메뉴 건너뛰기




Volumn , Issue , 2011, Pages 275-280

Is IP Multimedia Subsystem affected by 'malformed message' attacks? An evaluation of open IMS

Author keywords

IP multimedia subsystem; Malformed message attacks; Security; Session initiation protocol

Indexed keywords

ATTACK SCENARIOS; END TO END DELAY; IP MULTIMEDIA SUBSYSTEMS; MEMORY CONSUMPTION; MESSAGE ATTACK; OPEN-IP; SECURITY; SESSION INITIATION PROTOCOLS;

EID: 80052478378     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (9)
  • 1
    • 80052486427 scopus 로고    scopus 로고
    • IP multimedia subsystems (IMS), third generation partnership project
    • GPP,. TS 23.228
    • 3GPP, 2008. TS 23.228: IP Multimedia Subsystems (IMS), Third Generation Partnership Project, Technical Specification Group Services and System Aspects.
    • (2008) Technical Specification Group Services and System Aspects
  • 2
    • 80052436838 scopus 로고    scopus 로고
    • 3G security; Access security for IP-based services (Release 10)
    • GPP,. TS 33.203: Third Generation Partnership Project
    • 3GPP, 2010. TS 33.203: 3G security; Access security for IP-based services (Release 10): Third Generation Partnership Project, Technical Specification Group Services and System Aspects.
    • (2010) Technical Specification Group Services and System Aspects
  • 3
    • 84881472647 scopus 로고    scopus 로고
    • Survey of security vulnerabilities in session initiation protocol
    • Geneiatakis, D. et al., 2006. Survey of security vulnerabilities in session initiation protocol. Communications Surveys & Tutorials, IEEE, 8(3), 68-81.
    • (2006) Communications Surveys & Tutorials, IEEE , vol.8 , Issue.3 , pp. 68-81
    • Gseneiatakis, D.1
  • 4
    • 33947123970 scopus 로고    scopus 로고
    • A framework for protecting a SIP-based infrastructure against malformed message attacks
    • Geneiatakis, D. et al., 2007. A framework for protecting a SIP-based infrastructure against malformed message attacks. Computer Networks, 51(10), 2580-2593.
    • (2007) Computer Networks , vol.51 , Issue.10 , pp. 2580-2593
    • Geneiatakis, D.1
  • 5
    • 77950660500 scopus 로고    scopus 로고
    • Voice-over-IP security: Research and practice
    • Keromytis, A. D., 2010. Voice-over-IP Security: Research and Practice. IEEE Security and Privacy, 8(2), 76-78.
    • (2010) IEEE Security and Privacy , vol.8 , Issue.2 , pp. 76-78
    • Keromytis, A.D.1
  • 6
    • 33751035543 scopus 로고    scopus 로고
    • SIP intrusion detection and prevention: Recommendations and prototype implementation
    • VoIP Management and Security, 2006. 1st IEEE Workshop on.
    • Niccolini, S. et al., 2006. SIP intrusion detection and prevention: recommendations and prototype implementation. In VoIP Management and Security, 2006. 1st IEEE Workshop on. VoIP Management and Security, 2006. 1st IEEE Workshop on. pp. 47-52.
    • (2006) VoIP Management and Security, 2006. 1st IEEE Workshop on , pp. 47-52
    • Niccolini, S.1
  • 8
    • 0003240332 scopus 로고    scopus 로고
    • SIP: Session initiation protocol
    • Rosenberg, J. et al., 2002. SIP: Session Initiation Protocol, RFC 3261.
    • (2002) RFC , vol.3261
    • Rosenberg, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.