Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Architecture for IMS Security to Mobile:Focusing on Artificial Immune System and Mobile Agents Integration
Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
2009 (engelsk)Independent thesis Advanced level (degree of Master (Two Years))OppgaveAlternativ tittel
English to Swedish (svensk)
Abstract [en]

The IP Multimedia Subsystem (IMS) is an open IP based service infrastructure that enables an easy deployment of new rich multimedia services mixing voice and data. The IMS is an overlay network on top of IP that uses SIP as the primary signaling mechanism. As an emerging technology, the SIP standard will certainly be the target of Denial of Service (DoS) attacks and consequently IMS will also inherit this problem. The objective of proposed architecture for IMS is to cram the potential attacks and security threats to IP Multimedia Subsystem (IMS) and explore the security solutions developed by 3GPP. This research work incorporates the ideas of immune system and multiagent architecture that is capable of detecting, identifying and recovering from an attack. The proposed architecture protects IMS core components i.e. P-CSCF (Proxy- Call Session Control Function), I-CSCF (Interrogating-Call Session Control Function), S-CSCF (Serving Call Session Control Function) and HSS (Home Subscriber Server) from external and internal threats like eavesdropping, SQL injection and denial-ofservice (DoS) attacks. In the first level i.e. CPU under normal load all incoming and out going messages were investigated to detect and prevent SQL injection. Second level considers Denial of Service (DOS) attacks when CPU load exceeds threshold limit. Proposed architecture is designed and evaluated by using an approach called Architecture Tradeoff Analysis Method (ATAM). The results obtained confirm consistency of the architecture.

sted, utgiver, år, opplag, sider
2009. , s. 54
Emneord [en]
IP Multimedia Subsystem (IMS), security threats, Denial of Service (DoS), SQL
HSV kategori
Identifikatorer
URN: urn:nbn:se:bth-5795Lokal ID: oai:bth.se:arkivexC151188BE1D404FAC12575D6006E48E5OAI: oai:DiVA.org:bth-5795DiVA, id: diva2:833198
Uppsök
Technology
Veileder
Merknad
kalyani-0046737527800Tilgjengelig fra: 2015-04-22 Laget: 2009-06-15 Sist oppdatert: 2018-01-11bibliografisk kontrollert

Open Access i DiVA

fulltekst(1130 kB)879 nedlastinger
Filinformasjon
Fil FULLTEXT01.pdfFilstørrelse 1130 kBChecksum SHA-512
f7828349fa9b2fc7d07e3e427c7dc83b85ee13be1b33c293f5c1b6de76e6b04f90a3b4f7ad1f3523ef8396f64aab5567c4b8d0da7df65e6a9c493b6fd876c899
Type fulltextMimetype application/pdf

Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar
Totalt: 890 nedlastinger
Antall nedlastinger er summen av alle nedlastinger av alle fulltekster. Det kan for eksempel være tidligere versjoner som er ikke lenger tilgjengelige

urn-nbn

Altmetric

urn-nbn
Totalt: 278 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf