期刊文献+

一种分布式移动核心网安全架构的设计与研究 被引量:3

Design and Research on Distributed Mobile Core Network Security Protection Architectrue
原文传递
导出
摘要 分析了移动通信核心网的安全现状,在不改变当前核心网协议体系的前提下,提出了一种基于现有通信网络的分布式核心网安全防护架构。该架构通过在核心网中引入网络安全控制、设备访问控制、媒体信令检测等前置功能模块,并对核心网数据库内部的存储结构进行优化,增强了移动通信核心网的安全防护能力,并有利于各功能实体的独立演进。此外还归纳总结了安全防护模块中需要研究的关键技术。 With not change on the current protocols system of mobile core network, a distributed core network security protection architecture is proposed. By introducing some anterior-set function modules, such as network security control, access control, media and signaling detection into the core network and optimizing the the store structure of the core database, the security protection architecture could enhance security protection capability of the core network. Each function module could facilitate independent advancement. Finally, this paper sums up the key technologies in different security protection module that need to be researched.
出处 《通信技术》 2009年第2期241-243,共3页 Communications Technology
基金 国家"863"高技术研究发展计划项目(2007AA01Z434)资助。
关键词 移动核心网 安全防护 访问控制 入侵检测 重定向 mobile core network security protection access control intrusion detection redirection
  • 相关文献

参考文献8

二级参考文献25

  • 1Dong H Y,Kim S,Nam C,et al.Fixed and mobile service convergence and reconfiguration of telecommunications value chains[J].Wireless Communications,IEEE,2004,11(5):42-47.
  • 2Vriendt D J,Laine P,Lerouge C,et al.Mobile network evolution:a revolution on the move[J].Communications Magazine,IEEE,2002,40 (4):104-111.
  • 33GPP TS 23.228-2003,IP multimedia subsystem[S].
  • 4Karlich S,Zahariadis T,Zervos N,et al.A self-adaptive service provisioning framework for 3G +/4G mobile applications[J].Wireless Communications,IEEE,2004,11(5):48 -56.
  • 5Roos A,Hartman M,Dutnall,S.Critical issues for roaming in 3G[J].Wireless Communications,IEEE,2003,10 (1):29 -35.
  • 6Sigurdsson H M,Thorsteinsson S E,Stidsen T K.Cost optimization methods in the design of next generation networks[J].Communications Magazine,IEEE,2004,42 (9):118-122.
  • 7Rumsewicz M.On the efficacy of using the transfer-controlled procedure during periods of STP processor overload in SS7 networks[J].IEEE Journal on Selected Areas in Communications,1994,12 (3):415-423.
  • 8Min Y C,Jae U Y,Dan K S.Performability analysis of common-channel signaling networks,based on signaling system 7[J].IEEE Transactions on Reliability,1999,48(3):224-233.
  • 9Peir-Yuan W,Jung-Shyr W.Performance modeling and analysis of SIP-T signaling system in carrier class packet telephony network for next generation networks[J].IE-ICE Transactions on Communications,2002,E85-B (8):1572-1584.
  • 10Peng Tao,Leckie C,Ramamohanarao K.Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring[C].Third International IFIP-TC6 Networking Conference,Athens,Greecea,2004:771-782.

共引文献18

同被引文献14

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部