DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications

A Praseed, PS Thilagam - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks are some of the most devastating attacks
against Web applications. A large number of these attacks aim to exhaust the network …

A survey of SIP authentication and key agreement schemes

HH Kilinc, T Yanik - IEEE communications surveys & tutorials, 2013 - ieeexplore.ieee.org
We present a survey of authentication and key agreement schemes that are proposed for the
SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …

Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers

K Gai, M Qiu - IEEE Transactions on Industrial Informatics, 2017 - ieeexplore.ieee.org
Recent booming growth of networking-based solutions have brought numerous challenges
to security and privacy from both perspectives of insider and outsider threats. The encrypted …

Application layer denial-of-service attacks and defense mechanisms: a survey

N Tripathi, N Hubballi - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …

A comprehensive survey of voice over IP security research

AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …

Exploring multivariate event sequences using rules, aggregations, and selections

BCM Cappers, JJ Van Wijk - IEEE transactions on visualization …, 2017 - ieeexplore.ieee.org
Multivariate event sequences are ubiquitous: travel history, telecommunication
conversations, and server logs are some examples. Besides standard properties such as …

An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC

H Arshad, M Nikooghadam - Multimedia Tools and Applications, 2016 - Springer
The session initiation protocol (SIP) is a powerful and superior signaling protocol for the
voice over internet protocol (VoIP). Authentication is an important security requirement for …

Survey of network security systems to counter SIP-based denial-of-service attacks

S Ehlert, D Geneiatakis, T Magedanz - computers & security, 2010 - Elsevier
Session Initiation Protocol is a core protocol for coming real time communication networks,
including VoIP, IMS and IPTV networks. Based on the open IP stack, it is similarly …

A new authenticated key agreement for session initiation protocol

Q Xie - International Journal of Communication Systems, 2012 - Wiley Online Library
The session initiation protocol (SIP) is an authentication protocol used in 3G mobile
networks. In 2009, Tsai proposed an authenticated key agreement scheme as an …

A survey of mobile VPN technologies

A Alshalan, S Pisharody… - … Communications Surveys & …, 2015 - ieeexplore.ieee.org
Virtual private network (VPN) is the traditional approach for an end-to-end secure
connection between two endpoints. Most existing VPN solutions are intended for wired …