-
2
-
-
70449122360
-
A novel method for detecting attacks towards the SIP protocol
-
Callegari, C., Garroppo, R. G., Giordano, S., Pagano, M., & Russo, F. (2009). A novel method for detecting attacks towards the SIP protocol. In Proceedings of the 12th International Symposium on Performance Evaluation of Computer & Telecommunication Systems (pp. 268–273).
-
(2009)
In Proceedings of the 12th International Symposium on Performance Evaluation of Computer & Telecommunication Systems
, pp. 268-273
-
-
Callegari, C.1
Garroppo, R.G.2
Giordano, S.3
Pagano, M.4
Russo, F.5
-
3
-
-
56949086676
-
An efficient end-to-end security mechanism for IP multimedia subsystem
-
10.1016/j.comcom.2008.05.025
-
Chen C.-Y., Wu T.-Y., Huang Y.-M., Chao H.-C. (2008). An efficient end-to-end security mechanism for IP multimedia subsystem. Computer Communications, 31(18), 4259–4268. 10.1016/j.comcom.2008.05.025
-
(2008)
Computer Communications
, vol.31
, Issue.18
, pp. 4259-4268
-
-
Chen, C.-Y.1
Wu, T.-Y.2
Huang, Y.-M.3
Chao, H.-C.4
-
5
-
-
0013194031
-
-
Retrieved from http://rfc.askapache.com/rfc2617/
-
Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., et al. (1999). RFC 2617: HTTP authentication: basic and digest access authentication. Retrieved from http://rfc.askapache.com/rfc2617/
-
(1999)
RFC 2617: HTTP authentication: basic and digest access authentication
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
-
7
-
-
84881472647
-
Survey of security vulnerabilities in session initiation protocol
-
10.1109/COMST.2006.253270
-
Geneiatakis D., Dagiouklas A., Kambourakis G., Lambrinoudakis C., Gritzalis S., Ehlert S., et al(2006). Survey of security vulnerabilities in session initiation protocol. IEEE Communications Surveys and Tutorials, 8, 68–81. 10.1109/COMST.2006.253270
-
(2006)
IEEE Communications Surveys and Tutorials
, vol.8
, pp. 68-81
-
-
Geneiatakis, D.1
Dagiouklas, A.2
Kambourakis, G.3
Lambrinoudakis, C.4
Gritzalis, S.5
Ehlert, S.6
-
8
-
-
63149153148
-
A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment
-
10.1007/s11235–008–9065–5
-
Geneiatakis D., Lambrinoudakis C. (2007). A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment. Telecommunication Systems, 36(4), 153–159. 10.1007/s11235–008–9065–5
-
(2007)
Telecommunication Systems
, vol.36
, Issue.4
, pp. 153-159
-
-
Geneiatakis, D.1
Lambrinoudakis, C.2
-
9
-
-
85001610601
-
-
Retrieved from http://code.google.com/p/sipvicious/ (n. d.)
-
Guaci, S. (n. d.). SIPVicious. Retrieved from http://code.google.com/p/sipvicious/
-
SIPVicious
-
-
Guaci, S.1
-
13
-
-
70349293400
-
-
Retrieved from http://www.trusteer.com/docs/bind9dns.html
-
Klein, A. (2007). BIND 9 DNS cache poisoning. Retrieved from http://www.trusteer.com/docs/bind9dns.html
-
(2007)
BIND 9 DNS cache poisoning
-
-
Klein, A.1
-
16
-
-
62449122081
-
A security evaluation of IMS deployments
-
Park, F. S., Patnaik, D., Amrutkar, C., & Hunter, M. T. (2008). A security evaluation of IMS deployments. In Proceedings of the 2nd International Conference on Internet Multimedia Services Architecture and Applications (pp. 1–6).
-
(2008)
In Proceedings of the 2nd International Conference on Internet Multimedia Services Architecture and Applications
, pp. 1-6
-
-
Park, F.S.1
Patnaik, D.2
Amrutkar, C.3
Hunter, M.T.4
-
18
-
-
0003418329
-
-
Retrieved from http://faculty.ksu.edu.sa/fantookh/RFC/rfc791.txt.pdf
-
Postel, J. (1981). RFC 791: IP: Internet protocol. Retrieved from http://faculty.ksu.edu.sa/fantookh/RFC/rfc791.txt.pdf
-
(1981)
RFC 791: IP: Internet protocol
-
-
Postel, J.1
-
23
-
-
0037984544
-
-
Retrieved from http://www.ietf.org/rfc/rfc3261.txt
-
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., et al. (2002). RFC 3261: SIP: Session initiation protocol. Retrieved from http://www.ietf.org/rfc/rfc3261.txt
-
(2002)
RFC 3261: SIP: Session initiation protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
-
24
-
-
0003709134
-
-
Retrieved from http://www.ietf.org/rfc/rfc1889.txt
-
Schulzrinne, H., Casner, S., Frederick, R., & Jacobson, V. (1996). RFC 1889: RTP: A transport protocol for real-time applications. Retrieved from http://www.ietf.org/rfc/rfc1889.txt
-
(1996)
RFC 1889: RTP: A transport protocol for real-time applications
-
-
Schulzrinne, H.1
Casner, S.2
Frederick, R.3
Jacobson, V.4
-
27
-
-
84947768665
-
-
New York, NY: John Wiley & Sons. 10.1002/9780470516997
-
Sisalem D., Kuthan J., Abend U., Floroiu J., Schulzrinne H. (2009). SIP Security. New York, NY: John Wiley & Sons. 10.1002/9780470516997
-
(2009)
SIP Security
-
-
Sisalem, D.1
Kuthan, J.2
Abend, U.3
Floroiu, J.4
Schulzrinne, H.5
-
28
-
-
33645918247
-
IP spoofing: An introduction
-
Tanase, M. (2003). IP spoofing: An introduction. Security Focus, 11.
-
(2003)
Security Focus
, vol.11
-
-
Tanase, M.1
-
29
-
-
78049395173
-
A call conference room interception attack and its detection
-
Vrakas, N., Geneiatakis, D., & Lambrinoudakis, C. (2010). A call conference room interception attack and its detection. In Proceedings of the 7th International Conference on Trust, Privacy & Security in Digital Business (pp. 38–44).
-
(2010)
In Proceedings of the 7th International Conference on Trust, Privacy & Security in Digital Business
, pp. 38-44
-
-
Vrakas, N.1
Geneiatakis, D.2
Lambrinoudakis, C.3
-
31
-
-
20844455974
-
Challenges in securing voice over iP
-
10.1109/MSP.2005.62
-
Walsh T. J., Kuhn D. R. (2005). Challenges in securing voice over iP. IEEE Security and Privacy, 3(3), 44–49. 10.1109/MSP.2005.62
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 44-49
-
-
Walsh, T.J.1
Kuhn, D.R.2
-
32
-
-
67349141318
-
Intrusion detection in voice over IP environments
-
10.1007/s10207–008–0071–0
-
Wu Y., Apte V., Bagchi S., Garg S., Singh N. (2009). Intrusion detection in voice over IP environments. International Journal of Information Security, 8(3), 153–172. 10.1007/s10207–008–0071–0
-
(2009)
International Journal of Information Security
, vol.8
, Issue.3
, pp. 153-172
-
-
Wu, Y.1
Apte, V.2
Bagchi, S.3
Garg, S.4
Singh, N.5
-
33
-
-
4544342880
-
Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-IP environments
-
Firenze, Italy
-
Wu, Y., Bagchi, S., Garg, S., Singh, N., & Tsai, T. (2004). Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-IP environments. In Proceedings of the International Conference on Dependable Systems and Networks, Firenze, Italy (p. 433).
-
(2004)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 433
-
-
Wu, Y.1
Bagchi, S.2
Garg, S.3
Singh, N.4
Tsai, T.5
-
34
-
-
77952347156
-
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
-
March
-
Zhang, R., Wang, X., Farley, R., Yang, X., & Jiang, X. (2009, March). On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. In Proceedings of the 4th ACM Symposium on Information, Computer and Communications Security (pp. 61–69).
-
(2009)
In Proceedings of the 4th ACM Symposium on Information, Computer and Communications Security
, pp. 61-69
-
-
Zhang, R.1
Wang, X.2
Farley, R.3
Yang, X.4
Jiang, X.5
|