Font Size: a A A

The Research And Realization Of Vulnerabilities Assessment Method In IMS

Posted on:2010-01-05Degree:MasterType:Thesis
Country:ChinaCandidate:X SuFull Text:PDF
GTID:2178360278965931Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As the network convergence infrastructure, IMS (IP Multimedia Subsystem) is proposed by 3GPP (The 3rd Generation Partnership Project) as the core subsystem of NGN (Next Generation Network). IMS is designed to fill the gap between the existing traditional telecommunication technology and Internet technology over an all IP based network. This will allow operators to offer new, innovative services that shareholders and end users are expecting. But the trend of network convergence make the original close telecom network opened and the security problems exposed. In order to know the security status of the networks, it's necessary to research on the vulnerabilities assessment of IMS. Nowadays there is already some research on vulnerabilities assessment of computer networks, but it could not be used in the IMS because the characteristics of IMS have not been considered. And there is nearly blank on the research of vulnerabilities assessment of IMS. So it is necessary to propose a set of assessment methods in this area.This thesis assesses a single vulnerability in IMS based on Analytic Hierarchy Process, and the IMS network vulnerabilities based on Attack Graph. These methods provide a new solution for vulnerability study of IMS.The thesis first introduces the technology background and research status of IMS and vulnerabilities assessment of computer networks, and then proposes the kernel of this thesis, the system of IMS vulnerabilities assessment, including the single vulnerability analysis and vulnerability assessment of IMS networks and each device in it; then describes the IMS vulnerabilities assessment system implementing the assessment methods above, especially the supporting database in detail; Finally the further research in this area related to this thesis are summarized.
Keywords/Search Tags:IP Multimedia Subsystem (IMS) Security, Vulnerability Assessment, Analytic Hierarchy Process, Attack Graph, the Cost of Attacks, Attack Effects
PDF Full Text Request
Related items