-
1
-
-
0021426851
-
A note on denial-of-service in operating systems
-
Gligor V. A note on denial-of-service in operating systems. IEEE Transactions on Software Engineering 10 (1984) 320-324
-
(1984)
IEEE Transactions on Software Engineering
, vol.10
, pp. 320-324
-
-
Gligor, V.1
-
2
-
-
1242350162
-
-
Ping of Death, http://insecure.org/sploits/ping-o-death.html.
-
Ping of Death
-
-
-
5
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
Peng T., Leckie C., and Ramamohanarao K. Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys 39 (2007)
-
(2007)
ACM Computing Surveys
, vol.39
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
6
-
-
29244475815
-
-
Prentice Hall PTR, Upper Saddle River, NJ, USA
-
Mirkovic J., Dietrich S., Dittrich D., and Reiher P. Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security) (2004), Prentice Hall PTR, Upper Saddle River, NJ, USA
-
(2004)
Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security)
-
-
Mirkovic, J.1
Dietrich, S.2
Dittrich, D.3
Reiher, P.4
-
7
-
-
70349444297
-
-
SIP swiss army knife sipsak
-
SIP swiss army knife (sipsak), http://sipsak.org.
-
-
-
-
9
-
-
70349470468
-
VoIP security and privacy threat taxonomy public release 1.0
-
Endler D., Ghosal D., Jafari R., Karlcut A., Kolenko M., Nguyen N., et al. VoIP security and privacy threat taxonomy public release 1.0. Voice over IP Security Alliance (VOIPSA) 24 (2005)
-
(2005)
Voice over IP Security Alliance (VOIPSA)
, vol.24
-
-
Endler, D.1
Ghosal, D.2
Jafari, R.3
Karlcut, A.4
Kolenko, M.5
Nguyen, N.6
-
10
-
-
34147137250
-
Towards a secure and reliable VoIP infrastructure
-
Technical Report D2;
-
Sisalem D, Ehlert S, Geneiatakis D, Kambourakis G, Dagiuklas T, Markl J, et al. Towards a secure and reliable VoIP infrastructure. Technical Report D2; 2005.
-
(2005)
-
-
Sisalem, D.1
Ehlert, S.2
Geneiatakis, D.3
Kambourakis, G.4
Dagiuklas, T.5
Markl, J.6
et al7
-
11
-
-
84881472647
-
Survey of security vulnerabilities in session initiation protocol
-
Geneiatakis D., Dagiuklas T., Kambourakis G., Lambrinoudakis C., Gritzalis S., Ehlert K., et al. Survey of security vulnerabilities in session initiation protocol. IEEE Communications Surveys and Tutorials 8 (2006) 68-81
-
(2006)
IEEE Communications Surveys and Tutorials
, vol.8
, pp. 68-81
-
-
Geneiatakis, D.1
Dagiuklas, T.2
Kambourakis, G.3
Lambrinoudakis, C.4
Gritzalis, S.5
Ehlert, K.6
-
13
-
-
0037984544
-
-
RFC 3261, Internet Engineering Task Force;
-
Rosenberg J, Schulzrinne H, Camarillo G, Johnston A, Peterson J, Sparks R, et al. SIP: session initiation protocol, RFC 3261, Internet Engineering Task Force; 2002.
-
(2002)
SIP: Session initiation protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
et al7
-
14
-
-
0003415244
-
-
RFC Editor, United States
-
Fielding R., Gettys J., Mogul J., Frystyk H., Masinter L., Leach P., et al. RFC2616: hypertext transfer protocol-HTTP/1.1 (1999), RFC Editor, United States
-
(1999)
RFC2616: hypertext transfer protocol-HTTP/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
-
15
-
-
70349441677
-
-
Postel J. RFC 793: transmission control protocol; September 1981.
-
Postel J. RFC 793: transmission control protocol; September 1981.
-
-
-
-
17
-
-
33750013256
-
Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms
-
Sisalem D., Kuthan J., and Ehlert S. Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms. IEEE Network 20 (2006) 26-31
-
(2006)
IEEE Network
, vol.20
, pp. 26-31
-
-
Sisalem, D.1
Kuthan, J.2
Ehlert, S.3
-
18
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom B. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13 (1970) 422-426
-
(1970)
Communications of the ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.1
-
20
-
-
33947123970
-
A framework for protecting a SIP-based infrastructure against malformed message attacks
-
Geneiatakis D., Kambourakis G., Lambrinoudakis C., Dagiuklas T., and Gritzalis S. A framework for protecting a SIP-based infrastructure against malformed message attacks. Computer Networks 51 (2007) 2580-2593
-
(2007)
Computer Networks
, vol.51
, pp. 2580-2593
-
-
Geneiatakis, D.1
Kambourakis, G.2
Lambrinoudakis, C.3
Dagiuklas, T.4
Gritzalis, S.5
-
21
-
-
4544342880
-
SCIDIVE: a stateful and cross protocol intrusion detection architecture for voice-over-IP environments
-
At IEEE
-
Bagchi S., Wu Y., Garg S., Singh N., and Tsai T. SCIDIVE: a stateful and cross protocol intrusion detection architecture for voice-over-IP environments. At IEEE. Dependable Systems and Networks (DSN 2004) (2004) 433-442
-
(2004)
Dependable Systems and Networks (DSN 2004)
, pp. 433-442
-
-
Bagchi, S.1
Wu, Y.2
Garg, S.3
Singh, N.4
Tsai, T.5
-
23
-
-
63149153148
-
A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment
-
Geneiatakis D., and Lambrinoudakis C. A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment. Telecommunication Systems 36 (2007) 153-159
-
(2007)
Telecommunication Systems
, vol.36
, pp. 153-159
-
-
Geneiatakis, D.1
Lambrinoudakis, C.2
-
24
-
-
33751035543
-
-
Niccolini S, Garroppo R, Giordano S, Risi G, Ventura S, Ltd N, et al. SIP intrusion detection and prevention: recommendations and prototype implementation. In: 1st IEEE workshop on VoIP management and security; 2006. p. 47-52.
-
Niccolini S, Garroppo R, Giordano S, Risi G, Ventura S, Ltd N, et al. SIP intrusion detection and prevention: recommendations and prototype implementation. In: 1st IEEE workshop on VoIP management and security; 2006. p. 47-52.
-
-
-
-
28
-
-
57349150325
-
-
Ormazabal G, Nagpal S, Yardeni E, Schulzrinne H. Secure SIP: a scalable prevention mechanism for DoS attacks on SIP based VoIP systems. In: Principles, systems and applications of IP telecommunications. Services and security for next generation networks; 2008. p. 107-32.
-
Ormazabal G, Nagpal S, Yardeni E, Schulzrinne H. Secure SIP: a scalable prevention mechanism for DoS attacks on SIP based VoIP systems. In: Principles, systems and applications of IP telecommunications. Services and security for next generation networks; 2008. p. 107-32.
-
-
-
-
30
-
-
49049109309
-
-
Bouzida Y, Mangin C. A framework for detecting anomalies in VoIP networks. In: Third international conference on availability, reliability and security, ARES 08; 2008. p. 204-11.
-
Bouzida Y, Mangin C. A framework for detecting anomalies in VoIP networks. In: Third international conference on availability, reliability and security, ARES 08; 2008. p. 204-11.
-
-
-
-
31
-
-
0003365506
-
RFC2617: HTTP authentication: basic and digest access authentication
-
Franks J., Hallam-Baker P., Hostetler J., Lawrence S., Leach P., Luotonen A., et al. RFC2617: HTTP authentication: basic and digest access authentication. Internet RFCs (1999)
-
(1999)
Internet RFCs
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
-
32
-
-
57349185590
-
VoIP defender: Highly scalable SIP-based security architecture
-
Fiedler J, Kupka T, Ehlert S, Magedanz T, Sisalem D. VoIP defender: highly scalable SIP-based security architecture. In: Proceedings of the 1st international conference on principles, systems and applications of IP telecommunications; 2007. p. 11-7.
-
(2007)
Proceedings of the 1st international conference on principles, systems and applications of IP telecommunications
, pp. 11-17
-
-
Fiedler, J.1
Kupka, T.2
Ehlert, S.3
Magedanz, T.4
Sisalem, D.5
-
37
-
-
33744910842
-
A novel approach to detecting DDoS attacks at an early stage
-
Xiao B., Chen W., and He Y. A novel approach to detecting DDoS attacks at an early stage. Journal on Supercomputing (2006) 235-248
-
(2006)
Journal on Supercomputing
, pp. 235-248
-
-
Xiao, B.1
Chen, W.2
He, Y.3
-
38
-
-
24344457092
-
Secure authentication scheme for session initiation protocol
-
Yang C., Wang R., and Liu W. Secure authentication scheme for session initiation protocol. Computers & Security 24 (2005) 381-386
-
(2005)
Computers & Security
, vol.24
, pp. 381-386
-
-
Yang, C.1
Wang, R.2
Liu, W.3
-
39
-
-
55749113850
-
A new provably secure authentication and key agreement protocol for SIP using ECC
-
Wu L., Zhang Y., and Wang F. A new provably secure authentication and key agreement protocol for SIP using ECC. Computer Standards & Interfaces 31 (2009) 286-291
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 286-291
-
-
Wu, L.1
Zhang, Y.2
Wang, F.3
-
42
-
-
33751010477
-
New VoIP traffic security scheme with digital watermarking
-
Mazurczyk W., and Kotulski Z. New VoIP traffic security scheme with digital watermarking. Lecture Notes in Computer Science 4166 (2006) 170
-
(2006)
Lecture Notes in Computer Science
, vol.4166
, pp. 170
-
-
Mazurczyk, W.1
Kotulski, Z.2
-
44
-
-
33750012696
-
Using SAML to protect the session initiation protocol (SIP)
-
Tschofenig H., Falk R., Peterson J., Hodges J., Sicker D., Polk J., et al. Using SAML to protect the session initiation protocol (SIP). IEEE Network 20 (2006) 14-17
-
(2006)
IEEE Network
, vol.20
, pp. 14-17
-
-
Tschofenig, H.1
Falk, R.2
Peterson, J.3
Hodges, J.4
Sicker, D.5
Polk, J.6
|