Comparative study on DOS attacks Detection Techniques in SIP-based VOIP networks
暂无分享,去创建一个
[1] Mohammad Hossein Yaghmaee Moghaddam,et al. An entropy-based VoIP flooding attacks detection and prevention system , 2014, 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE).
[2] Mark Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.
[3] Gabriel Maciá-Fernández,et al. Defense techniques for low-rate DoS attacks against application servers , 2010, Comput. Networks.
[4] Alex Talevski,et al. Impact of Encryption on Qos in Voip , 2010, 2010 IEEE Second International Conference on Social Computing.
[5] Sushil Jajodia,et al. Detecting VoIP Floods Using the Hellinger Distance , 2008, IEEE Transactions on Parallel and Distributed Systems.
[6] Thomas J. Walsh,et al. Security Considerations for Voice Over IP Systems , 2005 .
[7] Seyed Amin Hosseini Seno,et al. An empirical study of security of VoIP system , 2016, 2016 SAI Computing Conference (SAI).
[8] Daniel T. Fokum,et al. Coping with denial-of-service attacks on the IP telephony system , 2016, SoutheastCon 2016.
[9] Neminath Hubballi,et al. VoIPFD: Voice over IP flooding detection , 2016, 2016 Twenty Second National Conference on Communication (NCC).
[10] Simantini J. Shivankar,et al. Comparative analysis on security techniques in VoIP environment , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).
[11] Abdul Ghafoor Abbasi,et al. Security analysis of VoIP architecture for identifying SIP vulnerabilities , 2014, 2014 International Conference on Emerging Technologies (ICET).
[12] Jinhua Guo,et al. Security Challenge and Defense in VoIP Infrastructures , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[13] Muhammad Ali Akbar,et al. Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony , 2012, Knowledge and Information Systems.
[14] Dorgham Sisalem,et al. Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms , 2006, IEEE Network.
[15] V. N. Venkatakrishnan,et al. Vetting SSL Usage in Applications with SSLINT , 2015, 2015 IEEE Symposium on Security and Privacy.
[16] Cihan Varol,et al. Detecting unprotected SIP-based voice over IP traffic , 2016, 2016 4th International Symposium on Digital Forensic and Security (ISDFS).
[17] Angelika Bayer,et al. A First Course In Probability , 2016 .