SIP Vulnerabilities for SPIT, SPIT Identification Criteria, Anti-SPIT Mechanisms Evaluation Framework and Legal Issues

[1]  Cullen Jennings,et al.  The Session Initiation Protocol (SIP) and Spam , 2008, RFC.

[2]  Giannis F. Marias,et al.  Threat Analysis of the Session Initiation Protocol Regarding Spam , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.

[3]  Dongwook Shin,et al.  Progressive multi gray-leveling: a voice spam protection algorithm , 2006, IEEE Network.

[4]  Dorgham Sisalem,et al.  Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms , 2006, IEEE Network.

[5]  Jeff Hodges,et al.  Using SAML to protect the session initiation protocol (SIP) , 2006, IEEE Network.

[6]  Jon Peterson,et al.  Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP) , 2006, RFC.

[7]  Voice Over IP-Security and SPIT Swiss Army , FU Br , 2006 .

[8]  Ram Dantu,et al.  Detecting Spam in VoIP Networks , 2005, SRUTI.

[9]  Ursula Sury Organisatorische und juristische Implikationen bei der datenschutzgerechten Nutzung bzw. Durchführung des Einsatzes von Intrusion Detection , 2005 .

[10]  Joachim Posegga,et al.  Voice Over IP : Unsafe at any Bandwidth ? , 2005 .

[11]  Thomas J. Walsh,et al.  Security Considerations for Voice Over IP Systems , 2005 .

[12]  L. Asscher,et al.  Regulating spam: Directive 2002/58 and beyond , 2004 .

[13]  Kumar Srivastava,et al.  Preventing Spam For SIP-based Instant Messages and Sessions , 2004 .

[14]  J.J.C. Kabel Spam: A Terminal Threat to ISP's , 2003 .

[15]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.