Вы находитесь на странице: 1из 8

No

anti-SPIT architecture
1
2
3
4
5
attacks
6
7
8
Defence
9
Denial of Services
10
11
12
13
14
15
16
17
18
Service Abuse
19
20
General overview
21
22
P2P SIP
23
Field Study and System / Protocol Analysis
24
25
performance analysis
26
27
28
29
30
authentication protocols
31
32
33
34
35
36
37
38
39
40
41
42
architecture
43
44
45
46
47
48
49
50
51
52
53
54
55
middlebox
56
Judul Paper
anti-SPIT architecture
A distributed cooperative detection scheme for SPIT attacks in SIP based systems
A first look on the effects and mitigation of VoIP SPIT flooding in 4G mobile networks
A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services
A SPIT detection algorithm based on user-s call behavior
Automated Intrusion Detection and Prevention System over SPIT -AIDPoS-

Analysis of SIP-Based Threats Using a VoIP Honeynet System


A security model of voice eavesdropping protection over SIP-based VoIP with XTR cryptography
Analysis of a --0- Stealth Scan From a Botnet

A study of SIP trunk security and challenges


Denial of Services
A Proposal for Anomaly Traffic Detection in the IP Multimedia Subsystem Using Tanimoto Distance and a Modified Moving Ave
A lightweight countermeasure to cope with flooding attacks against session initiation protocol
A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP
A restrictive model -RM- for detection and prevention of INVITE flooding attack
An entropy-based VoIP flooding attacks detection and prevention system
A SIP delayed based mechanism for detecting VOIP flooding attacks
An anomaly based VoIP DoS attack detection and prevention method using fuzzy logic
An Empirical Study of Denial of Service -DoS- against VoIP
An empirical study of security of VoIP system
Service Abuse
A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an
A comprehensive framework for detecting and preventing VoIP fraud and misuse
General overview
A preliminary research on security issues in IP Multimedia Subsystem
A Survey on Real-Time Secure Transport System

A Secure and Hierarchical Architecture for P2PSIP Session Initiation


Field Study and System / Protocol Analysis
An Analysis of Security Implications in Session Initiation Protocol -SIP-
A Study of Ten Popular Android Mobile VoIP Applications Are the Communications Encrypted-
performance analysis
Anomaly detection in VoIP traffic with trends
A Fast SA Update Mechanism for Secure SIP-IMS Mobility in Integrated UMTS-WLAN Networks
A VoIP SPAM reduction framework
An effect evaluation method for IMS SIP flooding attacks based on fuzzy comprehensive evaluation
An effective failure recovery mechanism for SIP-IMS services
authentication protocols
A PKI-free key agreement protocol for P2P VoIP applications
An enhancement of the SDP Security Description -SDES- for key protection
An identity-based mechanism for enhancing SIP security
Authentication threats in PSTN-VoIP architecture using multi-service gateways
An architecture methodology for secure video conferencing
Analysis of VoIP encryption performance using dedicated hardware
A New Identity-Based Authentication Scheme for SIP
A Survey of SIP Authentication and Key Agreement Schemes
A new Authentication and Key Agreement protocol for SIP in IMS
A new SIP authentication scheme by incorporation of elliptic curve cryptography with ticket server
An ECDH-based light-weight mutual authentication scheme on local SIP
A model of biometric authentication system for network conversational class service
architecture
A Comprehensive Security Model for Networking Applications
A Privacy preserving Approach to Call Detail Records Analysis in VoIP Systems
An Implementation and Verification of Wireless VoIP Communication Based on WINCE 6.0 Applied in Underground Mine
A dynamic security level monitoring approach for system integrity protection scheme
A Proxy-Based Server Irrelevant Security Mechanism for VoIP
A distributed infrastructure to analyse SIP attacks in the Internet
A hardware-assisted proof-of-concept for secure VoIP clients on untrusted operating systems
A secure fast handoff scheme with attribute-based access control for secure enterprise WLAN
Adding Privacy to Multicast DNS Service Discovery
An Efficient Defense Scheme against SIP DoS Attack in SDN Using Cloud SFW
A cost-sensitive automated response system for SIP-based applications
A reputation based trust center model for cyber security
ASIC design and implementation for VoIP intrusion prevention system
middlebox
A secured approach to protect SIP signaling message
Tahun

2012
2012
2012
2013
2015

2012
2015
2015

2012

2012
2013
2013
2013
2014
2016
2016
2016
2016

2012
2014

2012
2013

2012

2013
2014

2012
2013
2013
2013
2015

2012
2012
2012
2012
2013
2013
2014
2014
2015
2015
2015
2016

2012
2012
2012
2013
2013
2014
2014
2014
2014
2014
2016
2016
2016

2014
Key Point

detection on spam over internet telephony using distribution cooperative detecting method to reduce attack detection duratio
DOS effect of VOIP SPIT Flooding on 4G Network. And proposing distributed architecture on the mobile network infrastructure
prevention system on SIP that adopt rule-based approach for prevention specification on SIP protocol to stop attack, using dete
Spam over IP Telephony detection alghoritm
intrusion detection and prevention over SPIT

attack analysis on SIP using VOIP honeynet system


eavesdropping protection on VoIP ver SIP-based
Botnet on VoIP

survey about how much SIP security enforced when attacks occurred

DOS attack detection using tanimoto distance and modified moving average mechanism
simple and robust detection system for flooding attack through transition state (DOS)
A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP
using block the stream to detection and prevention DOS attack
VOIP flooding attacks detection and prevention
DOS detection on SIP using delayed-mechanism
DOS attack detection using fuzzy logic and FSM (finite state machine)
An Empirical Study of Denial of Service -DoS- against VoIP
An empirical study of security of VoIP system

analyzing communication record to prevent VOIP attack, specially on total fraud attack
detecting and preventing VoIP fraud and misuse using SHUNSHINE

overview on IMS architecture and its security challenge


survey on real time encryption on VoIP

secure and hierarchical architecture proposed for P2P on SIP

identify and describes security issue on SIP that may lead DoS
examine 10 mobile VoIP application and capture security performance

anomaly detection on VoIP using trends


fast security association (SA) update mechanism to improve handoff performance
SPIT reduction framework by rank VOIP caller based on set of parameter
effect evaluation method on SIP flooding attacs using fuzzy comprehensive evaluation
effective failure recovery mechanism on SIP - IMS services

MIKEY protocol and Diffe-Hellman algorithm for key establishment in ZRTP on P2P communication
SDES on TLS over SIP protocol
secure identity-based mechanism for enhancing SIP security
overview about authentication threat on PSTN-VOIP architecture
enhance security on VoIP using hardware security feature
evaluation on voip encryption performance and authentication method over firewall performance
identity based cryptography on SIP authentication
survey on authentication on key agreement scheme for SIP protocol
key-less cryptography to increase performance due to use elliptical curve cryptography
SIP authentication using ECC and ticket server
TLS handshake using ECDH for local SIP environment
proposed biometric authentication on network conversation

security model, key distribution and management technique


proposed to changing communication records due to forensic analysis on VoIP and privacy requirement
VoIP embeded technology using WinCE6.0 to increase simple structure, low cost and scalability
intelligent system proposed to achieve dynamic security level monitoring
safety handshake mechanism on VoIP
novel distribution system with sensor node to detect SIP based attack
secure architecture VoIP (Hardware assisted proof of concept) that reduce underlaying trusted computing base
novel handoff scheme which uses attribute-based encryption to VoIP security
privacy problem occured on MDNS-SD and present privacy extension
effective defensive sheme against DOS attack on SIP using cloud SFW
comparison on respose system and damage cost when attack occurred on proposed intrusion response system
trust center model as cyber security solution
intrusion prevention system design on VoIP

introduce secure symmetric encryption algorithm to protect SIP signalling message

Вам также может понравиться