Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1389095.1389119acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
poster

Attack analysis & bio-inspired security framework for IP multimedia subsystem

Published: 12 July 2008 Publication History

Abstract

This paper analyzes the security vulnerabilities and requirements of IP Multimedia Subsystem(IMS), particularly the impact of Denial-of-Service(DoS) and Distributed DoS(DDoS) attacks on the IMS. We propose and develop an intelligent Bio-inspired, self-defending security framework for the IMS and Next Generation all-IP Networks. Our proposed framework will complement the existing authentication and encryption mechanisms to protect infrastructure nodes and subscribers against the attacks launched by the malicious nodes in the network. This framework is expected to become a cardinal component which can be integrated into any IMS converged network infrastructure to provide defense against wide variety of attacks particularly DoS and DDoS attacks.

References

[1]
Third Generation Partnership Project (3GPP), www.3gpp.org. 3GPP2,www.3gpp2.org.
[2]
3GPP Technical Specification of Security:http://www.3gpp.org/ftp/Specs/html-info
[3]
IMS Playground: www.fokus.fraunhofer.de/ims
[4]
Open IMS Core Testbed, http://www.openimscore.org
[5]
Poikeselka, Mayer, Khartabil, Niemi, "The IMS IP Multimedia Concepts and Services", Second Edition, 2006 Jhon Wiley & Sons, LTD.
[6]
T. Magedanz, D. Witaszek, K. Knuettel, "The IMS Playground @ Fokus - An Open Testbed for NextGeneration Network Multimedia services", Testbeds and Research Infrastructures for the Development of Networks and Communities, 2005. Tridentcom 2005.
[7]
M.Sher, T.Magedanz, "Secure Service Provisioning Framework (SSPF) for IP Multimedia System and Next Generation Mobile Networks", 3rd International Workshop in Wireless Security Technologies, London, U.K., IWWST'05 Proceeding (101--106), April 2005.
[8]
Leandro N. de Castro and Jonathan Timmis, "Artificial Immune Systems: A New Computational Intelligence Approach",Springer,2002.
[9]
Steven A. Hofmeyr and S. Forrest,"Architecture for an Artificial Immune System", Evolutionary Computation Journal, pp. 443--473, 2000.
[10]
J. Greensmith and U. Aickelin, "Dendritic Cells for SYN Scan Detection", ACM GECCO, pp 49--56, 2007.
[11]
N. Mazhar and M. Farooq,"BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc", 6th International Conference on Artificial Immune Systems, Brazil, 2007.
[12]
H.F.Wedde, C. Timm, and M. Farooq,"Beehiveais: A simple,efficient, scalable and secure routing framework inspired by artificial immune systems", In PPSN, pages 623--632,2006.
[13]
Kotapati,Liu,Sun,LaPorta,"Taxonomy of Cyber Attacks on 3G networks",The Pennsylvania State University Park.
[14]
J. Viega, Matt Massier, and Pravir Chandra, "Network Security with OpenSSL", O'Reilly & Assoc., Inc, 2002.
[15]
Juels and Brainard, "A Cryptographic Defense Against Connection Depletion Attacks", RSA Laboratories.
[16]
T. Fawcett,"ROC Graphs: Notes and Practical Considerations for Researchers",TR (HPL-2003-4), HP Labs, USA.

Cited By

View all
  • (2021)Intrusion detection by machine learning for multimedia platformMultimedia Tools and Applications10.1007/s11042-021-11100-xOnline publication date: 7-Jul-2021
  • (2012)A Comprehensive Survey of Voice over IP Security ResearchIEEE Communications Surveys & Tutorials10.1109/SURV.2011.031611.0011214:2(514-537)Online publication date: Oct-2013
  • (2011)Analysis of Abnormal Events in IMS and Research on the Strategy of DetectionProceedings of the 2011 Seventh International Conference on Computational Intelligence and Security10.1109/CIS.2011.162(712-716)Online publication date: 3-Dec-2011

Index Terms

  1. Attack analysis & bio-inspired security framework for IP multimedia subsystem

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    GECCO '08: Proceedings of the 10th annual conference on Genetic and evolutionary computation
    July 2008
    1814 pages
    ISBN:9781605581309
    DOI:10.1145/1389095
    • Conference Chair:
    • Conor Ryan,
    • Editor:
    • Maarten Keijzer
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 July 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IP multimedia subsystem
    2. artificial immune systems
    3. network

    Qualifiers

    • Poster

    Conference

    GECCO08
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,669 of 4,410 submissions, 38%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 14 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Intrusion detection by machine learning for multimedia platformMultimedia Tools and Applications10.1007/s11042-021-11100-xOnline publication date: 7-Jul-2021
    • (2012)A Comprehensive Survey of Voice over IP Security ResearchIEEE Communications Surveys & Tutorials10.1109/SURV.2011.031611.0011214:2(514-537)Online publication date: Oct-2013
    • (2011)Analysis of Abnormal Events in IMS and Research on the Strategy of DetectionProceedings of the 2011 Seventh International Conference on Computational Intelligence and Security10.1109/CIS.2011.162(712-716)Online publication date: 3-Dec-2011

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media