Volume 12, Issue 1 (6-2015)                   JSDP 2015, 12(1): 17-32 | Back to browse issues page

XML Persian Abstract Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Asgharian H, taj N. IMS SIP Server security model using the TVRA methodology. JSDP 2015; 12 (1) :17-32
URL: http://jsdp.rcisp.ac.ir/article-1-64-en.html
Abstract:   (7974 Views)
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. IMS networks are more secure than typical networks like VoIP according to mandatory of user authentication in registration time and added SIP signaling headers. Also different vulnerabilities have been occurred that lead to SIP servers attacks. This paper studies the main SIP servers of IMS (x-CSCF) based on ETSI Threat, Vulnerability and Risk Analysis (TVRA) method. This method is used as a tool to identify potential risks to a system based upon the likelihood of an attack and the impact that such an attack would have on the system. After identifying the assets and weaknesses of IMS SIP servers and finding out the vulnerabilities of these hardware and software components, some security hints that can be used for secure deployment of IMS SIP servers are proposed. Modeling shows the effects of server weaknesses and threats that reduces availability. Any designed system has some assets with weaknesses. When threats have accrued based on weaknesses, the system will vulnerable. Vulnerability analysis optimizes costs and improves security.
Full-Text [PDF 2498 kb]   (2023 Downloads)    
Type of Study: Research | Subject: Paper
Received: 2013/06/3 | Accepted: 2015/02/24 | Published: 2015/07/8 | ePublished: 2015/07/8

Add your comments about this article : Your username or Email:

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2015 All Rights Reserved | Signal and Data Processing