{"title":"基于攻击的IMS漏洞验证平台","authors":"Yuan Shun, S. Kai, Yang Chun","doi":"10.1109/CMC.2010.205","DOIUrl":null,"url":null,"abstract":"This paper focuses on IMS vulnerability validation platform’s (IMS-VVP) design which combines the characteristics of the vulnerability of IMS. Attack based validate method is an accurate method and has an intuitive effect of the vulnerability discovery. It is suitable for the IMS network’s safety test before on-line. IMS vulnerabilities are imported by IMS businesses. Attack based vulnerability validation process requires accessing to sensitive information and IMS signaling and the other conditions which will be detailed in this paper. In addition, the paper also describes how to support the vulnerability sequence verification. Experiment shows that IMS-VVP comply with features that IMS-based vulnerability validate tool requires. And it is also loaded with rich examples of attack instances which can correctly and effectively validate IMS network’s vulnerability.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Attack Based IMS Vulnerability Validate Platform\",\"authors\":\"Yuan Shun, S. Kai, Yang Chun\",\"doi\":\"10.1109/CMC.2010.205\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper focuses on IMS vulnerability validation platform’s (IMS-VVP) design which combines the characteristics of the vulnerability of IMS. Attack based validate method is an accurate method and has an intuitive effect of the vulnerability discovery. It is suitable for the IMS network’s safety test before on-line. IMS vulnerabilities are imported by IMS businesses. Attack based vulnerability validation process requires accessing to sensitive information and IMS signaling and the other conditions which will be detailed in this paper. In addition, the paper also describes how to support the vulnerability sequence verification. Experiment shows that IMS-VVP comply with features that IMS-based vulnerability validate tool requires. And it is also loaded with rich examples of attack instances which can correctly and effectively validate IMS network’s vulnerability.\",\"PeriodicalId\":296445,\"journal\":{\"name\":\"2010 International Conference on Communications and Mobile Computing\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Communications and Mobile Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CMC.2010.205\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Communications and Mobile Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMC.2010.205","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Attack Based IMS Vulnerability Validate Platform
This paper focuses on IMS vulnerability validation platform’s (IMS-VVP) design which combines the characteristics of the vulnerability of IMS. Attack based validate method is an accurate method and has an intuitive effect of the vulnerability discovery. It is suitable for the IMS network’s safety test before on-line. IMS vulnerabilities are imported by IMS businesses. Attack based vulnerability validation process requires accessing to sensitive information and IMS signaling and the other conditions which will be detailed in this paper. In addition, the paper also describes how to support the vulnerability sequence verification. Experiment shows that IMS-VVP comply with features that IMS-based vulnerability validate tool requires. And it is also loaded with rich examples of attack instances which can correctly and effectively validate IMS network’s vulnerability.