Font Size: a A A

Security Analysis And Intrusion Detection On IMS Key Interfaces

Posted on:2010-04-13Degree:MasterType:Thesis
Country:ChinaCandidate:S QianFull Text:PDF
GTID:2178360278965820Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The IP Multimedia Subsystem (IMS) is the core control infrastructre of the Next Generation Network (NGN) for its access independency, standard service interface and architecture. However, the openness makes the IMS exposed to several vulnerabilities and has already been highly emphasized. The standard organization 3GPP has defined one suite of security architecture of IMS, including access security, user authentication and SIM application security. However, there is no standard security strategy aiming to the vulnerability caused by SIP protocol.This paper is divided into two parts. In the first part, this paper analyzes the IMS security architecture in the view of IMS standard interfaces. It analyzes and categorizes the IMS security solutions on key interfaces. It also analyzes the potential vulnerabilities in every key interface according to its physical place, function and characteristics. In the second part, this paper turns the theory into practice. Basing on the vulnerabilities stated in the first part, this paper means to enhance the ability of the IMS entity to defense the attack by designing one Intrusion Detection Module on Gm Interface.This paper is divided into six chapters. The first chapter introduces the background of this topic and its underlying technical value; The second chapter introduces some basic knowledge of IMS and intrusion detection technology; The third chapter is the key of theoretic work in this paper; The forth chapter researches on the intrusion and detection algorithm on the Gm interface. The fifth chapter gives the detailed design of the Intrusion Detection Moudule on Gm Interface; The last chapter summarizes the paper.
Keywords/Search Tags:Key interfaces, IMS Security Architecture Intrusion and Detection, Flooding Attack
PDF Full Text Request
Related items