On the billing vulnerabilities of SIP-based VoIP systems
暂无分享,去创建一个
[1] Jari Arkko,et al. Security Mechanism Agreement for the Session Initiation Protocol (SIP) , 2003, RFC.
[2] Xuxian Jiang,et al. Voice pharming attack and the trust of VoIP , 2008, SecureComm.
[3] Lawrence C. Stewart,et al. HTTP Authentication: Basic and Digest Access Authentication , 1999 .
[4] Saurabh Bagchi,et al. SCIDIVE: a stateful and cross protocol intrusion detection architecture for voice-over-IP environments , 2004, International Conference on Dependable Systems and Networks, 2004.
[5] Mats Näslund,et al. The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.
[6] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[7] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[8] Xuxian Jiang,et al. An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems , 2009, ISPEC.
[9] Sushil Jajodia,et al. VoIP Intrusion Detection Through Interacting Protocol State Machines , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[10] Dipak Ghosal,et al. Secure IP Telephony using Multi-layered Protection , 2003, NDSS.
[11] Luca Veltri,et al. SIP security issues: the SIP authentication procedure and its processing load , 2002 .
[12] Xuxian Jiang,et al. Billing Attacks on SIP-Based VoIP Systems , 2007, WOOT.
[13] Jonathan Rosenberg. The Real Time Transport Protocol (RTP) Denial of Service (Dos) Attack and its Prevention( , 2003 .
[14] Xuxian Jiang,et al. On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers , 2009, ASIACCS '09.
[15] Sushil Jajodia,et al. Fast Detection of Denial-of-Service Attacks on IP Telephony , 2006, 200614th IEEE International Workshop on Quality of Service.