Frank S. Park, Devdutt Patnaik, Chaitrali Amrutkar, Michael T. Hunter
{"title":"A security evaluation of IMS deployments","authors":"Frank S. Park, Devdutt Patnaik, Chaitrali Amrutkar, Michael T. Hunter","doi":"10.1109/IMSAA.2008.4753937","DOIUrl":null,"url":null,"abstract":"The IP multimedia subsystem (IMS) portends major changes for all parties involved in the exchange of digital content and services. As the IMS architecture moves from specifications to implementations, real-world considerations can influence deployments in ways that have noteworthy security implications. In this work, we present and exemplify a systematic security evaluation of IMS deployments using a threat modeling approach. We also offer suggestions for possible mitigations where appropriate. The experiments conducted are on a production-class IMS deployment and a separate IMS testing environment.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMSAA.2008.4753937","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18
Abstract
The IP multimedia subsystem (IMS) portends major changes for all parties involved in the exchange of digital content and services. As the IMS architecture moves from specifications to implementations, real-world considerations can influence deployments in ways that have noteworthy security implications. In this work, we present and exemplify a systematic security evaluation of IMS deployments using a threat modeling approach. We also offer suggestions for possible mitigations where appropriate. The experiments conducted are on a production-class IMS deployment and a separate IMS testing environment.