期刊文献+

电信网计费系统安全问题研究 被引量:1

Research on Security of Telecommunication Accounting System
下载PDF
导出
摘要 在电信网络不断演进与融合的背景下,计费系统的安全问题越来越突出。为此,根据计费系统的结构和功能,分析了计费系统安全涉及的内容。并针对计费系统的特点,依据国际电信联盟提出的技术标准,提炼出一套安全保障措施。最后对计费系统的安全性研究进行了展望。 Accounting system is one of the most important parts of telecommunication network. With the development of the telecommunication network, many new technologies are applying in the system. And with many outside entities have to communicate with accounting system, the interface between them has become more and more complicated. The vulnerability of the accounting system is turning out markedly. In this background, this paper is going to study the security concerns in the accounting system. And according to the standards of ITU (International Telecommunication Union), general methods have been summarized to solve these security problems.
出处 《吉林大学学报(信息科学版)》 CAS 2007年第4期418-423,共6页 Journal of Jilin University(Information Science Edition)
基金 国家242信息安全计划基金资助项目(2005A13)
关键词 计费系统 安全 电信网 accounting system security telecommunication
  • 相关文献

参考文献12

二级参考文献78

  • 1胡尊美,王文国.DDoS攻击技术发展研究[J].网络安全技术与应用,2005(6):24-25. 被引量:5
  • 2张刚,程军,郑江,李铁峰,罗晓富,李鸥.基于自适应阀值的SYN Flooding攻击防御[J].微电子学与计算机,2005,22(5):69-72. 被引量:4
  • 3赵桦,罗晓富,程军,李铁锋,李鸥.DDoS攻击实时检测防御系统的硬件实现[J].微计算机信息,2005,21(07X):75-76. 被引量:10
  • 4钱峰,张蕾.SYN Flood攻击的原理机制/检测与防范措施[J].福建电脑,2005,21(9):62-62. 被引量:1
  • 5[1]David Moore,Geoffrey M Voelker,Stefan Savage.Inferring Internet Denial-of-Service Activity.Proceedings of the 10th USENIX Security Symposium,2001,9-22.
  • 6[2]Oliver Spatscheck,Larry L Peterson.Defending Against Denial of Service Attacks in Scout.Proceedings of the 3rd USENIX/ACM Symposium on Operating Systems Design and Implementation,1999,59-72.
  • 7[3]P Ferguson,D Senie.Network Ingress Filtering:Defeating Denial of Service Attacks which Employ IP Source Address Spoofing.RFC 2827,May 2000.
  • 8[4]Jun Li,Jelena Mirkovic,Mengqiu Wang,et al.SAVE:Source Address Validity Enforcement Protocol.Proceedings of IEEE INFOCOM 2002,June 2002.
  • 9[5]Stefan Savage,David Wetherall,Anna Karlin,et al.Practical Network Support for IP Traceback.Proceedings of the 2000 ACM SIGCOMM Conference,2000,295-306.
  • 10[6]Hal Burch,Bill Cheswick.Tracing Anonymous Packets to Their Approximate Source.Proceedings of the 2000 USENIX LISA Conference,2000,319-327.

共引文献450

同被引文献8

  • 1杨武军,张继荣,屈军锁.内存数据库技术综述[J].西安邮电学院学报,2005,10(3):95-99. 被引量:39
  • 2杨丰瑞,潘安.3G计费分析[J].电信工程技术与标准化,2006,19(2):59-63. 被引量:11
  • 3徐振东,王相杭,谢勤.实时计费控制理论及其在BOSS中的实现[J].电信科学,2006,22(5):8-11. 被引量:5
  • 4朱勇,张炯,沈轶.内存数据库在移动计费系统中的应用[J].现代机械,2007(5):73-76. 被引量:5
  • 5T Yoshida,M Hisada,S Tomita.Implementation of Highly Available Memory Database as SAF Component. Lecture Notes in Computer Science . 2007
  • 6T Yoshida,M Hisada,S Tomita.Implementation of Highly Available Memory Database as SAF Component. Lecture Notes in Computer Science . 2007
  • 7Voras,D Basch,M Zagar.A high performance memory database for web application caches. MELECON2008.The14th IEEE… . 2008
  • 8LEE I,YEOM H Y,PARK T.A new approach fordistributed main memory database systems:A causalcommit protocol. IEICE Transactions on Infor-mation and Systems E Series D . 2004

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部