Font Size: a A A

The Research And Implementation Of IMS Network Vulnerability Exploitation

Posted on:2011-12-30Degree:MasterType:Thesis
Country:ChinaCandidate:S YuFull Text:PDF
GTID:2178360308961816Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
IMS with the character of its business, control and load completely separated level architecture, centralized management of user attributes, access methods independence, flexible business trigger mechanism and an open API and other features, is recognized as next-generation network's the core control layer by the standard organization. IMS network is currently being deployed by large-scale operators, and its security issues have become an increasing emphasis by the industry.This paper first researches the security mechanism and then makes a comprehensive analysis of the IMS vulnerability exploitation and the current fragility of exploitation tools. Based on this, this paper summarizes the IMS vulnerability exploitation system's functionality and scalability requirements. Finally, this paper presents and implements a design method of IMS vulnerability exploitation system.This paper first researches the security mechanism and the development of IMS network and the business process of IMS network and summaries the IMS network security problem. Then this paper makes a comprehensive analysis of the IMS vulnerability exploitation and the current characters of vulnerability exploitation tools. And the six characteristics of IMS network vulnerability exploitation system are presented. Based on this, this paper summarizes the IMS vulnerability exploitation system's functionality and scalability requirements. Finally, this paper presents and implements a design method of IMS vulnerability exploitation system.The vulnerability tests of the experimental IMS network (OpenIMSCore) show that the system can quickly add new vulnerabilities exploitation methods that can achieve the purpose of validating the vulnerability and has good performance and scalability.
Keywords/Search Tags:IMS, Network Security, Vulnerability, Exploitation
PDF Full Text Request
Related items