TITLE

Protecting IMS Networks From Attack

AUTHOR(S)
Kurapati, Krishna
PUB. DATE
September 2006
SOURCE
Business Communications Review;Sep2006, Vol. 36 Issue 9, p40
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers a look at application-level attacks, which the author claims are on the rise in business enterprises. The article suggests that in order to cope, network operators who plan to offer Internet-based services using IP Multimedia Subsystem (IMS) must go to great lengths to protect computer servers from hackers, malware, and service abuses. Several diagrams are presented that show how to hack an IMS network, examples of floods and the components attacked, and an example of a stealth attack.
ACCESSION #
22989307

 

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics