An efficient and easily deployable method for dealing with DoS in SIP services
Voice over IP (VoIP) architecture and services consist of different software and hardware
components that may be susceptible to a plethora of attacks. Among them, Denial of Service …
components that may be susceptible to a plethora of attacks. Among them, Denial of Service …
Anomaly‐based DoS detection and prevention in SIP networks by modeling SIP normal traffic
M Hosseinpour, MH Yaghmaee… - International Journal …, 2018 - Wiley Online Library
Due to the various features of Voice over Internet Protocol (VoIP), this technology has
attracted the attention of many users in comparison with the traditional telephony system …
attracted the attention of many users in comparison with the traditional telephony system …
Modeling SIP normal traffic to detect and prevent SIP-VoIP flooding attacks using fuzzy logic
M Hosseinpour, SAH Seno… - … on Computer and …, 2016 - ieeexplore.ieee.org
As Voice over Internet Protocol (VoIP) or internet telephony became so popular, it has faced
more security threats in comparison with traditional Public Switched Telephone Network …
more security threats in comparison with traditional Public Switched Telephone Network …
An anomaly based VoIP DoS attack detection and prevention method using fuzzy logic
M Hosseinpour, SAH Seno… - 2016 8th …, 2016 - ieeexplore.ieee.org
Today, Voice over IP (VoIP), also known as Internet telephony, has received lots of attention
because of its efficiency and flexibility. Meanwhile, features such as being in text form, has …
because of its efficiency and flexibility. Meanwhile, features such as being in text form, has …
Using group anonymity to hide the identity of VoIP mobile users communicating over hybrid networks while preserving quality of service
Z Sabra, H Artail - Wireless Communications and Mobile …, 2016 - Wiley Online Library
Security and privacy have become critical in computer networks, especially with the
emergence of E‐commerce. Other than securing the transfer of data, users are interested in …
emergence of E‐commerce. Other than securing the transfer of data, users are interested in …
Ανίχνευση και πρόληψη επιθέσεων άρνησης εξυπηρέτησης στα πρωτόκολλα SIP και SDP
Ζ Τσιάτσικας - 2019 - hellanicus.lib.aegean.gr
Οι πολυμεσικές υπηρεσίες που παρέχονται μέσω του Διαδικτύου, και συγκεκριμένα αυτές που
αξιοποιούν το πρωτόκολλο SIP για τη διαχείριση της σηματοδοσίας, συνεχίζουν να …
αξιοποιούν το πρωτόκολλο SIP για τη διαχείριση της σηματοδοσίας, συνεχίζουν να …