期刊文献+

一种IMS网络合法实体攻击行为的防护策略 被引量:2

Analysis of Attacking Actions of Legal Entities in IMS and Research on the Technology of Defending
下载PDF
导出
摘要 针对IMS网络合法实体被劫持后可能以中间人攻击原理实施攻击行为的安全威胁,提出了一种基于动态验证码的身份验证机制,该机制能够有效地验证通信过程中的各实体,并设计了实体相应的存储表。最后给出了该机制防护效果的分析,通过搭建IMS网络仿真环境验证了其有效性。 In order to eliminate the threat of the attacking actions from legal entities which are hijacked and to use the intermediary principle in IMS, this paper proposes an identity authentication mechanism based on dynamic verification code, which can verify the entities effectively. Then it de- signs the tables of storage for each entity. Finally, it gives the analysis of this defending technology. Simulation results demonstrate the validity of this new mechanism.
出处 《信息工程大学学报》 2011年第3期380-384,共5页 Journal of Information Engineering University
基金 国家863计划资助项目(2008AA011001)
关键词 合法实体 动态验证码 身份验证 legal entities dynamic verification code identity authentication
  • 相关文献

参考文献6

  • 1Miikka Poikselka, Mayer G, Hisham Khartabil,等.IMS:移动领域的IP多媒体概念和服务[M].赵鹏,周胜,望玉梅,译.北京:机械工业出版社,2005:224-233.
  • 2王晓雷,郭云飞,杨涛.IMS中的一种双向监听威胁及仿真[J].计算机应用,2008,28(6):1376-1378. 被引量:1
  • 3DoD 5200.28-STD-85. Trusted Computer System Evaluation Criteria[ S]. 1985.
  • 4ISO/IEC 15408. Information Technology-Security Techniquess-Evaluation Criteria for IT Security [ S ]. 1999.
  • 5DNCSC-TG-021-91. Trusted Database Management Systmn of TCSEC [ S ]. 1991.
  • 6张孝,王珊,彭朝晖.基于安全策略的一种数据保护方法及实现技术[J].计算机科学,2007,34(2):122-124. 被引量:6

二级参考文献19

  • 1俞志春,方滨兴,张兆心.SIP协议的安全性研究[J].计算机应用,2006,26(9):2124-2126. 被引量:21
  • 2方滨兴.信息安全四要素[EB/OL].htrp://pact518.hit. edu. cn/viewpoint/annotation/view.doc. 2005 -07 -05/2006 -03 -14.
  • 3CCIMB-99-031&032 & 033, Common Criteria for Information Technology Security Evaluation, Version 2. 1, August 1999
  • 4GB/T 18336-2001.信息技术/安全技术/信息技术安全性评估准则.2001.
  • 5Department Of Defense. Trusted Database Management System Of TCSEC, 1991
  • 6Elliott B D, LaPadula Leonard J. Secure computer systems: unified exposition and MULTICS interpretation, 1976
  • 7PostgreSQL8. 2, http://developer. postgresql. org/docs/postgres/
  • 8Microsoft Corp. SQL Server 2000, http://msdn. microsoft. com/library/default. asp? url=/library/en-us/tsqlref/ts create2 7eeq. asp
  • 9MySQL 5. 0. http://dev. mysql. com/doc/refman/5. 0/en
  • 10Microsoft Corp. SQL Server 2005. http://msdn2, microsoft.com/en-us/library/ms189799. aspx

共引文献10

同被引文献9

  • 1POIKSELKAM.IMS:移动领域的IP多媒体概念和服务[M].赵鹏,周胜,望玉梅,等,译.北京:机械工业出版社,2005.
  • 23GPP Organizational Partners’ Publications Office. TS 23.228- 2010 The 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; IP Multimedia Subsystem(IMS) Stage 2(Release 9)[S]. 2010.
  • 3Rosenberg J, Schulzrinne H, Camarillo G. SIP: Session Initiation Protocol[S]. RFC 3261, 2002.
  • 4Chen E Y. Detecting DoS Attacks on SIP Systems[C]//Proc. of the 1st IEEE Workshop on VoIP Management and Security. [S. l.]: Institute of Electrical and Electronics Engineers Computer Society, 2006: 51-56.
  • 5中华人民共和国工业和信息化部. YD/T 1984-2009 移动通信网IMS设备技术要求[S]. 2009.
  • 63GPP Organizational Partners’ Publications Office. TS 23.218- 2012 The 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; IP Multimedia (IM) Session Handling(Release 11)[S]. 2012.
  • 7国家标准化管理委员会. YD/T 1980-2009 移动通信网IMS系统接口技术要求Mg/Mi/Mj/Mk/Mw/Gm接口[S]. 2009.
  • 8叶心诗.IMS网络发展策略研究[J].电信快报(网络与通信),2011(1):9-11. 被引量:3
  • 9张帆.IMS在移动网络中的应用[J].硅谷,2011,4(4):95-96. 被引量:3

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部