A comprehensive study of flooding attack consequences and countermeasures in session initiation protocol (sip)

I Hussain, S Djahel, Z Zhang… - Security and …, 2015 - Wiley Online Library
Abstract Session Initiation Protocol (SIP) is widely used as a signaling protocol to support
voice and video communication in addition to other multimedia applications. However, it is …

SIPp-DD: SIP DDoS flood-attack simulation tool

J Stanek, L Kencl - 2011 Proceedings of 20th International …, 2011 - ieeexplore.ieee.org
With the growing popularity of Voice-over-IP communication and of the SIP protocol, mobile
networks including, denial-of-service attacks against the signaling are an increasingly …

Novel session initiation protocol-based distributed denial-of-service attacks and effective defense strategies

IM Tas, B Ugurdogan, S Baktir - Computers & Security, 2016 - Elsevier
Abstract Voice-over-IP (VoIP) and its underlying session initiation protocol (SIP) techniques
have become popular in recent years. VoIP/SIP techniques are used widely in unified …

[PDF][PDF] A selective defense for mitigating coordinated call attacks

MOO Lemos, YG Dantas, I Fonseca, V Nigam… - … on Computer Networks …, 2016 - nigam.info
Telephony Denial of Service (TDoS) attack is a form of Denial of Service (DoS) attack that
targets telephone services, such as Voice over IP (VoIP), not allowing legitimate users to …

SIP Protector: Defense architecture mitigating DDoS flood attacks against SIP servers

J Stanek, L Kencl - 2012 IEEE International Conference on …, 2012 - ieeexplore.ieee.org
As Voice-over-IP becomes a commonly used technology, the need to keep it secure and
reliable has grown. Session Initiation Protocol (SIP) is most often used to deploy VoIP and …

[HTML][HTML] On the accuracy of formal verification of selective defenses for TDoS attacks

MOO Lemos, YG Dantas, IE Fonseca… - Journal of logical and …, 2018 - Elsevier
Abstract Telephony Denial of Service (TDoS) attacks target telephony services, such as
Voice over IP (VoIP), not allowing legitimate users to make calls. There are few defenses …

智慧型監控系統之攻擊分析

鄧博慶 - 2010 - irlib.pccu.edu.tw
由於無線感測網路的進步, 使得物體與物體之間透過網際網路相互連接, 成為物聯網(Internet of
Things, IOT), 大量運用在定位及環境監控等. 本研究目的在提出一套利用少數網路攝影機和無線 …

[图书][B] Detection of denial of service attacks on application layer protocols

B Elmasri - 2015 - search.proquest.com
This research investigates Denial of Service (DoS) attacks targeting the Internet's
Application Layer protocols, namely Session Initiation Protocol (SIP), and SPDY, the …

[PDF][PDF] Journal of Logical and Algebraic Methods in Programming

MOO Lemos, YG Dantas, IE Fonseca, V Nigam - 2017 - mais.informatik.tu-darmstadt.de
Telephony Denial of Service (TDoS) attacks target telephony services, such as Voice over IP
(VoIP), not allowing legitimate users to make calls. There are few defenses that attempt to …

Підвищення стійкості шифру BLOWFISH на основі оптимізації слабких ключів генетичним алгоритмом

В Карпінець, АВ Приймак… - Правове, нормативне та …, 2018 - ir.lib.vntu.edu.ua
Розглянуто існуючі симетричні алгоритми шифрування інформації. Детально описано
їх переваги та недоліки. Проведено експериментальне дослідження шифру Blowfish …