration with other system • Advanced Services • need added application server • need integration with other system
  • 6. IPTV Services • Basic Services : • Broadcast TV (Live TV) • Video on Demand (VoD ) • TV on Demand ( TVoD ) • Time Shift TV ( TSTV ) • Game on Demand • IPTV Web Portal
  • 7. IPTV Services • Advanced Services : • Karaoke on Demand • TV Push message • Advertising • Voting • Interactive Quiz • Commerce
  • 9. IPTV Architecture • Must be connected and integrated : • HeadEnd • VoD Server • CA / DRM • Middleware • Home Gateway • Set Top Box ( STB ) • Support System ( OSS / BSS ) • Content Delivery Network ( CDN )
  • 11. IPTV Security & Threats • Content Security ( CA/DRM ) • Services Security • Infrastructure Security • User Security
  • 12. IPTV Security & Threats • Services Security : • Authentication System • Subscriber login • Service access • VAS subscription • Authorization System • user profile & session • log system
  • 13. IPTV Security & Threats • Infrastructure Security • Server Security • {virus,worm,trojan,vuln} • Network Security • {malicious attack, accidential damage} • Flooding • Firewall , IDS & IPS • DMZ
  • 14. User Security • Set Top Box security • virus, worm • validation • Managable Home Gateway security • Monitored by OSS ( Operation Support System ) • SNMP v2 & v3
  • 15. References • Telekomunikasi Tbk, PT, 2011, IPTV, Bandung • Alcatel - lucent, 2008, IPTV Security, UK
  • 16. Q & A • twitter : fl3xu5 • http://fl3x.us