2009
DOI: 10.1002/bltj.20365
|View full text |Cite
|
Sign up to set email alerts
|

Securing IMS against novel threats

Abstract: Fixed mobile convergence (FMC) based on the 3GPP IP Multimedia Subsystem (IMS) is considered one of the most important communication technologies of this decade. Yet this all-IP-based network technology brings about the growing danger of security vulnerabilities in communication and data services. Protecting IMS infrastructure servers against malicious exploits poses a major challenge due to the huge number of systems that may be affected. We approach this problem by proposing an architecture for an autonomous… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Details of the experimental methods, data analysis, and supplementary experiments (PDF) as well as a time‐lapse movie of the data shown in Figure 7a (AVI) may be found in the Supporting Information. The authors have also cited additional references here [52–79] …”
Section: Supporting Informationmentioning
confidence: 99%
“…Details of the experimental methods, data analysis, and supplementary experiments (PDF) as well as a time‐lapse movie of the data shown in Figure 7a (AVI) may be found in the Supporting Information. The authors have also cited additional references here [52–79] …”
Section: Supporting Informationmentioning
confidence: 99%
“…The following presents the detecting methods against abnormal SIP messages. Wahl et al [10] presented a signature-based anomaly detection method in which SIP messages are embedded in a vector space to reflect the characteristics of the SIP traffic. The presented method first extracts feature strings using the definitions of ``tokens'' and ``n-grams'', then both global and local anomaly detection methods based on geometric learning models are used to detect unknown attacks.…”
Section: Network Security In Lte Technologiesmentioning
confidence: 99%
“…By contrast, the one-class SVM provides means for identifying unknown attacks automatically as novelties and thus has gained a strong focus in security research (e.g. Nassar et al, 2008;Wahl et al, 2009;Perdisci et al, 2009). Fig.…”
Section: Network Intrusion Detectionmentioning
confidence: 99%