...
首页> 外文期刊>Bell Labs technical journal >Optimal Availability and Security for IMS-Based VoIP Networks
【24h】

Optimal Availability and Security for IMS-Based VoIP Networks

机译:基于IMS的VoIP网络的最佳可用性和安全性

获取原文
获取原文并翻译 | 示例

摘要

Consumers are continuously looking for ways of improving their productivity, simplifying their tasks, and streamlining communications both domestically and globally. This has resulted in the need to support different applications and thus the ongoing process of migrating many network services from traditional circuit-switched networks to Internet Protocol (IP) to converged networks. The circuit-switched public switched telephone network (PSTN) was a closed network where cyber-security threats were not a major issue. With the advent of converged networks and IP-based services, service providers, government, and enterprises are concerned about the growing security threat. The new networks and equipment will be subject to many types of threats and their vulnerabilities may expose mission critical applications and infrastructure to risk. Realization of these threats can lead to service outage. Today's communications service provider must decide how to treat the effects of security breaches so as to minimize service downtime. This paper highlights a methodology, with examples to identify the effect of security-related failures and the critical design factors to be considered when modeling service reliability. The ITU-TX.805 standard (now also ISO standard 18028-2), based on the Bell Labs security model, is used to evaluate potential high impact threats and vulnerabilities. The analysis uses the Bell Labs domain technique known as security domain evaluation. One of the critical outputs provides a prioritized understanding of the threats the network is exposed to and the vulnerabilities in the security architecture. The next step in the methodology includes incorporating the threats (vulnerabilities) identified in a reliability model and quantifying the corresponding service degradation. In this paper, these concepts are applied to IP Multimedia Subsystem (IMS)-based VoIP (Voice over IP) networks. Using reliability metrics, our analysis shows that reliability models are optimistic if we do not consider security. We demonstrate how reliability models can be enhanced to take security issues into account and that the X.805 standard can be used to identify the security threats. Finally, the model shows the mitigation in downtime by including intrusion-tolerance features in the product and network design. Consideration of security-caused downtime will lead to increased focus on preventing security vulnerabilities that can lead to service outages and also allow service providers to save on maintenance costs.
机译:消费者一直在寻找提高生产率,简化任务并简化国内外沟通的方法。这导致需要支持不同的应用程序,因此正在进行将许多网络服务从传统的电路交换网络迁移到Internet协议(IP)到融合网络的过程。电路交换公共交换电话网(PSTN)是一个封闭的网络,网络安全威胁不是主要问题。随着融合网络和基于IP的服务的出现,服务提供商,政府和企业都对不断增长的安全威胁感到担忧。新的网络和设备将受到许多类型的威胁,其漏洞可能使关键任务应用程序和基础架构面临风险。这些威胁的实现可能导致服务中断。当今的通信服务提供商必须决定如何处理安全漏洞的影响,以最大程度地减少服务停机时间。本文着重介绍了一种方法,并举例说明了与安全性相关的故障的影响以及在对服务可靠性进行建模时要考虑的关键设计因素。基于贝尔实验室安全模型的ITU-TX.805标准(现在也为ISO标准18028-2)用于评估潜在的高冲击威胁和漏洞。该分析使用称为安全域评估的Bell Labs域技术。关键输出之一可优先了解网络所面临的威胁以及安全体系结构中的漏洞。该方法的下一步包括合并在可靠性模型中确定的威胁(漏洞)并量化相应的服务降级。在本文中,这些概念被应用于基于IP多媒体子系统(IMS)的VoIP(IP语音)网络。使用可靠性指标,我们的分析表明,如果不考虑安全性,可靠性模型是乐观的。我们演示了如何增强可靠性模型以考虑安全问题,以及X.805标准可用于识别安全威胁。最后,该模型通过在产品和网络设计中包含入侵容忍功能来显示停机时间的缓解情况。考虑到由安全性引起的停机时间,将导致人们更加关注防止可能导致服务中断的安全漏洞,并使服务提供商可以节省维护成本。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号