Skip to main content
Top

2013 | OriginalPaper | Chapter

74. IMS Vulnerability Evaluation Model Based on Gray Theory

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

IP Multimedia Subsystem brings the networks integration and improves the services providing capability. However, as it deteriorates the IMS-based Next Generation Network security, the research on its vulnerabilities receives extensive attention. The factors of IMS vulnerabilities are drawn by using CVSS and the evaluation mode of vulnerability degree is given based on gray-color theory. The frame based on the gray-color theory was constructed, and the gray degree matrix, three angle weights, functions, gray-color evaluation coefficient, weight matrix, evaluation vector matrix, and the evaluation conclusion value were introduced. This model can offer scientific basis for the evaluation of IMS vulnerability degree.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference King SK (2005) 3GPP TS 33.203. 3G security: access security for IP-based services 52:13–16 King SK (2005) 3GPP TS 33.203. 3G security: access security for IP-based services 52:13–16
2.
go back to reference Farmer D, Venema W (2006) Vulnerability assessment framework 1.1, vol 29(18). CIAO publication, New York, pp 125–129 Farmer D, Venema W (2006) Vulnerability assessment framework 1.1, vol 29(18). CIAO publication, New York, pp 125–129
3.
go back to reference Ramakrishnan CR, Sekar R (2005) Survivability analysis of network specifications, workshop on dependability despite malicious faults, vol 10(9). CIAO publication, New York, pp 155–159 Ramakrishnan CR, Sekar R (2005) Survivability analysis of network specifications, workshop on dependability despite malicious faults, vol 10(9). CIAO publication, New York, pp 155–159
4.
go back to reference Swiler LP (2006) A graph based system for network vulnerability analysis. In: Proceedings of the new security paradigms workshop, vol 18(5). CIAO publication, New York, pp 71–79 Swiler LP (2006) A graph based system for network vulnerability analysis. In: Proceedings of the new security paradigms workshop, vol 18(5). CIAO publication, New York, pp 71–79
5.
go back to reference Kuang C, Chen H, Zhang L (2008) Static analysis of vulnerability based on dataflow. Comput Eng 37(21):124–128 Kuang C, Chen H, Zhang L (2008) Static analysis of vulnerability based on dataflow. Comput Eng 37(21):124–128
6.
go back to reference Deng J (2002) Fundamentals of gray theory, vol 18(14). Huazhong University of Science and Technology Press, Wuhan, pp 134–141 Deng J (2002) Fundamentals of gray theory, vol 18(14). Huazhong University of Science and Technology Press, Wuhan, pp 134–141
Metadata
Title
IMS Vulnerability Evaluation Model Based on Gray Theory
Author
Qunling Xu
Copyright Year
2013
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-35398-7_74