Leveraging countermeasures as a service for VoIP security in the cloud
Identifieur interne : 000E20 ( Main/Exploration ); précédent : 000E19; suivant : 000E21Leveraging countermeasures as a service for VoIP security in the cloud
Auteurs : Oussema Dabbebi [France] ; Remi Badonnel [France] ; Olivier Festor [France]Source :
- International Journal of Network Management [ 1055-7148 ] ; 2014-01.
Abstract
The emergence of cloud computing is contributing to the integration of multiple services, in particular VoIP services. While the cloud has recently been used for performing security attacks targeting IP telephony, it also provides new opportunities for supporting the security of this service. In that context, we propose a risk management strategy for VoIP cloud based on security countermeasures that may be outsourced as services. We present the architecture of our solution and its components in the context of services implementing the SIP protocol. We describe the mathematical modelling supporting our approach and detail different treatment strategies for the application of countermeasures. Finally, we quantify the benefits and limits of these strategies based on extensive simulation results. When a countermeasure fails, these strategies allow us to maintain the risk level low at an additional cost of up to 7%, or to accept an additional risk of up to 12%. They can also be combined to obtain a trade‐off between cost and performance. Copyright © 2013 John Wiley & Sons, Ltd.
In this paper, we propose a risk management strategy for supporting the security of VoIP services in the cloud. This solution is based on countermeasures that are outsourced as a service in the Cloud. We present the architecture of our approach in the context of services implementing the SIP protocol. We describe the mathematical modelling supporting our solution and detail different treatment mechanisms for the application of countermeasures. Finally, we quantify the benefits and limits of these mechanisms based on extensive simulation results.
Url:
DOI: 10.1002/nem.1853
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 003919
- to stream Istex, to step Curation: 003876
- to stream Istex, to step Checkpoint: 000031
- to stream Hal, to step Corpus: 002E86
- to stream Hal, to step Curation: 002E86
- to stream Hal, to step Checkpoint: 000D88
- to stream Main, to step Merge: 000E12
- to stream Main, to step Curation: 000E20
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Leveraging countermeasures as a service for VoIP security in the cloud</title>
<author><name sortKey="Dabbebi, Oussema" sort="Dabbebi, Oussema" uniqKey="Dabbebi O" first="Oussema" last="Dabbebi">Oussema Dabbebi</name>
</author>
<author><name sortKey="Badonnel, Remi" sort="Badonnel, Remi" uniqKey="Badonnel R" first="Remi" last="Badonnel">Remi Badonnel</name>
</author>
<author><name sortKey="Festor, Olivier" sort="Festor, Olivier" uniqKey="Festor O" first="Olivier" last="Festor">Olivier Festor</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:EEAF92FA891CD71AD1B3D2F843E1AA1B1B4EA347</idno>
<date when="2014" year="2014">2014</date>
<idno type="doi">10.1002/nem.1853</idno>
<idno type="url">https://api.istex.fr/ark:/67375/WNG-FSWQ54FP-V/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">003919</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">003919</idno>
<idno type="wicri:Area/Istex/Curation">003876</idno>
<idno type="wicri:Area/Istex/Checkpoint">000031</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000031</idno>
<idno type="wicri:doubleKey">1055-7148:2014:Dabbebi O:leveraging:countermeasures:as</idno>
<idno type="wicri:source">HAL</idno>
<idno type="RBID">Hal:hal-00926233</idno>
<idno type="url">https://hal.inria.fr/hal-00926233</idno>
<idno type="wicri:Area/Hal/Corpus">002E86</idno>
<idno type="wicri:Area/Hal/Curation">002E86</idno>
<idno type="wicri:Area/Hal/Checkpoint">000D88</idno>
<idno type="wicri:explorRef" wicri:stream="Hal" wicri:step="Checkpoint">000D88</idno>
<idno type="wicri:Area/Main/Merge">000E12</idno>
<idno type="wicri:Area/Main/Curation">000E20</idno>
<idno type="wicri:Area/Main/Exploration">000E20</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main">Leveraging countermeasures as a service for VoIP security in the cloud</title>
<author><name sortKey="Dabbebi, Oussema" sort="Dabbebi, Oussema" uniqKey="Dabbebi O" first="Oussema" last="Dabbebi">Oussema Dabbebi</name>
<affiliation wicri:level="3"><country xml:lang="fr">France</country>
<wicri:regionArea>INRIA Nancy Grand Est, LORIA–University of Lorraine, Technopôle de Nancy Brabois, 54506, Vandœuvre‐lès‐Nancy</wicri:regionArea>
<placeName><region type="region" nuts="2">Grand Est</region>
<region type="old region" nuts="2">Lorraine (région)</region>
<settlement type="city">Vandœuvre‐lès‐Nancy</settlement>
</placeName>
</affiliation>
<affiliation></affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">France</country>
</affiliation>
</author>
<author><name sortKey="Badonnel, Remi" sort="Badonnel, Remi" uniqKey="Badonnel R" first="Remi" last="Badonnel">Remi Badonnel</name>
<affiliation wicri:level="3"><country xml:lang="fr">France</country>
<wicri:regionArea>INRIA Nancy Grand Est, LORIA–University of Lorraine, Technopôle de Nancy Brabois, 54506, Vandœuvre‐lès‐Nancy</wicri:regionArea>
<placeName><region type="region" nuts="2">Grand Est</region>
<region type="old region" nuts="2">Lorraine (région)</region>
<settlement type="city">Vandœuvre‐lès‐Nancy</settlement>
</placeName>
</affiliation>
</author>
<author><name sortKey="Festor, Olivier" sort="Festor, Olivier" uniqKey="Festor O" first="Olivier" last="Festor">Olivier Festor</name>
<affiliation wicri:level="3"><country xml:lang="fr">France</country>
<wicri:regionArea>INRIA Nancy Grand Est, LORIA–University of Lorraine, Technopôle de Nancy Brabois, 54506, Vandœuvre‐lès‐Nancy</wicri:regionArea>
<placeName><region type="region" nuts="2">Grand Est</region>
<region type="old region" nuts="2">Lorraine (région)</region>
<settlement type="city">Vandœuvre‐lès‐Nancy</settlement>
</placeName>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="j" type="main">International Journal of Network Management</title>
<title level="j" type="alt">INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT</title>
<idno type="ISSN">1055-7148</idno>
<idno type="eISSN">1099-1190</idno>
<imprint><biblScope unit="vol">24</biblScope>
<biblScope unit="issue">1</biblScope>
<biblScope unit="page" from="70">70</biblScope>
<biblScope unit="page" to="84">84</biblScope>
<biblScope unit="page-count">15</biblScope>
<date type="published" when="2014-01">2014-01</date>
</imprint>
<idno type="ISSN">1055-7148</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">1055-7148</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract">The emergence of cloud computing is contributing to the integration of multiple services, in particular VoIP services. While the cloud has recently been used for performing security attacks targeting IP telephony, it also provides new opportunities for supporting the security of this service. In that context, we propose a risk management strategy for VoIP cloud based on security countermeasures that may be outsourced as services. We present the architecture of our solution and its components in the context of services implementing the SIP protocol. We describe the mathematical modelling supporting our approach and detail different treatment strategies for the application of countermeasures. Finally, we quantify the benefits and limits of these strategies based on extensive simulation results. When a countermeasure fails, these strategies allow us to maintain the risk level low at an additional cost of up to 7%, or to accept an additional risk of up to 12%. They can also be combined to obtain a trade‐off between cost and performance. Copyright © 2013 John Wiley & Sons, Ltd.</div>
<div type="abstract">In this paper, we propose a risk management strategy for supporting the security of VoIP services in the cloud. This solution is based on countermeasures that are outsourced as a service in the Cloud. We present the architecture of our approach in the context of services implementing the SIP protocol. We describe the mathematical modelling supporting our solution and detail different treatment mechanisms for the application of countermeasures. Finally, we quantify the benefits and limits of these mechanisms based on extensive simulation results.</div>
</front>
</TEI>
<affiliations><list><country><li>France</li>
</country>
<region><li>Grand Est</li>
<li>Lorraine (région)</li>
</region>
<settlement><li>Vandœuvre‐lès‐Nancy</li>
</settlement>
</list>
<tree><country name="France"><region name="Grand Est"><name sortKey="Dabbebi, Oussema" sort="Dabbebi, Oussema" uniqKey="Dabbebi O" first="Oussema" last="Dabbebi">Oussema Dabbebi</name>
</region>
<name sortKey="Badonnel, Remi" sort="Badonnel, Remi" uniqKey="Badonnel R" first="Remi" last="Badonnel">Remi Badonnel</name>
<name sortKey="Dabbebi, Oussema" sort="Dabbebi, Oussema" uniqKey="Dabbebi O" first="Oussema" last="Dabbebi">Oussema Dabbebi</name>
<name sortKey="Festor, Olivier" sort="Festor, Olivier" uniqKey="Festor O" first="Olivier" last="Festor">Olivier Festor</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000E20 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000E20 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Lorraine |area= InforLorV4 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:EEAF92FA891CD71AD1B3D2F843E1AA1B1B4EA347 |texte= Leveraging countermeasures as a service for VoIP security in the cloud }}
This area was generated with Dilib version V0.6.33. |