Font Size: a A A

Analysis Of Telecommunication Network Security And Designing Of Attack Detection Algorithm

Posted on:2010-06-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2178360278465696Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
The telecommunication network is one of the most important national information infrastructures. It's also the hinge line for the national information communication, and plays an extremely important role in modern society. Many key application content transmit on the telecommunication network. For example, the classified intelligence information, business secret and trade flow are all exchanged by the network which was considered to be security by themselves.With the development of traditional telecommunication network, the Next Generation Network(NGN) is coming. On one hand, it will bring in many new technology and new protocols. On the other hand, since these new technology and new protocols are not mature enough, many defects can be exploited by hackers. What's more, the integration of networks brings new security challenges to the traditional telecommunication network. Hackers can make an attack from the highly intelligent IP network's terminal equipments to the switches or some other critical equipments of the traditional telecommunication network.Recently, many domestic and foreign experts, have noticed the telecom network security issues, and pointed out the possibility of the security defects that telecommunication network may appear. Through experiments they have already proved that it's possible for hackers to launch attacks to the telecommunication network.This paper will take the network protocols as perspective, analyze the protocols of the traditional telecommunication network, the mobile network and the next generation network respectively, and summarize the deflects of these protocols. The deflects exist objectively, and the attacks also emerge in endlessly. Common attacks, such as DoS attack and abnormal signaling attack are familiar to us, so in this paper, we will introduce the attacks that related to SIP protocol which is now widely used. Two new algorithms are proposed to detect these attacks.This paper mainly completes the following tasks:1. Make a comprehensive research on the current development of the telecommunication network and the security problems that appeared in the process of the development. Analyzed the necessity to research the telecommunication network's security.2. Analyzed the security vulnerabilities of the current network, and generalized about the vulnerabilities' features and causes.3. Studied the network protocols deeply, including broadband access protocols, mobile wireless access, signaling and stream media protocols and so on.4. Analyzed the attacks to the network vulnerabilities, especially the attacks that related to SIP, such as RTP DoS attack, BYE and CANCLE attack.5. Depend on the RFC3261, any behaviors against normal transaction were considered attack. Through the analisys of packets' content and states, new methods to detect the attack are proposed.The data transmit in next generation network can be divided into two parts, the signaling stream and media stream. Recently the security of the signaling protocols is still not perfect, and it's easy for hackers using singaling stream to lanch attacks to the servers. Today SIP is widely used all over the world, becoming more and more popular on the network. It's always the attack objective. The methods this paper proposed would be very useful to detect the abnormal signaling packets attack and the multi-packet multi-protocol joint attack of SIP, and can show the practical value and the reference value.
Keywords/Search Tags:network security, attack behavior, security breaches attack, detection algorithm, SIP
PDF Full Text Request
Related items