SIP Proxies: New Reflectors in the Internet (original) (raw)

Proxy-based Security for the Session Initiation Protocol (SIP)

Chi-Tai Dang

Systems and Networks …, 2007

View PDFchevron_right

Protecting SIP proxy servers from ringing-based denial-of-service attacks

Klara Nahrstedt

2008

View PDFchevron_right

SIP Security: Main Vulnerabilities, Denial of Service (DoS) Attacks and Intrusion Detection Techniques

Ali Elmoghazy

International Conference on Aerospace Sciences & Aviation Technology, 2013

View PDFchevron_right

Network Security Framework To Counter SIP Based Attacks

Chiran Adhikari, TARUN KUMAR

View PDFchevron_right

Stateful Virtual Proxy for SIP Message Flooding Attack Detection

Sungchan Hong

Itiis, 2009

View PDFchevron_right

A Cost-Effective Mechanism for Protecting SIP Based Internet Telephony Services Against Signaling Attacks

Costas Lambrinoudakis

Proceedings of the 4th International Mobile Multimedia Communications Conference, 2008

View PDFchevron_right

Session Initiation Protocol Attacks and Challenges

Atul Mishra

View PDFchevron_right

Classification for SIP protocol attacks

Reza Jabbarpour

View PDFchevron_right

A study of SIP trunk security and challenges

Selvakumar Manickam

2012 IEEE International Conference on Electronics Design, Systems and Applications (ICEDSA), 2012

View PDFchevron_right

Evaluating DoS Attacks against Sip-Based VoIP Systems

Ali akbar

GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, 2009

View PDFchevron_right

Review of SIP based DoS attacks

OTHMAN O KHALIFA

International Journal of Computer Applications Technology and Research, 2016

View PDFchevron_right

Survey of Security Vulnerabilities In Session Initiation Protocol

Tasos Dagiuklas

IEEE …, 2006

View PDFchevron_right

Sip Network Security: Attacks, Security Measures & Management

Jitendra Shewaramani

2013

View PDFchevron_right

Towards a Security Model against Denial of Service Attacks for SIP Traffic

DIEGO AVILA PESANTEZ

2018

View PDFchevron_right

Unregister Attacks in SIP

Ronit Halachmi-bekel, Anat Bremler-barr

2006 2nd IEEE Workshop on Secure Network Protocols, 2006

View PDFchevron_right

A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks

Isaac Lee

International Journal of Internet Protocol Technology, 2008

View PDFchevron_right

The devil is in the detail: SDP-driven malformed message attacks and mitigation in SIP ecosystems

Zisis Tsiatsikas

IEEE Access

View PDFchevron_right

A Survey of Security Weakness of Session Initiation Protocol (SIP)

Gul Faraz

ijmse.org

View PDFchevron_right

Cryptanalysis of Farash et al.'s SIP authentication protocol

MOHAMMED OUANAN

International Journal of Dynamical Systems and Differential Equations, 2018

View PDFchevron_right

A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment

Dimitris Geneiatakis

Telecommunication Systems, 2007

View PDFchevron_right

Detecting authentication misuse attacks against SIP entities

Hassan Asgharian

2013 10th International ISC Conference on Information Security and Cryptology (ISCISC), 2013

View PDFchevron_right

Security analysis of VoIP architecture for identifying SIP vulnerabilities

Ubaid UR Rehman

2014 International Conference on Emerging Technologies (ICET), 2014

View PDFchevron_right

Two Layer Denial of Service Prevention on SIP VoIP Infrastructures

Tasos Dagiuklas

Computer …, 2008

View PDFchevron_right

Experimental Validation of New SIP Authentication Protocol

Yousef Farhaoui

Big Data and Networks Technologies, 2019

View PDFchevron_right

Deliverable No.: D2. 1 Title of the Deliverable: Towards a Secure and Reliable VoIP Infrastructure

Tasos Dagiuklas

Citeseer

View PDFchevron_right

Secure SIP from DoS based Massage Flooding Attack

Ruhul Islam

caesjournals.org

View PDFchevron_right

Information leak vulnerabilities in SIP implementations

Debanjan Saha

IEEE Network, 2006

View PDFchevron_right

Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints

abbas hijazi

Computers & Security, 2017

View PDFchevron_right

SIP Security Mechanisms: A State-of-the-Art Review

Tasos Dagiuklas

Proc. 5th International …, 2005

View PDFchevron_right