J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson et al., RFC3261: SIP: Session initiation protocol United States, 2002.

V. Vapnik, Statistical Learning Theory, 1998.

P. Laskov, C. Schfer, and I. Kotenko, Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines, Proceedings of the first Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), pp.71-82, 2004.
DOI : 10.1515/PIKO.2004.228

P. Laskov, K. Rieck, C. Schäfer, and K. Müller, Visualization of anomaly detection using prediction sensitivity, Sicherheit, pp.197-208, 2005.

C. Chang and C. Lin, LIBSVM, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, 2001.
DOI : 10.1145/1961189.1961199

. Voipsa, VoIP security and privacy threat taxonomy Public Realease 1.0, 2005.

D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis, and S. Gritzalis, SIP security mechanisms: A stateof-the-art review, Proceedings of the Fifth International Network Conference, pp.147-155, 2005.

H. Abdelnur, R. State, and O. Festor, KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.47-56, 2007.
DOI : 10.1145/1326304.1326313

URL : https://hal.archives-ouvertes.fr/inria-00166947

H. Sengar, D. Wijesekera, H. Wang, and S. Jajodia, VoIP Intrusion Detection Through Interacting Protocol State Machines, International Conference on Dependable Systems and Networks (DSN'06), 2006.
DOI : 10.1109/DSN.2006.73

Y. Ding and G. Su, Intrusion detection system for signal based SIP attacks through timed HCPN, The Second International Conference on Availability, Reliability and Security (ARES'07), 2007.
DOI : 10.1109/ARES.2007.102

H. Kang, Z. Zhang, S. Ranjan, and A. Nucci, SIP-based VoIP traffic behavior profiling and its applications, Proceedings of the 3rd annual ACM workshop on Mining network data , MineNet '07, pp.39-44, 2007.
DOI : 10.1145/1269880.1269891

]. H. Sengar, H. Wang, D. Wijesekera, and S. Jajodia, Detecting VoIP Floods Using the Hellinger Distance, IEEE Transactions on Parallel and Distributed Systems, vol.19, issue.6, pp.794-805, 2008.
DOI : 10.1109/TPDS.2007.70786

S. Ehlert, D. Geneiatakis, and T. Magedanz, Survey of network security systems to counter SIP-based denial-of-service attacks, Computers & Security, vol.29, issue.2, pp.225-243, 2010.
DOI : 10.1016/j.cose.2009.09.004

D. Gritzalis and Y. Mallios, A SIP-oriented SPIT Management Framework, Computers & Security, vol.27, issue.5-6, pp.136-153, 2008.
DOI : 10.1016/j.cose.2008.05.007

M. Nassar, R. State, and O. Festor, Monitoring SIP Traffic Using Support Vector Machines, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection, pp.311-330, 2008.
DOI : 10.1007/978-3-540-87403-4_17

URL : https://hal.archives-ouvertes.fr/inria-00325290

J. Yu, H. Lee, M. Kim, and D. Park, Traffic flooding attack detection with SNMP MIB using SVM, Computer Communications, vol.31, issue.17, pp.4212-4219, 2008.
DOI : 10.1016/j.comcom.2008.09.018