Performance Evaluation of a Flooding Detection Mechanism for VoIP Networks
暂无分享,去创建一个
[1] Mark Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.
[2] Dorgham Sisalem,et al. Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms , 2006, IEEE Network.
[3] Nikos Vrakas,et al. Utilizing bloom filters for detecting flooding attacks against SIP based services , 2009, Comput. Secur..
[4] Costas Lambrinoudakis,et al. Survey of security vulnerabilities in session initiation protocol , 2006, IEEE Communications Surveys & Tutorials.
[5] H BloomBurton. Space/time trade-offs in hash coding with allowable errors , 1970 .
[6] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[7] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.