Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 227))

Abstract

IP Multimedia Subsystem brings the networks integration and improves the services providing capability. However, as it deteriorates the IMS-based Next Generation Network security, the research on its vulnerabilities receives extensive attention. The factors of IMS vulnerabilities are drawn by using CVSS and the evaluation mode of vulnerability degree is given based on gray-color theory. The frame based on the gray-color theory was constructed, and the gray degree matrix, three angle weights, functions, gray-color evaluation coefficient, weight matrix, evaluation vector matrix, and the evaluation conclusion value were introduced. This model can offer scientific basis for the evaluation of IMS vulnerability degree.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. King SK (2005) 3GPP TS 33.203. 3G security: access security for IP-based services 52:13–16

    Google Scholar 

  2. Farmer D, Venema W (2006) Vulnerability assessment framework 1.1, vol 29(18). CIAO publication, New York, pp 125–129

    Google Scholar 

  3. Ramakrishnan CR, Sekar R (2005) Survivability analysis of network specifications, workshop on dependability despite malicious faults, vol 10(9). CIAO publication, New York, pp 155–159

    Google Scholar 

  4. Swiler LP (2006) A graph based system for network vulnerability analysis. In: Proceedings of the new security paradigms workshop, vol 18(5). CIAO publication, New York, pp 71–79

    Google Scholar 

  5. Kuang C, Chen H, Zhang L (2008) Static analysis of vulnerability based on dataflow. Comput Eng 37(21):124–128

    Google Scholar 

  6. Deng J (2002) Fundamentals of gray theory, vol 18(14). Huazhong University of Science and Technology Press, Wuhan, pp 134–141

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qunling Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xu, Q. (2013). IMS Vulnerability Evaluation Model Based on Gray Theory. In: Yang, Y., Ma, M. (eds) Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 5. Lecture Notes in Electrical Engineering, vol 227. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35398-7_74

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35398-7_74

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35397-0

  • Online ISBN: 978-3-642-35398-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics