메뉴 건너뛰기




Volumn 28, Issue 7, 2009, Pages 578-591

Utilizing bloom filters for detecting flooding attacks against SIP based services

Author keywords

Bloom filter; Denial of Service; Flooding attacks; Security; Session Initiation Protocol (SIP); Voice over IP (VoIP)

Indexed keywords

BLOOM FILTER; DENIAL OF SERVICE; FLOODING ATTACKS; SECURITY; SESSION INITIATION PROTOCOL (SIP); VOICE OVER IP (VOIP);

EID: 70349440967     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.04.007     Document Type: Article
Times cited : (57)

References (44)
  • 1
    • 0021426851 scopus 로고
    • A note on denial-of-service in operating systems
    • Gligor V. A note on denial-of-service in operating systems. IEEE Transactions on Software Engineering 10 (1984) 320-324
    • (1984) IEEE Transactions on Software Engineering , vol.10 , pp. 320-324
    • Gligor, V.1
  • 2
    • 1242350162 scopus 로고    scopus 로고
    • Ping of Death, http://insecure.org/sploits/ping-o-death.html.
    • Ping of Death
  • 5
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS problems
    • Peng T., Leckie C., and Ramamohanarao K. Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys 39 (2007)
    • (2007) ACM Computing Surveys , vol.39
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 7
    • 70349444297 scopus 로고    scopus 로고
    • SIP swiss army knife sipsak
    • SIP swiss army knife (sipsak), http://sipsak.org.
  • 15
    • 70349441677 scopus 로고    scopus 로고
    • Postel J. RFC 793: transmission control protocol; September 1981.
    • Postel J. RFC 793: transmission control protocol; September 1981.
  • 17
    • 33750013256 scopus 로고    scopus 로고
    • Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms
    • Sisalem D., Kuthan J., and Ehlert S. Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms. IEEE Network 20 (2006) 26-31
    • (2006) IEEE Network , vol.20 , pp. 26-31
    • Sisalem, D.1    Kuthan, J.2    Ehlert, S.3
  • 18
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom B. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13 (1970) 422-426
    • (1970) Communications of the ACM , vol.13 , pp. 422-426
    • Bloom, B.1
  • 21
    • 4544342880 scopus 로고    scopus 로고
    • SCIDIVE: a stateful and cross protocol intrusion detection architecture for voice-over-IP environments
    • At IEEE
    • Bagchi S., Wu Y., Garg S., Singh N., and Tsai T. SCIDIVE: a stateful and cross protocol intrusion detection architecture for voice-over-IP environments. At IEEE. Dependable Systems and Networks (DSN 2004) (2004) 433-442
    • (2004) Dependable Systems and Networks (DSN 2004) , pp. 433-442
    • Bagchi, S.1    Wu, Y.2    Garg, S.3    Singh, N.4    Tsai, T.5
  • 23
    • 63149153148 scopus 로고    scopus 로고
    • A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment
    • Geneiatakis D., and Lambrinoudakis C. A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment. Telecommunication Systems 36 (2007) 153-159
    • (2007) Telecommunication Systems , vol.36 , pp. 153-159
    • Geneiatakis, D.1    Lambrinoudakis, C.2
  • 24
    • 33751035543 scopus 로고    scopus 로고
    • Niccolini S, Garroppo R, Giordano S, Risi G, Ventura S, Ltd N, et al. SIP intrusion detection and prevention: recommendations and prototype implementation. In: 1st IEEE workshop on VoIP management and security; 2006. p. 47-52.
    • Niccolini S, Garroppo R, Giordano S, Risi G, Ventura S, Ltd N, et al. SIP intrusion detection and prevention: recommendations and prototype implementation. In: 1st IEEE workshop on VoIP management and security; 2006. p. 47-52.
  • 28
    • 57349150325 scopus 로고    scopus 로고
    • Ormazabal G, Nagpal S, Yardeni E, Schulzrinne H. Secure SIP: a scalable prevention mechanism for DoS attacks on SIP based VoIP systems. In: Principles, systems and applications of IP telecommunications. Services and security for next generation networks; 2008. p. 107-32.
    • Ormazabal G, Nagpal S, Yardeni E, Schulzrinne H. Secure SIP: a scalable prevention mechanism for DoS attacks on SIP based VoIP systems. In: Principles, systems and applications of IP telecommunications. Services and security for next generation networks; 2008. p. 107-32.
  • 30
    • 49049109309 scopus 로고    scopus 로고
    • Bouzida Y, Mangin C. A framework for detecting anomalies in VoIP networks. In: Third international conference on availability, reliability and security, ARES 08; 2008. p. 204-11.
    • Bouzida Y, Mangin C. A framework for detecting anomalies in VoIP networks. In: Third international conference on availability, reliability and security, ARES 08; 2008. p. 204-11.
  • 37
    • 33744910842 scopus 로고    scopus 로고
    • A novel approach to detecting DDoS attacks at an early stage
    • Xiao B., Chen W., and He Y. A novel approach to detecting DDoS attacks at an early stage. Journal on Supercomputing (2006) 235-248
    • (2006) Journal on Supercomputing , pp. 235-248
    • Xiao, B.1    Chen, W.2    He, Y.3
  • 38
    • 24344457092 scopus 로고    scopus 로고
    • Secure authentication scheme for session initiation protocol
    • Yang C., Wang R., and Liu W. Secure authentication scheme for session initiation protocol. Computers & Security 24 (2005) 381-386
    • (2005) Computers & Security , vol.24 , pp. 381-386
    • Yang, C.1    Wang, R.2    Liu, W.3
  • 39
    • 55749113850 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement protocol for SIP using ECC
    • Wu L., Zhang Y., and Wang F. A new provably secure authentication and key agreement protocol for SIP using ECC. Computer Standards & Interfaces 31 (2009) 286-291
    • (2009) Computer Standards & Interfaces , vol.31 , pp. 286-291
    • Wu, L.1    Zhang, Y.2    Wang, F.3
  • 42
    • 33751010477 scopus 로고    scopus 로고
    • New VoIP traffic security scheme with digital watermarking
    • Mazurczyk W., and Kotulski Z. New VoIP traffic security scheme with digital watermarking. Lecture Notes in Computer Science 4166 (2006) 170
    • (2006) Lecture Notes in Computer Science , vol.4166 , pp. 170
    • Mazurczyk, W.1    Kotulski, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.