A comprehensive survey of voice over IP security research

AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …

Survey of network security systems to counter SIP-based denial-of-service attacks

S Ehlert, D Geneiatakis, T Magedanz - computers & security, 2010 - Elsevier
Session Initiation Protocol is a core protocol for coming real time communication networks,
including VoIP, IMS and IPTV networks. Based on the open IP stack, it is similarly …

Detecting DoS attacks on SIP systems

EY Chen - 1st IEEE Workshop on VoIP Management and …, 2006 - ieeexplore.ieee.org
As VoIP technology becomes more widely deployed due to its economical advantage over
traditional PSTN services, VoIP servers and clients will become attractive targets of denial of …

A framework for protecting a SIP-based infrastructure against malformed message attacks

D Geneiatakis, G Kambourakis, C Lambrinoudakis… - Computer Networks, 2007 - Elsevier
This paper presents a framework that can be utilized for the protection of session initiation
protocol (SIP)-based infrastructures from malformed message attacks. Its main characteristic …

An ontology description for SIP security flaws

D Geneiatakis, C Lambrinoudakis - Computer Communications, 2007 - Elsevier
Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as
compared to other protocols like MGCP or H. 323. However, the open SIP architecture …

Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding

G Zhang, S Ehlert, T Magedanz, D Sisalem - Proceedings of the 1st …, 2007 - dl.acm.org
A simple yet effective Denial of Service (DoS) attack on SIP servers is to flood the server with
requests addressed at irresolvable domain names. In this paper we evaluate different …

SIPAD: SIP–VoIP anomaly detection using a stateful rule tree

D Seo, H Lee, E Nuwere - Computer Communications, 2013 - Elsevier
Voice over IP (VoIP) services have become prevalent lately because of their potential
advantages such as economic efficiency and useful features. Meanwhile, Session Initiation …

Design and implementation of SIP-aware DDoS attack detection system

DY Ha, HK Kim, KH Ko, CY Lee, JW Kim… - Proceedings of the 2nd …, 2009 - dl.acm.org
SIP is a signaling protocol used for establishing, modifying, terminating sessions in
multimedia services such as VoIP, instant messaging, and video conferencing. Existing IP …

[PDF][PDF] Multilayer secured SIP based VoIP architecture

B Basem, AZ Ghalwash, RA Sadek - International Journal of …, 2015 - academia.edu
VoIP faces many emerging attacks and threats. securing SIP based VoIP is a major
challenging task, hence confidentiality, integrity, availability, as well as authenticity must be …

Mitigating mimicry attacks against the session initiation protocol

S Marchal, A Mehta, VK Gurbani, R State… - … on Network and …, 2015 - ieeexplore.ieee.org
The US National Academies of Science's Board on Science, Technology and Economic
Policy estimates that the Internet and voice-over-IP (VoIP) communications infrastructure …