VoIP Honeypot Architecture
暂无分享,去创建一个
[1] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[2] Paul Vixie,et al. A DNS RR for specifying the location of services (DNS SRV) , 1996, RFC.
[3] Ralf Steinmetz,et al. Evaluating and improving firewalls for IP-telephony environments , 2000 .
[4] Alfonso Valdes,et al. Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.
[5] Saurabh Bagchi,et al. SCIDIVE: a stateful and cross protocol intrusion detection architecture for voice-over-IP environments , 2004, International Conference on Dependable Systems and Networks, 2004.
[6] Patrik Fältström,et al. The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM) , 2004, RFC.
[7] Fabien Pouget,et al. Honeypot-based forensics , 2004 .
[8] Marit Hansen,et al. Developing a Legally Compliant Reachability Management System as a Countermeasure against SPIT 1 , 2006 .
[9] R. Dantu,et al. Securing VoIP and PSTN from integrated signaling network vulnerabilities , 2006, 1st IEEE Workshop on VoIP Management and Security, 2006..
[10] Thomas Porter,et al. Practical VoIP Security , 2006 .
[11] Hong Yan,et al. Incorporating Active Fingerprinting into SPIT Prevention Systems , 2006 .