A comprehensive survey of voice over IP security research

AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …

[PDF][PDF] Survey of security vulnerabilities in session initiation protocol

D Geneiatakis, T Dagiuklas… - … Surveys & Tutorials, 2006 - researchgate.net
The open architecture of the Internet and the use of open standards like Session Initiation
Protocol (SIP) constitute the provisioning of services (eg, Internet telephony, instant …

A framework for protecting a SIP-based infrastructure against malformed message attacks

D Geneiatakis, G Kambourakis, C Lambrinoudakis… - Computer Networks, 2007 - Elsevier
This paper presents a framework that can be utilized for the protection of session initiation
protocol (SIP)-based infrastructures from malformed message attacks. Its main characteristic …

SIP-based VoIP traffic behavior profiling

A Nucci, S Ranjan, ZL Zhang - US Patent 7,441,429, 2008 - Google Patents
With the widespread adoption of SIP-based VoIP, understanding the characteristics of SIP
traffic behavior is critical to problem diagnosis and security protection of VoIP services. A …

Security analysis of VoIP architecture for identifying SIP vulnerabilities

UU Rehman, AG Abbasi - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Voice over Internet Protocol (VoIP) is an emerging technology that changes the way of
communication services over IP networks. It provides flexible and low cost services to the …

Battling against DDoS in SIP: Is Machine Learning-based detection an effective weapon?

Z Tsiatsikas, A Fakis… - … Joint Conference on …, 2015 - ieeexplore.ieee.org
This paper focuses on network anomaly-detection and especially the effectiveness of
Machine Learning (ML) techniques in detecting Denial of Service (DoS) in SIP-based VoIP …

[图书][B] SIP handbook: services, technologies, and security of Session Initiation Protocol

SA Ahson, M Ilyas - 2018 - books.google.com
Widely adopted by service providers to enable IP telephony, instant messaging, and other
data services, SIP is the signaling protocol of choice for advanced multimedia …

SIP-based VoIP traffic behavior profiling and its applications

HJ Kang, ZL Zhang, S Ranjan, A Nucci - Proceedings of the 3rd annual …, 2007 - dl.acm.org
With the widespread adoption of SIP-based VoIP, understanding the characteristics of SIP
traffic behavior is critical to problem diagnosis and security protection of IP Telephony. In this …

[PDF][PDF] Model-based vulnerability analysis of IMS network.

D Wang, C Liu - J. Networks, 2009 - Citeseer
Next Generation Network (NGN), its security is vital important. However, IMS is a network
with openarchitecture based on IP, which brings a lot of security issues. There has already …

[PDF][PDF] Multilayer secured SIP based VoIP architecture

B Basem, AZ Ghalwash, RA Sadek - International Journal of …, 2015 - academia.edu
VoIP faces many emerging attacks and threats. securing SIP based VoIP is a major
challenging task, hence confidentiality, integrity, availability, as well as authenticity must be …