ABSTRACT
This paper analyzes the security vulnerabilities and requirements of IP Multimedia Subsystem (IMS), particularly the impact of Denial-of-Service (DoS) and Distributed DoS (DDoS)attacks on the IMS. We propose and develop an intelligent Bio-inspired, self-defending security framework for the IMS and Next Generation all-IP Networks. Our proposed framework will complement the existing authentication and encryption mechanisms to protect infrastructure nodes and subscribers against the attacks launched by the malicious nodes in the network. This framework is expected to become a cardinal component which can be integrated into any IMS converged network infrastructure to provide defense against wide variety of attacks particularly DoS and DDoS attacks.
- Third Generation Partnership Project (3GPP), www.3gpp.org. 3GPP2, www.3gpp2.org.Google Scholar
- 3GPP Technical Specification of Security: http://www.3gpp.org/ftp/Specs/html-infoGoogle Scholar
- IMS Playground: www.fokus.fraunhofer.de/imsGoogle Scholar
- Open IMS Core Testbed, http://www.openimscore.orgGoogle Scholar
- Poikeselka, Mayer, Khartabil, Niemi, .The IMS IP Multimedia Concepts and Services, Second Edition, 2006 Jhon Wiley & Sons, LTD. Google ScholarDigital Library
- T. Magedanz, D. Witaszek, K. Knuettel, .The IMS Playground @ Fokus -- An Open Testbed for NextGeneration Network Multimedia services, Testbeds and Research Infrastructures for the Development of Networks and Communities, 2005. Google ScholarDigital Library
- Tridentcom 2005. First International Conference on 23--25 Feb. 2005.Google Scholar
- M.Sher, T.Magedanz, .Secure Service Provisioning Framework (SSPF) for IP Multimedia System and Next Generation Mobile Networks, 3rd International Workshop in Wireless Security Technologies, London, U.K., IWWST'05 Proceeding (101--106), April 2005.Google Scholar
- Leandro N. de Castro and Jonathan Timmis, Artificial Immune Systems: A New Computational Intelligence Approach., Springer, 2002. Google ScholarDigital Library
- Steven A. Hofmeyr and S. Forrest, .Architecture for an Artificial Immune System, Evolutionary Computation Journal, pp. 443--473, 2000. Google ScholarDigital Library
- J. Greensmith and U. Aickelin, .Dendritic Cells for SYN Scan Detection, ACM GECCO, pp 49--56, 2007. Google ScholarDigital Library
- N. Mazhar and M. Farooq, .BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc, 6th International Conference on Artificial Immune Systems, Brazil, 2007. Google ScholarDigital Library
- H.F.Wedde, C. Timm, and M. Farooq, .Beehiveais: A simple, efficient, scalable and secure routing framework inspired by artificial immune systems, In PPSN, pages 623--632,2006. Google ScholarDigital Library
- Kotapati, Liu, Sun, LaPorta, .Taxonomy of Cyber Attacks on 3G networks, The Pennsylvania State University Park.Google Scholar
- J. Viega, Matt Massier, and Pravir Chandra, .Network Security with OpenSSL., O'Reilly & Assoc., Inc, 2002. Google ScholarDigital Library
- Juels and Brainard, .A Cryptographic Defense Against Connection Depletion Attacks, RSA Laboratories.Google Scholar
- T. Fawcett, .ROC Graphs: Notes and Practical Considerations for Researchers, TR (HPL-2003-4), HP Labs, USA.Google Scholar
Index Terms
- Attack analysis & bio-inspired security framework for IPMultimedia subsystem
Recommendations
Attack analysis & bio-inspired security framework for IP multimedia subsystem
GECCO '08: Proceedings of the 10th annual conference on Genetic and evolutionary computationThis paper analyzes the security vulnerabilities and requirements of IP Multimedia Subsystem(IMS), particularly the impact of Denial-of-Service(DoS) and Distributed DoS(DDoS) attacks on the IMS. We propose and develop an intelligent Bio-inspired, self-...
Hypothesis Test for Low-rate DDoS Attack Detection in Cloud Computing Environment
AbstractLow-rate Distributed Denial of Service (LDoS) attack is another form of DDoS attack for disrupting the cloud services. It differs from DDoS attack in terms of attack volume. DDoS attacks usually have very high attack volume; however, LDoS have ...
Research on DoS Attack and Detection Programming
IITA '09: Proceedings of the 2009 Third International Symposium on Intelligent Information Technology Application - Volume 01The DoS attack is the most popular attack in the network security with the development of network and internet. In this paper, the DoS attack principle is discussed and some DoS attack methods are deeply analyzed. The DoS attack detection technologies ...
Comments