VoIP security and privacy threat taxonomy Public Release 1, 2005. ,
Secure IP telephony using multi-layered protection, Proceedings of The 10th Annual Network and Distributed System Security Symposium, 2003. ,
SIP intrusion detection and prevention: recommendations and prototype implementation, 1st IEEE Workshop on VoIP Management and Security, 2006., pp.47-52, 2006. ,
DOI : 10.1109/VOIPMS.2006.1638122
SCIDIVE: A stateful and cross protocol intrusion detection architecture for Voice-over-IP environments, International Conference on Dependable Systems and Networks, pp.433-442, 2004. ,
VoIP Intrusion Detection Through Interacting Protocol State Machines, International Conference on Dependable Systems and Networks (DSN'06), 2006. ,
DOI : 10.1109/DSN.2006.73
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.2311
VoIP defender, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, 2007. ,
DOI : 10.1145/1326304.1326307
Detecting DoS attacks on SIP systems, 1st IEEE Workshop on VoIP Management and Security, 2006., pp.53-58, 2006. ,
DOI : 10.1109/VOIPMS.2006.1638123
Specification-based denial-ofservice detection for SIP Voice-over-IP networks, The Third International Conference on Internet Monitoring and Protection (ICIMP), pp.59-66, 2008. ,
Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.57-66, 2007. ,
DOI : 10.1145/1326304.1326314
Detecting VoIP Floods Using the Hellinger Distance, IEEE Transactions on Parallel and Distributed Systems, vol.19, issue.6, pp.794-805, 2008. ,
DOI : 10.1109/TPDS.2007.70786
SIP-based VoIP traffic behavior profiling and its applications, Proceedings of the 3rd annual ACM workshop on Mining network data , MineNet '07, pp.39-44, 2007. ,
DOI : 10.1145/1269880.1269891
Monitoring SIP Traffic Using Support Vector Machines, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID '08), pp.311-330, 2008. ,
DOI : 10.1007/978-3-540-87403-4_17
URL : https://hal.archives-ouvertes.fr/inria-00325290
The VoIP Bot project. Available to download at http://gforge.inria.fr ,
VoIP Malware: Attack Tool & Attack Scenarios, 2009 IEEE International Conference on Communications, 2009. ,
DOI : 10.1109/ICC.2009.5199570
Fractal analysis and modeling of VoIP traffic, Proceedings of Networks, pp.217-222, 2004. ,
A Study of Network Performance and Customer Behavior During Direct-Distance-Dialing Call Attempts in the U.S.A., Bell System Technical Journal, vol.57, issue.1, pp.1-33, 1978. ,
DOI : 10.1002/j.1538-7305.1978.tb02072.x