메뉴 건너뛰기




Volumn , Issue , 2008, Pages 41-48

CPU-based DoS attacks against SIP servers

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; COMPUTER CRIME; EQUIPMENT TESTING; INTERNET PROTOCOLS; INTERNET TELEPHONY; QUALITY OF SERVICE; SECURITY OF DATA; SERVERS; TELEPHONE SYSTEMS; UBIQUITOUS COMPUTING; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 51849159244     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NOMS.2008.4575115     Document Type: Conference Paper
Times cited : (29)

References (20)
  • 4
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS problems
    • T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of network-based defense mechanisms countering the DoS and DDoS problems," ACM Comput. Surv., vol. 39, no. 1, 2007.
    • (2007) ACM Comput. Surv , vol.39 , Issue.1
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 8
    • 51849088172 scopus 로고    scopus 로고
    • Open source SIP stack
    • "Open source SIP stack: PJSIP library," http://www.pjsip.org.
    • PJSIP library
  • 9
    • 34447639167 scopus 로고    scopus 로고
    • "Ubuntu linux," http://www.ubuntu.com.
    • Ubuntu linux
  • 11
    • 51849099928 scopus 로고    scopus 로고
    • "MySQL," http://www.mysql.com.
  • 12
    • 51849118820 scopus 로고
    • RFC 1321, the Internet Engineering Task Force IETF
    • R. Rivest, "MD5 hashing scheme," RFC 1321, the Internet Engineering Task Force (IETF), 1992.
    • (1992) MD5 hashing scheme
    • Rivest, R.1
  • 13
    • 51849124648 scopus 로고    scopus 로고
    • PIKE module
    • "PIKE module," http://www.iptel.org/ser/doc/modules/pike.
  • 15
    • 0021426851 scopus 로고
    • A note on denial-of-service in operating systems
    • V. D. Gligor, "A note on denial-of-service in operating systems," IEEE Trans. Softw. Eng., vol. 10, no. 3, pp. 320-324, 1984.
    • (1984) IEEE Trans. Softw. Eng , vol.10 , Issue.3 , pp. 320-324
    • Gligor, V.D.1
  • 18
    • 44949263208 scopus 로고    scopus 로고
    • W. Marshall, A. F. Faryar, K. Kealy, G. de los Reyes, I. Rosencrantz, R. Rosencrantz, and C. Spielman, Carrier VoIP security architecture, in Proceedings of 12th International Telecommunications and Network Strategy and Planning Symposium, NETWORKS 2006, November 2006, pp. 1-6.
    • W. Marshall, A. F. Faryar, K. Kealy, G. de los Reyes, I. Rosencrantz, R. Rosencrantz, and C. Spielman, "Carrier VoIP security architecture," in Proceedings of 12th International Telecommunications and Network Strategy and Planning Symposium, NETWORKS 2006, November 2006, pp. 1-6.
  • 20
    • 33751059308 scopus 로고    scopus 로고
    • H. Abdelnur, V. Cridlig, R. State, and O. Festor, VoIP security assessment: Methods and tools, in Proceedings of 1st IEEE Workshop on VoIP Management and Security, Vancouver, Canada, April 2006, pp. 29-34.
    • H. Abdelnur, V. Cridlig, R. State, and O. Festor, "VoIP security assessment: Methods and tools," in Proceedings of 1st IEEE Workshop on VoIP Management and Security, Vancouver, Canada, April 2006, pp. 29-34.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.