Transaction-Pattern-Based Anomaly Detection Algorithm for IP Multimedia Subsystem

被引:26
作者
Chen, Chi-Yuan [1 ]
Chang, Kai-Di [2 ,3 ]
Chao, Han-Chieh [1 ,2 ,3 ]
机构
[1] Natl DongHwa Univ, Dept Elect Engn, Hualien 97401, Taiwan
[2] Natl Ilan Univ, Dept Elect Engn, Ilan 260, Taiwan
[3] Natl Ilan Univ, Inst Comp Sci & Informat Engn, Ilan 260, Taiwan
关键词
Anomaly detection; high-order Markov chain; IP multimedia subsystem (IMS); next-generation networks; support vector machine (SVM); IMS;
D O I
10.1109/TIFS.2010.2095845
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet Protocol (IP) multimedia subsystem (IMS) plays an important role when migrating to next-generation networks. Based on the all-IP network architecture, at least an IP address is assigned to user equipment for communication. It thus brings not only value-added services, but also security issues such as attacks and threats from traditional IP networks. This paper proposes a novel scheme to detect the anomaly attempts or attacks in an IMS core network. Our proposed scheme adopts the support vector machines (SVMs) technique as our data-mining module. We also utilize the high-order Markov kernel to enhance the detection and prediction rate in sequence calls. Furthermore, the detection algorithm and feature selection for SVM kernel are designed by utilizing IMS transaction patterns. It is proved that the proposed algorithm can efficiently filter out the anomaly attempts in an IMS core network.
引用
收藏
页码:152 / 161
页数:10
相关论文
共 26 条
[1]  
*3GPP, 2003, 23228 3G TS 3GPP
[2]  
*3GPP, 2003, 24228 3G TS 3GPP
[3]  
*3GPP, 2005, 23228 3G TS 3GPP
[4]   Optimal routing for SIP-based session set up over IMS in mobile environment [J].
Alam, Muhammad T. ;
Wu, Zheng D. .
INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2007, 2 (3-4) :264-276
[5]   Architectural aspects of automated network selection in heterogeneous wireless systems [J].
Bari, Farooq ;
Leung, Victor C. M. .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2009, 4 (05) :282-291
[6]  
Berchtold A, 2002, STAT SCI, V17, P328
[7]   A tutorial on Support Vector Machines for pattern recognition [J].
Burges, CJC .
DATA MINING AND KNOWLEDGE DISCOVERY, 1998, 2 (02) :121-167
[8]   Challenges to Next Generation Services in IP Multimedia Subsystem [J].
Chang, Kai-Di ;
Chen, Chi-Yuan ;
Chen, Jiann-Liang ;
Chao, Han-Chieh .
JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2010, 6 (02) :129-146
[9]   An efficient end-to-end security mechanism for IP multimedia subsystem [J].
Chen, Chi-Yuan ;
Wu, Tin-Yu ;
Huang, Yueh-Min ;
Chao, Han-Chieh .
COMPUTER COMMUNICATIONS, 2008, 31 (18) :4259-4268
[10]  
Debar H, 2000, ANN TELECOMMUN, V55, P361