skip to main content
10.1145/1388969.1389029acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
research-article

Attack analysis & bio-inspired security framework for IPMultimedia subsystem

Authors Info & Claims
Published:12 July 2008Publication History

ABSTRACT

This paper analyzes the security vulnerabilities and requirements of IP Multimedia Subsystem (IMS), particularly the impact of Denial-of-Service (DoS) and Distributed DoS (DDoS)attacks on the IMS. We propose and develop an intelligent Bio-inspired, self-defending security framework for the IMS and Next Generation all-IP Networks. Our proposed framework will complement the existing authentication and encryption mechanisms to protect infrastructure nodes and subscribers against the attacks launched by the malicious nodes in the network. This framework is expected to become a cardinal component which can be integrated into any IMS converged network infrastructure to provide defense against wide variety of attacks particularly DoS and DDoS attacks.

References

  1. Third Generation Partnership Project (3GPP), www.3gpp.org. 3GPP2, www.3gpp2.org.Google ScholarGoogle Scholar
  2. 3GPP Technical Specification of Security: http://www.3gpp.org/ftp/Specs/html-infoGoogle ScholarGoogle Scholar
  3. IMS Playground: www.fokus.fraunhofer.de/imsGoogle ScholarGoogle Scholar
  4. Open IMS Core Testbed, http://www.openimscore.orgGoogle ScholarGoogle Scholar
  5. Poikeselka, Mayer, Khartabil, Niemi, .The IMS IP Multimedia Concepts and Services, Second Edition, 2006 Jhon Wiley & Sons, LTD. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. T. Magedanz, D. Witaszek, K. Knuettel, .The IMS Playground @ Fokus -- An Open Testbed for NextGeneration Network Multimedia services, Testbeds and Research Infrastructures for the Development of Networks and Communities, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Tridentcom 2005. First International Conference on 23--25 Feb. 2005.Google ScholarGoogle Scholar
  8. M.Sher, T.Magedanz, .Secure Service Provisioning Framework (SSPF) for IP Multimedia System and Next Generation Mobile Networks, 3rd International Workshop in Wireless Security Technologies, London, U.K., IWWST'05 Proceeding (101--106), April 2005.Google ScholarGoogle Scholar
  9. Leandro N. de Castro and Jonathan Timmis, Artificial Immune Systems: A New Computational Intelligence Approach., Springer, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Steven A. Hofmeyr and S. Forrest, .Architecture for an Artificial Immune System, Evolutionary Computation Journal, pp. 443--473, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Greensmith and U. Aickelin, .Dendritic Cells for SYN Scan Detection, ACM GECCO, pp 49--56, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. N. Mazhar and M. Farooq, .BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc, 6th International Conference on Artificial Immune Systems, Brazil, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H.F.Wedde, C. Timm, and M. Farooq, .Beehiveais: A simple, efficient, scalable and secure routing framework inspired by artificial immune systems, In PPSN, pages 623--632,2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kotapati, Liu, Sun, LaPorta, .Taxonomy of Cyber Attacks on 3G networks, The Pennsylvania State University Park.Google ScholarGoogle Scholar
  15. J. Viega, Matt Massier, and Pravir Chandra, .Network Security with OpenSSL., O'Reilly & Assoc., Inc, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Juels and Brainard, .A Cryptographic Defense Against Connection Depletion Attacks, RSA Laboratories.Google ScholarGoogle Scholar
  17. T. Fawcett, .ROC Graphs: Notes and Practical Considerations for Researchers, TR (HPL-2003-4), HP Labs, USA.Google ScholarGoogle Scholar

Index Terms

  1. Attack analysis & bio-inspired security framework for IPMultimedia subsystem

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      GECCO '08: Proceedings of the 10th annual conference companion on Genetic and evolutionary computation
      July 2008
      1182 pages
      ISBN:9781605581316
      DOI:10.1145/1388969
      • Conference Chair:
      • Conor Ryan,
      • Editor:
      • Maarten Keijzer

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 July 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,669of4,410submissions,38%

      Upcoming Conference

      GECCO '24
      Genetic and Evolutionary Computation Conference
      July 14 - 18, 2024
      Melbourne , VIC , Australia

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader