RFC3261: SIP: Session initiation protocol United States, 2002. ,
Statistical Learning Theory, 1998. ,
Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines, Proceedings of the first Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), pp.71-82, 2004. ,
DOI : 10.1515/PIKO.2004.228
Visualization of anomaly detection using prediction sensitivity, Sicherheit, pp.197-208, 2005. ,
LIBSVM, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, 2001. ,
DOI : 10.1145/1961189.1961199
VoIP security and privacy threat taxonomy Public Realease 1.0, 2005. ,
SIP security mechanisms: A stateof-the-art review, Proceedings of the Fifth International Network Conference, pp.147-155, 2005. ,
KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.47-56, 2007. ,
DOI : 10.1145/1326304.1326313
URL : https://hal.archives-ouvertes.fr/inria-00166947
VoIP Intrusion Detection Through Interacting Protocol State Machines, International Conference on Dependable Systems and Networks (DSN'06), 2006. ,
DOI : 10.1109/DSN.2006.73
Intrusion detection system for signal based SIP attacks through timed HCPN, The Second International Conference on Availability, Reliability and Security (ARES'07), 2007. ,
DOI : 10.1109/ARES.2007.102
SIP-based VoIP traffic behavior profiling and its applications, Proceedings of the 3rd annual ACM workshop on Mining network data , MineNet '07, pp.39-44, 2007. ,
DOI : 10.1145/1269880.1269891
Detecting VoIP Floods Using the Hellinger Distance, IEEE Transactions on Parallel and Distributed Systems, vol.19, issue.6, pp.794-805, 2008. ,
DOI : 10.1109/TPDS.2007.70786
Survey of network security systems to counter SIP-based denial-of-service attacks, Computers & Security, vol.29, issue.2, pp.225-243, 2010. ,
DOI : 10.1016/j.cose.2009.09.004
A SIP-oriented SPIT Management Framework, Computers & Security, vol.27, issue.5-6, pp.136-153, 2008. ,
DOI : 10.1016/j.cose.2008.05.007
Monitoring SIP Traffic Using Support Vector Machines, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection, pp.311-330, 2008. ,
DOI : 10.1007/978-3-540-87403-4_17
URL : https://hal.archives-ouvertes.fr/inria-00325290
Traffic flooding attack detection with SNMP MIB using SVM, Computer Communications, vol.31, issue.17, pp.4212-4219, 2008. ,
DOI : 10.1016/j.comcom.2008.09.018