A comprehensive survey of voice over IP security research

AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …

Dual-track protocol reverse analysis based on share learning

W Zhang, X Meng, Y Zhang - IEEE INFOCOM 2022-IEEE …, 2022 - ieeexplore.ieee.org
Private protocols, whose specifications are agnostic, are widely used in the Industrial
Internet. While providing customized service, they also raise essential security concerns as …

ProWord: An unsupervised approach to protocol feature word extraction

Z Zhang, Z Zhang, PPC Lee, Y Liu… - IEEE INFOCOM 2014 …, 2014 - ieeexplore.ieee.org
Protocol feature words are byte subsequences within traffic payload that can distinguish
application protocols, and they form the building blocks of many constructions of deep …

Toward unsupervised protocol feature word extraction

Z Zhang, Z Zhang, PPC Lee, Y Liu… - IEEE Journal on …, 2014 - ieeexplore.ieee.org
Protocol feature words are byte subsequences within traffic payload that can distinguish
application protocols, and they form the building blocks of many constructions of deep …

[PDF][PDF] Intrusion Detection and Prevention System for Secure Multimedia sharing in Future Internet

H ASHRAF, A Ullah, S Tahira, N Jhanjhi - 2024 - preprints.org
IP Multimedia Subsystem (IMS) supports high-speed transmission of multi-media like data,
audio, and video between mobiles and other wireless devices. IMS is the most suitable for …

Review of syn-flooding attack detection mechanism

ME Manna, A Amphawan - arxiv preprint arxiv:1202.1761, 2012 - arxiv.org
Denial of Service (DoS) is a security threat which compromises the confidentiality of
information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP …

A machine learning approach for prediction of signaling sip dialogs

D Pereira, R Oliveira, HS Kim - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, we propose a machine learning methodology for prediction of signaling
sessions established with the Session Initiation Protocol (SIP). Given the increasing …

Detection of abnormal sip signaling patterns: a deep learning comparison

D Pereira, R Oliveira - Computers, 2022 - mdpi.com
This paper investigates the detection of abnormal sequences of signaling packets purposely
generated to perpetuate signaling-based attacks in computer networks. The problem is …

On the use of svms to detect anomalies in a stream of sip messages

R Ferdous, RL Cigno, A Zorat - 2012 11th International …, 2012 - ieeexplore.ieee.org
Voice and multimedia communications are rapidly migrating from traditional networks to
TCP/IP networks (Internet), where services are provisioned by SIP (Session Initiation …

Classification of SIP messages by a syntax filter and SVMs

R Ferdous, RL Cigno, A Zorat - 2012 IEEE Global …, 2012 - ieeexplore.ieee.org
The Session Initiation Protocol (SIP) is at the root of many sessions-based applications such
as VoIP and media streaming that are used by a growing number of users and …