Support de cours Projet IMS - Chap VI
Support de cours Projet IMS - Chap VI
62
Security architecture
A. Architecture
• The three layers are the application security layer, network security layer, and
device security layer.
• The three planes are the control plane, user plane, and management plane.
• Each intersecting layer and plane provides different services and has its own
security mechanisms to deal with security threats. Figure 1 shows the security
architecture.
Figure 14 Mapping between the security layer and the device-OSI reference model
IMS Project Security 67
Security architecture
C. Security planes
Security Plane Description
Control plane Protects the header fields and parameters included in each signaling message and
protocol. It ensures that signaling streams on the IMS network are normal.
Common security policies include unauthorized user access restriction,
malformed Session Initiation Protocol (SIP) packet attack defense, denial of service
(DoS)/distributed denial of service (DDoS) attack defense, and SIP service logic
attack defense.
User plane Protects the Real-Time Transport Protocol (RTP) sessions and bandwidth at the
media plane. It ensures that media streams on the IMS network are normal.
Common security policies include RTP session injection restriction, RTP bandwidth
theft restriction, and malformed RTP packet attack defense.
These hierarchical policies establish multiple lines of defense for the IMS
network security. Each line of defense uses a different security policy.
If a security policy fails, the other policies in the hierarchy effectively protect the
IMS network against attacks and ensure IMS services.
• Availability: Network or data access is allowed only for authorized NEs to avoid
service denial and network interruption.
• Traceability: Historical events are provided for identifying and analyzing security
issues that occur on the IMS network.
• Software security: The IMS network cannot be illegally accessed, and IMS
software cannot be illegally duplicated, tampered with, or infected with
viruses.
On the IMS network, each NE uses a different service logic and a unique
network location, which makes the NEs vulnerable to different security threats.