VoIP: State of art for global connectivity—A critical review

HP Singh, S Singh, J Singh, SA Khan - Journal of Network and Computer …, 2014 - Elsevier
The Internet has revolutionized the telecommunication systems by supporting new
applications and services. Voice over Internet Protocol (VoIP) is one of the most prominent …

Detecting VoIP floods using the Hellinger distance

H Sengar, H Wang, D Wijesekera… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
Voice over IP (VoIP), also known as Internet telephony, is gaining market share rapidly and
now competes favorably as one of the visible applications of the Internet. Nevertheless …

Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms

D Sisalem, J Kuthan, S Ehlert - IEEE Network, 2006 - ieeexplore.ieee.org
In this article we address the issue of denial of service attacks targeting the hardware and
software of voice over IP servers or by misusing specific signaling protocol features. As a …

A multi-perspective analysis of carrier-grade NAT deployment

P Richter, F Wohlfart, N Vallina-Rodriguez… - Proceedings of the …, 2016 - dl.acm.org
As ISPs face IPv4 address scarcity they increasingly turn to network address translation
(NAT) to accommodate the address needs of their customers. Recently, ISPs have moved …

[PDF][PDF] SIP authentication scheme using ECDH

A Durlanik, I Sogukpinar - World Enformatika Soc Trans Eng …, 2005 - ms11.voip.edu.tw
SIP (Session Initiation Protocol), using HTML based call control messaging which is quite
simple and efficient, is being replaced for VoIP networks recently. As for authentication and …

A secure and efficient SIP authentication scheme for converged VoIP networks

EJ Yoon, KY Yoo, C Kim, YS Hong, M Jo… - Computer …, 2010 - Elsevier
Session Initiation Protocol (SIP) has been widely used in current Internet protocols such as
Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a …

VoIP intrusion detection through interacting protocol state machines

H Sengar, D Wijesekera, H Wang… - … Systems and Networks …, 2006 - ieeexplore.ieee.org
Being a fast-growing Internet application, Voice over Internet Protocol (VoIP) shares the
network resources with the regular Internet traffic, and is susceptible to the existing security …

A novel SIP based distributed reflection denial-of-service attack and an effective defense mechanism

IM Tas, BG Unsalver, S Baktir - IEEE access, 2020 - ieeexplore.ieee.org
We introduce a novel SIP based attack, named as the SR-DRDoS attack, that exploits some
less known SIP features by using the IP-spoofing technique, the reflection based attack logic …

OpenSIP: Toward software-defined SIP networking

A Montazerolghaem, MHY Moghaddam… - … on Network and …, 2017 - ieeexplore.ieee.org
VoIP is becoming a low-priced and efficient replacement for PSTN in communication
industries. With a widely growing adoption rate, session initiation protocol (SIP) is an …

Packet tracing and analysis of network cameras with Wireshark

R Das, G Tuna - 2017 5th International Symposium on Digital …, 2017 - ieeexplore.ieee.org
Although people think that their identity is not revealed on the internet, the confidentiality and
protection of personal information on unreliable networks such as the internet is an …