A Call Conference Room Interception Attack and Its Detection
نویسندگان
چکیده
The IP Multimedia Subsystem (IMS) infrastructure is currently considered to be the main core of Next Generation Networks (NGNs), integrating IP and other network types under one common infrastructure. Consequently, IMS inherits security flaws and vulnerabilities residing in all those technologies. Besides, the protection against unauthorized access in NGN services is of great importance. In this paper we present a call conference room interception attack and we propose a new cross layer architecture to shield IMS against it.
منابع مشابه
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach
Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...
متن کاملIntrusion Detection Using Graph Support: A Hybrid Approach of Supervised and Unsupervised Techniques
At present it is almost impossible to detect zero day attack with help of supervised anomaly detection methods. Unsupervised techniques also have the drawback of low detection rate in spite of detection of zero day attacks. Using combination of both unsupervised and supervised methods, promising detection results can be produced. In this paper we present a new sequence based graph support techn...
متن کاملThe Evaluation of Using Computer Assisted Language Learning (CALL) Facilities in Developing EFL Among Islamic Azad University Practitioners: The Case of Computer Literacy
The present study investigated the university practitioners’ attitudes towards using computer assisted language learning (CALL) in teaching English language at Islamic Azad universities of Khuzestan Province. This study was also to examine the English as foreign language (EFL) MA and PhD teachers’ computer literacy and its effects on using CALL facilities in English classrooms. The participants...
متن کاملF-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملAn integrated vulnerability-based detection/interception model for the protection of regional infrastructure from covert attack
The expanse of U.S. transportation systems has helped to facilitate persistent national economic growth, its ease of access and reliability vital to the plethora of users who utilize daily the established infrastructure. Recent events have shown cause for concern, however, as the vulnerability inherent in such transportation systems has been exploited by the calculated attacks of highly motivat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010