Author:
Sebastian Bosco,Choudhury Paromita,Jaidhar C. D.
Reference9 articles.
1. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley,M., Schooler, E.: SIP: Session Initiation Protocol, RFC 3261 (June 2002)
2. SANS Institute. SANS Top-20 2007 Security Risks, 2007. http://www.sans.org/top20/
3. Seo, D., Lee, H., Nuwere, E.: Detecting more SIP attacks on VoIP services by combining rule matching and state transition models. In: Proceedings of the IFIP TC 11 23rd International Information Security Conference, vol. 278, pp. 397–411. (2008)
4. Chen, E.Y., Itoh, M.: A whitelist approach to protect SIP servers from flooding attacks. In: Communications Quality and Reliability (CQR), 2010 IEEE International Workshop Technical Committee, 8–10 June 2010
5. Peng, T., Leckie, C., Ramamohanarao, K.: Protection from distributed denial of service attacks using history-based IP filtering. Communications, 2003. ICC ‘03. IEEE International Conference, vol. 1, pp. 482–486. (2003)