Elham Nosrati, S. M. H. Tonekaboni, S. M. H. Tonekaboni
{"title":"Examining CSCF entity attacks scenarios and vulnerabilities in IP Multimedia Subsystems","authors":"Elham Nosrati, S. M. H. Tonekaboni, S. M. H. Tonekaboni","doi":"10.1109/ISIAS.2011.6122837","DOIUrl":null,"url":null,"abstract":"IP Multimedia Subsystems (IMS) were first innovated in 3rd Generation Partnership to fill the gap between classical communications and the Internet. IMS has some security vulnerabilities despite its security mechanisms, which some attacks abuse them to threaten the network. Here we focus on Call Session Control Function (CSCF) and examine different attacks scenarios against it and the relevant vulnerabilities which indicated the relationship between security weaknesses and attacks, as well as that some attacks are a combination of different attacks.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 7th International Conference on Information Assurance and Security (IAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIAS.2011.6122837","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
IP Multimedia Subsystems (IMS) were first innovated in 3rd Generation Partnership to fill the gap between classical communications and the Internet. IMS has some security vulnerabilities despite its security mechanisms, which some attacks abuse them to threaten the network. Here we focus on Call Session Control Function (CSCF) and examine different attacks scenarios against it and the relevant vulnerabilities which indicated the relationship between security weaknesses and attacks, as well as that some attacks are a combination of different attacks.