A comprehensive survey of voice over IP security research
AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …
set of 245 publications forming a closed cross-citation set. We classify these papers …
[PDF][PDF] Survey of security vulnerabilities in session initiation protocol
The open architecture of the Internet and the use of open standards like Session Initiation
Protocol (SIP) constitute the provisioning of services (eg, Internet telephony, instant …
Protocol (SIP) constitute the provisioning of services (eg, Internet telephony, instant …
A framework for protecting a SIP-based infrastructure against malformed message attacks
This paper presents a framework that can be utilized for the protection of session initiation
protocol (SIP)-based infrastructures from malformed message attacks. Its main characteristic …
protocol (SIP)-based infrastructures from malformed message attacks. Its main characteristic …
SIP-based VoIP traffic behavior profiling
A Nucci, S Ranjan, ZL Zhang - US Patent 7,441,429, 2008 - Google Patents
With the widespread adoption of SIP-based VoIP, understanding the characteristics of SIP
traffic behavior is critical to problem diagnosis and security protection of VoIP services. A …
traffic behavior is critical to problem diagnosis and security protection of VoIP services. A …
Security analysis of VoIP architecture for identifying SIP vulnerabilities
Voice over Internet Protocol (VoIP) is an emerging technology that changes the way of
communication services over IP networks. It provides flexible and low cost services to the …
communication services over IP networks. It provides flexible and low cost services to the …
Battling against DDoS in SIP: Is Machine Learning-based detection an effective weapon?
This paper focuses on network anomaly-detection and especially the effectiveness of
Machine Learning (ML) techniques in detecting Denial of Service (DoS) in SIP-based VoIP …
Machine Learning (ML) techniques in detecting Denial of Service (DoS) in SIP-based VoIP …
[BOOK][B] SIP handbook: services, technologies, and security of Session Initiation Protocol
SA Ahson, M Ilyas - 2018 - books.google.com
Widely adopted by service providers to enable IP telephony, instant messaging, and other
data services, SIP is the signaling protocol of choice for advanced multimedia …
data services, SIP is the signaling protocol of choice for advanced multimedia …
SIP-based VoIP traffic behavior profiling and its applications
HJ Kang, ZL Zhang, S Ranjan, A Nucci - Proceedings of the 3rd annual …, 2007 - dl.acm.org
With the widespread adoption of SIP-based VoIP, understanding the characteristics of SIP
traffic behavior is critical to problem diagnosis and security protection of IP Telephony. In this …
traffic behavior is critical to problem diagnosis and security protection of IP Telephony. In this …
[PDF][PDF] Model-based vulnerability analysis of IMS network.
D Wang, C Liu - J. Networks, 2009 - Citeseer
Next Generation Network (NGN), its security is vital important. However, IMS is a network
with openarchitecture based on IP, which brings a lot of security issues. There has already …
with openarchitecture based on IP, which brings a lot of security issues. There has already …
[PDF][PDF] Multilayer secured SIP based VoIP architecture
VoIP faces many emerging attacks and threats. securing SIP based VoIP is a major
challenging task, hence confidentiality, integrity, availability, as well as authenticity must be …
challenging task, hence confidentiality, integrity, availability, as well as authenticity must be …