Nemea: Framework for stream-wise analysis of network traffic, Tech. rep., CESNET, 2013. ,
Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information, p.7011, 2013. ,
DOI : 10.17487/rfc7011
Overview of SIP Attacks and Countermeasures, Information Security and Digital Forensics, pp.82-91, 2010. ,
DOI : 10.1109/MNET.2002.1081764
SIPVicious. Tools for auditing sip based voip systems (2012), https://code.google.com ,
SSHCure: A Flow-Based SSH Intrusion Detection System, Dependable Networks and Services, pp.86-97, 2012. ,
DOI : 10.1007/978-3-642-30633-4_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.643.997
Analysis of SIP-Based Threats Using a VoIP Honeynet System, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.541-548, 2012. ,
DOI : 10.1109/TrustCom.2012.90
Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX, IEEE Communications Surveys & Tutorials, vol.16, issue.4, pp.2037-2064, 2014. ,
DOI : 10.1109/COMST.2014.2321898
URL : http://doc.utwente.nl/93156/1/tutorial.pdf
A Comprehensive Survey of Voice over IP Security Research, IEEE Communications Surveys & Tutorials, vol.14, issue.2, pp.514-537, 2012. ,
DOI : 10.1109/SURV.2011.031611.00112
Next Generation Application-Aware Flow Monitoring, Monitoring and Securing Virtualized Networks and Services, pp.173-178, 2014. ,
DOI : 10.1007/978-3-662-43862-6_20
URL : https://hal.archives-ouvertes.fr/hal-01401303
SiVuS (SiP Vulnerability Scanner) ? User Guide v1 ,