메뉴 건너뛰기




Volumn 12, Issue 3, 2013, Pages 201-217

An intrusion detection and prevention system for IMS and VoIP services

Author keywords

Attacks; Flooding; IDS; IMS; Intrusion; Security; SIP; Spoofing

Indexed keywords

ATTACKS; IDS; IMS; INTRUSION; SECURITY; SIP; SPOOFING;

EID: 84877626643     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-012-0187-0     Document Type: Article
Times cited : (6)

References (42)
  • 1
    • 84877619730 scopus 로고    scopus 로고
    • 3GPP: TS 23. 228: IP Multimedia Subsystems (IMS). Third Generation Partnership Project, Technical Specification Group Services and System Aspects
    • 3GPP: TS 23. 228: IP Multimedia Subsystems (IMS). Third Generation Partnership Project, Technical Specification Group Services and System Aspects (2011).
    • (2011)
  • 3
    • 33645918247 scopus 로고    scopus 로고
    • IP spoofing: an introduction
    • Available at:
    • Tanase, M.: IP spoofing: an introduction. Secur. Focus 11 (2003). Available at: http://www. securityfocus. com/infocus/1674.
    • (2003) Secur. Focus , vol.11
    • Tanase, M.1
  • 5
    • 84881472647 scopus 로고    scopus 로고
    • Survey of security vulnerabilities in session initiation protocol
    • Geneiatakis, D., et al.: Survey of security vulnerabilities in session initiation protocol. IEEE Commun. Surv. Tutor. 8, 68-81 (2006).
    • (2006) IEEE Commun. Surv. Tutor. , vol.8 , pp. 68-81
    • Geneiatakis, D.1
  • 6
    • 50249112555 scopus 로고    scopus 로고
    • A survey of security threats on 4G networks
    • Washington, DC
    • Park, Y., Park, T.: A survey of security threats on 4G networks. In: IEEE Globecom Workshops, Washington, DC, pp. 1-6 (2007).
    • (2007) IEEE Globecom Workshops , pp. 1-6
    • Park, Y.1    Park, T.2
  • 7
    • 71549170504 scopus 로고    scopus 로고
    • A survey of voice over IP security research
    • A. Prakash and I. Sen Gupta (Eds.), Berlin: Springer
    • Keromytis, A.: A survey of voice over IP security research. In: Prakash, A., Sen Gupta, I. (eds.) Information Systems Security, vol. 5905, pp. 1-17. Springer, Berlin (2009).
    • (2009) Information Systems Security , vol.5905 , pp. 1-17
    • Keromytis, A.1
  • 8
    • 84877616140 scopus 로고    scopus 로고
    • 3GPP: TS 33. 203: 3G security; Access security for IP-based services (Release 10). Third Generation Partnership Project, Technical Specification Group Services and System Aspects
    • 3GPP: TS 33. 203: 3G security; Access security for IP-based services (Release 10). Third Generation Partnership Project, Technical Specification Group Services and System Aspects (2010).
    • (2010)
  • 9
    • 0003365506 scopus 로고    scopus 로고
    • RFC 2617: HTTP authentication: basic and digest access authentication
    • Available at:
    • Franks, J., et al.: RFC 2617: HTTP authentication: basic and digest access authentication. Internet Eng. Task Force (1999). Available at: http://www. ietf. org/rfc/rfc2617. txt.
    • (1999) Internet Eng. Task Force
    • Franks, J.1
  • 10
    • 67349141318 scopus 로고    scopus 로고
    • Intrusion detection in voice over IP environments
    • Wu, Y., et al.: Intrusion detection in voice over IP environments. Int. J. Inf. Secur. 8, 153-172 (2009).
    • (2009) Int. J. Inf. Secur. , vol.8 , pp. 153-172
    • Wu, Y.1
  • 11
    • 4544342880 scopus 로고    scopus 로고
    • Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-ip environments
    • Firenze, Italy
    • Wu, Y., et al.: Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-ip environments. In: Proceedgins of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), Firenze, Italy, pp. 433-442 (2004).
    • (2004) Proceedgins of the 2004 International Conference on Dependable Systems and Networks (DSN 2004) , pp. 433-442
    • Wu, Y.1
  • 12
    • 44049088453 scopus 로고    scopus 로고
    • Detecting VoIP floods using the Hellinger distance
    • Sengar, H., et al.: Detecting VoIP floods using the Hellinger distance. IEEE Trans. Parallel Distrib. Syst. 794-805 (2008).
    • (2008) IEEE Trans. Parallel Distrib. Syst. , pp. 794-805
    • Sengar, H.1
  • 13
    • 70349440967 scopus 로고    scopus 로고
    • Utilizing bloom filters for detecting flooding attacks against SIP based services
    • Geneiatakis, D., et al.: Utilizing bloom filters for detecting flooding attacks against SIP based services. Compu. Secur. 28, 578-591 (2009).
    • (2009) Compu. Secur. , vol.28 , pp. 578-591
    • Geneiatakis, D.1
  • 21
    • 55349096825 scopus 로고    scopus 로고
    • Abusing SIP authenticationsISIAS' 08: Fourth International Conference on Information Assurance and Security
    • Abdelnur, H., et al.: Abusing SIP authentication. In: ISIAS' 08: Fourth International Conference on Information Assurance and Security, pp. 237-242 (2008).
    • (2008) , pp. 237-242
    • Abdelnur, H.1
  • 23
    • 84899512720 scopus 로고    scopus 로고
    • A call conference room interception attack and its detection
    • Privacy and Security in Digital Business, Bilbao, Spain
    • Vrakas, N., et al.: A call conference room interception attack and its detection. In: Presented at the 7th International Conference on Trust, Privacy and Security in Digital Business, Bilbao, Spain, (2010).
    • (2010) Presented at the 7th International Conference on Trust
    • Vrakas, N.1
  • 24
    • 33645694893 scopus 로고    scopus 로고
    • Man-in-the-middle in tunnelled authentication protocols
    • Asokan, N., et al.: Man-in-the-middle in tunnelled authentication protocols. Lecture Notes in Computer Science, vol. 3364, p. 28 (2005).
    • (2005) Lecture Notes in Computer Science , vol.3364 , pp. 28
    • Asokan, N.1
  • 26
    • 77952347156 scopus 로고    scopus 로고
    • On the feasibility of launching the man -in-the-middle attacks on VoIP from remote attackers
    • Computer and Communications Security, Sydney, Australia, March
    • Zhang, R., et al.: On the feasibility of launching the man -in-the-middle attacks on VoIP from remote attackers. In: Presented at the 4th ACM Symposium on Information, Computer and Communications Security, Sydney, Australia, March (2009).
    • (2009) Presented at the 4th ACM Symposium on Information
    • Zhang, R.1
  • 29
    • 85001721086 scopus 로고    scopus 로고
    • A cross layer spoofing detection mechanism for multimedia communication services
    • Vrakas, N., Lambrinoudakis, C.: A cross layer spoofing detection mechanism for multimedia communication services. Int. J. Inf. Technol. Syst. Approach (IJITSA) 4, 32-47 (2011).
    • (2011) Int. J. Inf. Technol. Syst. Approach (IJITSA) , vol.4 , pp. 32-47
    • Vrakas, N.1    Lambrinoudakis, C.2
  • 31
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • Bellovin, S.: Security problems in the TCP/IP protocol suite. ACM SIGCOMM Comput. Commun. Rev. 19, 48 (1989).
    • (1989) ACM SIGCOMM Comput. Commun. Rev. , vol.19 , pp. 48
    • Bellovin, S.1
  • 32
    • 84877614127 scopus 로고    scopus 로고
    • 3GPP: TR 33. 978 Security aspects of early IP Multimedia Subsystem (IMS). Third Generation Partnership Project, Technical Specification Group Services and System Aspects
    • 3GPP: TR 33. 978 Security aspects of early IP Multimedia Subsystem (IMS). Third Generation Partnership Project, Technical Specification Group Services and System Aspects (2008).
    • (2008)
  • 33
    • 84877615020 scopus 로고    scopus 로고
    • ETSI: TS 187.003: Telecommunications and internet converged services and protocols for advanced networking (TISPAN): Security Architecture
    • ETSI: TS 187.003: Telecommunications and internet converged services and protocols for advanced networking (TISPAN): Security Architecture. (2008).
    • (2008)
  • 34
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom, B. H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 422-426 (1970).
    • (1970) Commun. ACM , vol.13 , pp. 422-426
    • Bloom, B.H.1
  • 35
    • 84856753886 scopus 로고    scopus 로고
    • Statistical segregation method to minimize the false detections during DDoS attacks
    • Udhayan, J., Hamsapriya, T.: Statistical segregation method to minimize the false detections during DDoS attacks. Int. J. Netw. Secur. 13, 152-160 (2011).
    • (2011) Int. J. Netw. Secur. , vol.13 , pp. 152-160
    • Udhayan, J.1    Hamsapriya, T.2
  • 37
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to ROC analysis
    • Fawcett, T.: An introduction to ROC analysis. Pattern Recognit. Lett. 27, 861-874 (2006).
    • (2006) Pattern Recognit. Lett. , vol.27 , pp. 861-874
    • Fawcett, T.1
  • 39
    • 57349164073 scopus 로고    scopus 로고
    • Holistic VoIP intrusion detection and prevention system
    • In: Bond, G. W., Schulzrinne, H., Sisalem, D. (eds.),New York, USA
    • Nassar, M., Niccolini, S.: Holistic VoIP intrusion detection and prevention system. In: Bond, G. W., Schulzrinne, H., Sisalem, D. (eds.) Principles, Systems andApplications of IP Telecommunications (IPTComm 2007). New York, USA, pp. 1-9 (2007).
    • (2007) Principles, Systems andApplications of IP Telecommunications (IPTComm 2007) , pp. 1-9
    • Nassar, M.1    Niccolini, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.