Protecting IMS Networks From Attack
by Krishna Kurapati
Published September 2006; Posted December 2006


Application-level attacks and fuzzing are on the rise. Can IMS cope?

Just as the ecommerce companies have learned that they must go to great lengths to protect their core servers from hackers, malware and service abuses, so too must network operators who plan to offer Internet-based services using IMS (IP Multimedia Subsystem) technologies.

Because the Internet is an “open” system, any user can freely connect to it at any time from any place with little effort, making it a fertile breeding ground for a wide variety of malicious and unauthorized activities. With both ecommerce and IMS, security is a necessary requirement, as any down time of the site or service means lost revenue for the company.



Access paper

Approx. 273 kB


For help with .pdf file downloads, please check out the help topic.


Return to Voice over Packet Webtorials menu


Return to Security Webtorials menu


Return to Business Communications Review Gold Sponsor Archives

About the author:

Krishna Kurapati is the founder and CTO of Sipera Systems, a company that specializes in security for VOIP, mobile and multimedia communications.


This article is reproduced by special arrangement with our partner, Business Communications Review.


Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at