메뉴 건너뛰기




Volumn 9, Issue 5, 2008, Pages 329-335

Rule-based intrusion detection mechanism for IP multimedia subsystem

Author keywords

Global System for mobile communication (GSM).; Intrusion detection system (IDS); IP multimedia subsystem (IMS); Session initiation protocol (SIP); Universal mobile telecommunications system (UMTS)

Indexed keywords

INTRUSION DETECTION SYSTEMS; IP MULTIMEDIA SUBSYSTEMS; SESSION INITIATION PROTOCOL; UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEMS;

EID: 77950336919     PISSN: 16079264     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (8)

References (10)
  • 2
    • 0003240332 scopus 로고    scopus 로고
    • SIP: Session initiation protocol
    • J. Rosenberg, et al., "SIP: Session Initiation Protocol," IETF, RFC 3261, 2002.
    • (2002) IETF, RFC , vol.3261
    • Rosenberg, J.1
  • 3
    • 2942737360 scopus 로고    scopus 로고
    • IPv6 enabling IMS-based Peer-to-Peer Services in 3GPP and 3GPP2 cellular networks
    • September
    • J. Wiljakka, J. Soininen, J. Sundquist, and T. Sipil̈, "IPv6 Enabling IMS-based Peer-to-Peer Services in 3GPP and 3GPP2 Cellular Networks," Journal of Internet Technology, Vol. 5, No. 2, September 2004, pp. 67-74
    • (2004) Journal of Internet Technology , vol.5 , Issue.2 , pp. 67-74
    • Wiljakka, J.1    Soininen, J.2    Sundquist, J.3    Sipil̈, T.4
  • 4
    • 52649096432 scopus 로고    scopus 로고
    • Reliability of next-generation networks with a focus on IMS architecture
    • Himanshu Pant, Chi-Hung Kelvin Chu, Steven H. Richman, Ahmad Jrad, and Gerard P. O'Reilly, "Reliability of Next-Generation Networks With a Focus on IMS Architecture," Bell Labs Technical Journal, Vol. 12, No. 4, 2008, pp. 109-126
    • (2008) Bell Labs Technical Journal , vol.12 , Issue.4 , pp. 109-126
    • Pant, H.1    Kelvin Chu, C.-H.2    Richman, S.H.3    Jrad, A.4    O'reilly, G.P.5
  • 5
    • 77955711784 scopus 로고    scopus 로고
    • Security threats and solutions for application server of IP multimedia subsystem (IMS-AS)
    • Tuebingen, Germany, September
    • Muhammad Sher, Shaoke Wu, and Thomas Magedanz, "Security Threats and Solutions for Application Server of IP Multimedia Subsystem (IMS-AS), " IEEE/IST MonAM2006 - Workshop on Monitoring, Attack Detection and Mitigation, Tuebingen, Germany, September 2006, pp. 28-29.
    • (2006) IEEE/IST MonAM2006 - Workshop on Monitoring, Attack Detection and Mitigation , pp. 28-29
    • Sher, M.1    Wu, S.2    Magedanz, T.3
  • 6
    • 46749114456 scopus 로고    scopus 로고
    • Protecting IP multimedia subsystem (IMS) service delivery platform from time independent attacks
    • United Kingdom, August 29-31
    • Muhammad Sher, and Thomas Magedanz , "Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks," Third International Symposium on Information Assurance and Security (IAS) 2007, United Kingdom, August 29-31, 2007.
    • (2007) Third International Symposium on Information Assurance and Security (IAS) 2007
    • Sher, M.1    Magedan, T.2
  • 8
    • 50049119444 scopus 로고    scopus 로고
    • Detecting flooding attacks against IP multimedia subsystem (IMS) networks
    • Qatar, March 31-April 4
    • Yacine Rebahi, Muhammad Sher, and Thomas Magdanz, "Detecting Flooding Attacks Against IP Multimedia Subsystem (IMS) Networks," Computer Systems and Applications, 2008. AICCSA 2008, Qatar, March 31-April 4, 2008
    • (2008) Computer Systems and Applications, 2008. AICCSA 2008
    • Rebahi, Y.1    Sher, M.2    Magdanz, T.3
  • 9
    • 77950318616 scopus 로고    scopus 로고
    • Vulnerability in IMS-internet interworking: Analysis and relevant solutions
    • M. Mogno, I. Petrilli, and M. Listanti, "Vulnerability in IMS-Internet interworking: Analysis and Relevant Solutions," Networking Workshop 2006, 2006.
    • (2006) Networking Workshop 2006
    • Mogno, M.1    Petrilli, I.2    Listanti, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.