Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Leveraging countermeasures as a service for VoIP security in the cloud

Identifieur interne : 000E20 ( Main/Exploration ); précédent : 000E19; suivant : 000E21

Leveraging countermeasures as a service for VoIP security in the cloud

Auteurs : Oussema Dabbebi [France] ; Remi Badonnel [France] ; Olivier Festor [France]

Source :

RBID : ISTEX:EEAF92FA891CD71AD1B3D2F843E1AA1B1B4EA347

Abstract

The emergence of cloud computing is contributing to the integration of multiple services, in particular VoIP services. While the cloud has recently been used for performing security attacks targeting IP telephony, it also provides new opportunities for supporting the security of this service. In that context, we propose a risk management strategy for VoIP cloud based on security countermeasures that may be outsourced as services. We present the architecture of our solution and its components in the context of services implementing the SIP protocol. We describe the mathematical modelling supporting our approach and detail different treatment strategies for the application of countermeasures. Finally, we quantify the benefits and limits of these strategies based on extensive simulation results. When a countermeasure fails, these strategies allow us to maintain the risk level low at an additional cost of up to 7%, or to accept an additional risk of up to 12%. They can also be combined to obtain a trade‐off between cost and performance. Copyright © 2013 John Wiley & Sons, Ltd.
In this paper, we propose a risk management strategy for supporting the security of VoIP services in the cloud. This solution is based on countermeasures that are outsourced as a service in the Cloud. We present the architecture of our approach in the context of services implementing the SIP protocol. We describe the mathematical modelling supporting our solution and detail different treatment mechanisms for the application of countermeasures. Finally, we quantify the benefits and limits of these mechanisms based on extensive simulation results.

Url:
DOI: 10.1002/nem.1853


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Leveraging countermeasures as a service for VoIP security in the cloud</title>
<author>
<name sortKey="Dabbebi, Oussema" sort="Dabbebi, Oussema" uniqKey="Dabbebi O" first="Oussema" last="Dabbebi">Oussema Dabbebi</name>
</author>
<author>
<name sortKey="Badonnel, Remi" sort="Badonnel, Remi" uniqKey="Badonnel R" first="Remi" last="Badonnel">Remi Badonnel</name>
</author>
<author>
<name sortKey="Festor, Olivier" sort="Festor, Olivier" uniqKey="Festor O" first="Olivier" last="Festor">Olivier Festor</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:EEAF92FA891CD71AD1B3D2F843E1AA1B1B4EA347</idno>
<date when="2014" year="2014">2014</date>
<idno type="doi">10.1002/nem.1853</idno>
<idno type="url">https://api.istex.fr/ark:/67375/WNG-FSWQ54FP-V/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">003919</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">003919</idno>
<idno type="wicri:Area/Istex/Curation">003876</idno>
<idno type="wicri:Area/Istex/Checkpoint">000031</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000031</idno>
<idno type="wicri:doubleKey">1055-7148:2014:Dabbebi O:leveraging:countermeasures:as</idno>
<idno type="wicri:source">HAL</idno>
<idno type="RBID">Hal:hal-00926233</idno>
<idno type="url">https://hal.inria.fr/hal-00926233</idno>
<idno type="wicri:Area/Hal/Corpus">002E86</idno>
<idno type="wicri:Area/Hal/Curation">002E86</idno>
<idno type="wicri:Area/Hal/Checkpoint">000D88</idno>
<idno type="wicri:explorRef" wicri:stream="Hal" wicri:step="Checkpoint">000D88</idno>
<idno type="wicri:Area/Main/Merge">000E12</idno>
<idno type="wicri:Area/Main/Curation">000E20</idno>
<idno type="wicri:Area/Main/Exploration">000E20</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main">Leveraging countermeasures as a service for VoIP security in the cloud</title>
<author>
<name sortKey="Dabbebi, Oussema" sort="Dabbebi, Oussema" uniqKey="Dabbebi O" first="Oussema" last="Dabbebi">Oussema Dabbebi</name>
<affiliation wicri:level="3">
<country xml:lang="fr">France</country>
<wicri:regionArea>INRIA Nancy Grand Est, LORIA–University of Lorraine, Technopôle de Nancy Brabois, 54506, Vandœuvre‐lès‐Nancy</wicri:regionArea>
<placeName>
<region type="region" nuts="2">Grand Est</region>
<region type="old region" nuts="2">Lorraine (région)</region>
<settlement type="city">Vandœuvre‐lès‐Nancy</settlement>
</placeName>
</affiliation>
<affiliation></affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">France</country>
</affiliation>
</author>
<author>
<name sortKey="Badonnel, Remi" sort="Badonnel, Remi" uniqKey="Badonnel R" first="Remi" last="Badonnel">Remi Badonnel</name>
<affiliation wicri:level="3">
<country xml:lang="fr">France</country>
<wicri:regionArea>INRIA Nancy Grand Est, LORIA–University of Lorraine, Technopôle de Nancy Brabois, 54506, Vandœuvre‐lès‐Nancy</wicri:regionArea>
<placeName>
<region type="region" nuts="2">Grand Est</region>
<region type="old region" nuts="2">Lorraine (région)</region>
<settlement type="city">Vandœuvre‐lès‐Nancy</settlement>
</placeName>
</affiliation>
</author>
<author>
<name sortKey="Festor, Olivier" sort="Festor, Olivier" uniqKey="Festor O" first="Olivier" last="Festor">Olivier Festor</name>
<affiliation wicri:level="3">
<country xml:lang="fr">France</country>
<wicri:regionArea>INRIA Nancy Grand Est, LORIA–University of Lorraine, Technopôle de Nancy Brabois, 54506, Vandœuvre‐lès‐Nancy</wicri:regionArea>
<placeName>
<region type="region" nuts="2">Grand Est</region>
<region type="old region" nuts="2">Lorraine (région)</region>
<settlement type="city">Vandœuvre‐lès‐Nancy</settlement>
</placeName>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="j" type="main">International Journal of Network Management</title>
<title level="j" type="alt">INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT</title>
<idno type="ISSN">1055-7148</idno>
<idno type="eISSN">1099-1190</idno>
<imprint>
<biblScope unit="vol">24</biblScope>
<biblScope unit="issue">1</biblScope>
<biblScope unit="page" from="70">70</biblScope>
<biblScope unit="page" to="84">84</biblScope>
<biblScope unit="page-count">15</biblScope>
<date type="published" when="2014-01">2014-01</date>
</imprint>
<idno type="ISSN">1055-7148</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">1055-7148</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract">The emergence of cloud computing is contributing to the integration of multiple services, in particular VoIP services. While the cloud has recently been used for performing security attacks targeting IP telephony, it also provides new opportunities for supporting the security of this service. In that context, we propose a risk management strategy for VoIP cloud based on security countermeasures that may be outsourced as services. We present the architecture of our solution and its components in the context of services implementing the SIP protocol. We describe the mathematical modelling supporting our approach and detail different treatment strategies for the application of countermeasures. Finally, we quantify the benefits and limits of these strategies based on extensive simulation results. When a countermeasure fails, these strategies allow us to maintain the risk level low at an additional cost of up to 7%, or to accept an additional risk of up to 12%. They can also be combined to obtain a trade‐off between cost and performance. Copyright © 2013 John Wiley & Sons, Ltd.</div>
<div type="abstract">In this paper, we propose a risk management strategy for supporting the security of VoIP services in the cloud. This solution is based on countermeasures that are outsourced as a service in the Cloud. We present the architecture of our approach in the context of services implementing the SIP protocol. We describe the mathematical modelling supporting our solution and detail different treatment mechanisms for the application of countermeasures. Finally, we quantify the benefits and limits of these mechanisms based on extensive simulation results.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>France</li>
</country>
<region>
<li>Grand Est</li>
<li>Lorraine (région)</li>
</region>
<settlement>
<li>Vandœuvre‐lès‐Nancy</li>
</settlement>
</list>
<tree>
<country name="France">
<region name="Grand Est">
<name sortKey="Dabbebi, Oussema" sort="Dabbebi, Oussema" uniqKey="Dabbebi O" first="Oussema" last="Dabbebi">Oussema Dabbebi</name>
</region>
<name sortKey="Badonnel, Remi" sort="Badonnel, Remi" uniqKey="Badonnel R" first="Remi" last="Badonnel">Remi Badonnel</name>
<name sortKey="Dabbebi, Oussema" sort="Dabbebi, Oussema" uniqKey="Dabbebi O" first="Oussema" last="Dabbebi">Oussema Dabbebi</name>
<name sortKey="Festor, Olivier" sort="Festor, Olivier" uniqKey="Festor O" first="Olivier" last="Festor">Olivier Festor</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000E20 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000E20 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:EEAF92FA891CD71AD1B3D2F843E1AA1B1B4EA347
   |texte=   Leveraging countermeasures as a service for VoIP security in the cloud
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022