O. Festor and A. Lahmadi, Secsip: A stateful firewall for sip-based networks, 11th IFIP/IEEE International Symposium on Integrated Network Management, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00404853

H. Abdelnur, T. Avanesov, M. Rusinowitch, and R. State, Abusing SIP Authentication, 2008 The Fourth International Conference on Information Assurance and Security, pp.237-242, 2008.
DOI : 10.1109/IAS.2008.29

URL : https://hal.archives-ouvertes.fr/inria-00405356

H. Abdelnur, O. Festor, and R. State, KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, 2007.
DOI : 10.1145/1326304.1326313

URL : https://hal.archives-ouvertes.fr/inria-00166947

Y. Eric, M. Chen, and . Itoh, Scalable detection of sip fuzzing attacks, SECURWARE '08: Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies, pp.114-119, 2008.

E. Y. Chen, Detecting DoS attacks on SIP systems, 1st IEEE Workshop on VoIP Management and Security, 2006., pp.53-58, 2006.
DOI : 10.1109/VOIPMS.2006.1638123

W. Conner and K. Nahrstedt, Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks, 2008 Tenth IEEE International Symposium on Multimedia, pp.340-347, 2008.
DOI : 10.1109/ISM.2008.65

R. Dantu and P. Kolan, Detecting spam in voip networks, SRUTI'05: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop, pp.5-5, 2005.

K. Darilion, Analysis of a voip attack. http://www.ipcom.at/fileadmin/public/2008-10- 22 Analysis of a VoIP Attack.pdf, 2008.

J. Davidson, J. Peters, M. Bhatia, S. Kalidindi, and S. Mukherjee, Voice over IP Fundamentals, 2006.

C. L. Forgy, Rete: a fast algorithm for the many pattern/many object pattern match problem In Expert systems: a software methodology for modern applications, pp.324-341, 1990.

J. Franks, P. Hallam-baker, J. Hostetler, S. Lawrence, P. Leach et al., HTTP Authentication: Basic and Digest Access Authentication, 1999.
DOI : 10.17487/rfc2617

O. Hersent and . Ip-telephony, Deploying VoIP Protocols and IMS Infrastructure, 2010.

A. Hinze, Efficient Filtering of Composite Events, Proc. of the British National Database Conference, pp.207-225, 2003.
DOI : 10.1007/3-540-45073-4_17

H. Kaplan and D. Wing, The SIP Identity Baiting Attack, IETF draft, 2008.

M. Nassar, S. Niccolini, R. State, and T. Ewald, Holistic VoIP intrusion detection and prevention system, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.1-9, 2007.
DOI : 10.1145/1326304.1326306

URL : https://hal.archives-ouvertes.fr/inria-00169036

J. Peterson and C. Jennings, Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP), RFC, vol.4474, 2006.
DOI : 10.17487/rfc4474

T. Reenskaug, Models -views -controllers A scanned version on http, Xerox PARC, 1979.

J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson et al., SIP: Session Initiation Protocol, RFC, vol.3261, issue.3853, pp.4320-4916, 2002.
DOI : 10.17487/rfc3261

D. Schwartz and J. Barkan, End-to-End Route Management in the Session Initiation Protocol, 2006.

D. Schwartz and J. Barkan, End-to-end route management in the session initiation protocol, 2006.

R. Sparks, S. Lawrence, A. Hawrylyshen, and B. Campen, Addressing an Amplification Vulnerability in Session Initiation Protocol (SIP) Forking Proxies, RFC, vol.5393, 2008.
DOI : 10.17487/rfc5393

. Voipsa, Voip security and privacy threat taxonomy, 2005.

H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier, Shield, ACM SIGCOMM Computer Communication Review, vol.34, issue.4, pp.193-204, 2004.
DOI : 10.1145/1030194.1015489

G. Zhang, S. Ehlert, T. Magedanz, and D. Sisalem, Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.57-66, 2007.
DOI : 10.1145/1326304.1326314

R. Zhang, X. Wang, X. Yang, and X. Jiang, Billing attacks on sip-based voip systems, WOOT '07: Proceedings of the first USENIX workshop on Offensive Technologies, pp.1-8, 2007.

I. Centre-de-recherche, I. Nancy, ?. Est, and L. Technopôle-de-nancy, Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès-Nancy Cedex (France) Centre de recherche INRIA Futurs : Parc Orsay Université -ZAC des Vignes 4, rue Jacques Monod -91893 ORSAY Cedex Centre de recherche INRIA Rennes ? Bretagne Atlantique : IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex Centre de recherche INRIA Grenoble ? Rhône-Alpes : 655, avenue de l'Europe -38334 Montbonnot Saint-Ismier Centre de recherche INRIA Paris ? Rocquencourt : Domaine de Voluceau -Rocquencourt -BP 105 -78153 Le Chesnay Cedex Centre de recherche, 105 -78153 Le Chesnay Cedex (France) http://www.inria.fr, 2004.