Font Size: a A A

Modeling And Simulation Of IMS Under The Attack

Posted on:2008-08-06Degree:MasterType:Thesis
Country:ChinaCandidate:Z NingFull Text:PDF
GTID:2178360215483605Subject:Information security
Abstract/Summary:PDF Full Text Request
First, this paper introduces the definition of network survivability, research methods and research on the status quo. Survivability refers to the network system which is subjected to attack, errors or accidents, ensures key tasks to be completed within the stipulated time, and afterwards restores all services. International study on the viability of the Internet is a major issue one of security.Then, the main theses against the next generation IMS network layer for survival study focus on the SIP signaling process: registration process and conversation flow. IMS (IP Multimedia Subsystem) is the core of 3G Network (CN), and it is an independent technology in the IP-based access control system that can be achieved with existing voice and data network links. The terminal can be established through various types of IMS communications, and the necessary quality of service. IMS conversation initiated by the SIP agreement provides the ability to build end-to-end conversation. IMS system is divided into three relatively independent models in this paper: external environment, system state model and system service model, which is available to analysis. The external environment includes attacks model and system configuration; the state system is described through the transition probability matrix; stochastic Petri nets is used to model the system service model. Stochastic Petri traditionally is described as a mathematical tool for the assessment of system performance. Compared with the Markov chain, it is more simple, direct, understandable and user-friendly. The paper made a survival analysis of the system using the quantitative assessment formula established before after a simulation for the model.At last, the paper made a brief introduction to the survival techniques available nowadays, especially the backup redundancy technique focus on the viability of the use of the system.
Keywords/Search Tags:Network Survivability, IMS, Stochastic Petri Nets, Quantitative Assessment Formula
PDF Full Text Request
Related items