메뉴 건너뛰기




Volumn 1, Issue , 2004, Pages 317-322

A survey of VoIP intrusions and intrusion detection systems

Author keywords

H.248; H.323; Intrusion; Intrusion detection; IPSec; Network security; SIP; VoIP

Indexed keywords

COMPUTER NETWORKS; INTERNET; NETWORK PROTOCOLS; QUALITY OF SERVICE; ROUTERS; SECURITY OF DATA;

EID: 2942685892     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (19)

References (29)
  • 2
    • 2942674183 scopus 로고    scopus 로고
    • http://www.cs.uct.ac.za/courses/CS400W/NIS/papers2003/tbaving.pdf
  • 3
    • 2942656706 scopus 로고    scopus 로고
    • The Real Time Transport Protocol (RTP) Denial of Service (DoS) attack and its prevention
    • draft-rosenberg-mrausic-rtp-denialofservice-00
    • J. Rosenberg, "The Real Time Transport Protocol (RTP) Denial of Service (DoS) Attack and its Prevention", Internet-Draft, draft-rosenberg-mrausic-rtp-denialofservice-00.
    • Internet-draft
    • Rosenberg, J.1
  • 4
    • 0035727113 scopus 로고    scopus 로고
    • SCTP in battlefield networks
    • Mclean, USA, Oct.
    • P.T. Conrad and G. J. Heinz, "SCTP in Battlefield Networks", MILCOM 2001, Mclean, USA, Oct. 2001
    • (2001) MILCOM 2001
    • Conrad, P.T.1    Heinz, G.J.2
  • 5
    • 2642573975 scopus 로고    scopus 로고
    • Host-based anomaly detection by wrapping file system accesses
    • Apr.
    • S. Hershkop and et.al. "Host-based Anomaly Detection by Wrapping File System Accesses", Columbia Tech Report, Apr. 2003.
    • (2003) Columbia Tech Report
    • Hershkop, S.1
  • 6
    • 0034172725 scopus 로고    scopus 로고
    • Internet telephony: Services, technical challenges, and products
    • April
    • M. Hassan, "Internet Telephony: Services, Technical Challenges, and Products", IEEE Communication Magazine, April 2000.
    • (2000) IEEE Communication Magazine
    • Hassan, M.1
  • 7
    • 0028430224 scopus 로고
    • Network intrusion detection
    • B. Mukherjee, "Network Intrusion Detection", IEEE Network, Vol.8, No.3, pp.26-41, 1994.
    • (1994) IEEE Network , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1
  • 8
    • 0004309520 scopus 로고    scopus 로고
    • Research in intrusion-detection systems: A survey
    • Dept. of Computer Engineering, Chalmers University of Technology, Sweden, Mar.
    • S. Axelsson, "Research in Intrusion-detection Systems: A Survey", Technical Report 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, Mar. 2000.
    • (2000) Technical Report , vol.99 , Issue.15
    • Axelsson, S.1
  • 9
    • 33646909480 scopus 로고    scopus 로고
    • The secure real-time transport protocol
    • draft-ietf-avt-srtp-09.txt
    • M. Baugher, "The Secure Real-time Transport Protocol", Internet Draft, draft-ietf-avt-srtp-09.txt.
    • Internet Draft
    • Baugher, M.1
  • 11
    • 0003478316 scopus 로고
    • The architecture of a network level intrusion detection system
    • Department of Computer Science, University of New Mexico, Aug.
    • R.Heady and et.al., "The Architecture of a Network Level Intrusion Detection System", Technical Report CS90-20, Department of Computer Science, University of New Mexico, Aug. 1990.
    • (1990) Technical Report , vol.CS90-20
    • Heady, R.1
  • 12
    • 0003240332 scopus 로고    scopus 로고
    • SIP: Session initiation protocol
    • J. Rosenberg and et.al. "SIP: Session Initiation Protocol", RFC 3261.
    • RFC , vol.3261
    • Rosenberg, J.1
  • 16
    • 0036871268 scopus 로고    scopus 로고
    • Internet infrastructure security: A taxonomy
    • Nov/Dec
    • A. Chakrabarti, and et.al "Internet Infrastructure Security: A Taxonomy", IEEE Network, Nov/Dec 2002.
    • (2002) IEEE Network
    • Chakrabarti, A.1
  • 17
    • 62749110603 scopus 로고    scopus 로고
    • Security considerations for SIGTRAN protocols
    • draft-ietf-sigtran-security-03.txt
    • J. Loughney and et.al., "Security Considerations for SIGTRAN Protocols", Internet Draft, draft-ietf-sigtran-security-03.txt.
    • Internet Draft
    • Loughney, J.1
  • 18
    • 84864176619 scopus 로고    scopus 로고
    • The TLS protocol
    • T. Dierks and et.al, 'The TLS Protocol", RFC 2246.
    • RFC , vol.2246
    • Dierks, T.1
  • 19
    • 2942632701 scopus 로고    scopus 로고
    • Security architecture for IP
    • S. Kent and et.al, "Security Architecture for IP", RFC 2401.
    • RFC , vol.2401
    • Kent, S.1
  • 20
    • 0032165431 scopus 로고    scopus 로고
    • Security at Internet layer
    • September
    • R Oppliger, "Security at Internet Layer", Computer, vol: 31(9), September 1998.
    • (1998) Computer , vol.31 , Issue.9
    • Oppliger, R.1
  • 22
    • 2942656705 scopus 로고    scopus 로고
    • Services and protocols for advanced networks: Preliminary analysis of broadband multimedia services
    • 10
    • "Services and Protocols for Advanced Networks: Preliminary Analysis of Broadband Multimedia Services", ETSI Technical Report, ETSI TR 102 99 V1.1.1 (2003-10).
    • (2003) ETSI Technical Report ETSI TR 102 99 V1.1.1
  • 23
    • 2942637225 scopus 로고    scopus 로고
    • Example call flows using SIP security mechanisms
    • draft-jennings-sip-sec-flows-00.txt, October
    • C. Jennings, "Example Call Flows Using SIP Security Mechanisms", Internet Draft, draft-jennings-sip-sec-flows-00.txt, October 2003.
    • (2003) Internet Draft
    • Jennings, C.1
  • 24
    • 2942661243 scopus 로고    scopus 로고
    • http://www.tml.hut.fi/Studies/T-110.551/2003/papers/15.pdf
  • 26
    • 0036870280 scopus 로고    scopus 로고
    • SIP security issues: The SIP authentication procedure and its processing load
    • Nov/Dec.
    • S. Salsano, "SIP Security Issues: The SIP Authentication Procedure and Its Processing Load", IEEE Network, Nov/Dec. 2002.
    • (2002) IEEE Network
    • Salsano, S.1
  • 28
    • 0003236738 scopus 로고    scopus 로고
    • Megaco protocol version 1.0
    • F. Cuervo, and et.al, "Megaco Protocol Version 1.0," RFC 3015.
    • RFC , vol.3015
    • Cuervo, F.1
  • 29
    • 0242510134 scopus 로고    scopus 로고
    • Voice over Internet protocol
    • Sept.
    • B. Goode, "Voice over Internet Protocol", Proc. of the IEEE, Vol.9, No.9, Sept.2002.
    • (2002) Proc. of the IEEE , vol.9 , Issue.9
    • Goode, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.