Securing Session Initiation Protocol [PDF]
The session initiation protocol (SIP) is widely used for multimedia communication as a signaling protocol for managing, establishing, maintaining, and terminating multimedia sessions among participants.
Osama Younes, Umar Albalawi
doaj +2 more sources
Countering DDoS Attacks in SIP Based VoIP Networks Using Recurrent Neural Networks [PDF]
Many companies have transformed their telephone systems into Voice over IP (VoIP) systems. Although implementation is simple, VoIP is vulnerable to different types of attacks.
Waleed Nazih +4 more
doaj +2 more sources
Research on Vulnerability Discovery for SIP Based on Protocol Analysis and Fuzz Test [PDF]
Aiming at the potential security vulnerabilities of Session Initiation Protocol(SIP) and the lack of research work for exploiting SIP vulnerabilities,an exploiting solution of SIP vulnerabilities is proposed based on protocol analysis and fuzz test.On ...
LI Jindong,WANG Tao,WU Yang,LEI Dong
doaj +1 more source
Prototype Wireless Network for Internet of Things based on DECT Standard
This paper presents a software prototype of a wireless network for the Internet of Things (IoT) based on the DECT (Digital Enhanced Cordless Telecommunication) standard.
I. V. Sinyavskiy +2 more
doaj +1 more source
A Novel SIP Based Distributed Reflection Denial-of-Service Attack and an Effective Defense Mechanism
We introduce a novel SIP based attack, named as the SR-DRDoS attack, that exploits some less known SIP features by using the IP-spoofing technique, the reflection based attack logic and the DDoS attack logic.
I. Melih Tas +2 more
doaj +1 more source
A robust ECC based mutual authentication protocol with anonymity for session initiation protocol. [PDF]
Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services.
Zahid Mehmood +4 more
doaj +1 more source
This article deals with quality of service (QoS) in internet protocol (IP) telephony by applying software-defined networking (SDN) tools. The authors develop a new design that deterministically classifies real-time protocol (RTP) streams based on data ...
Dalibor Zeman +3 more
doaj +1 more source
Research on Session Initiation Protocol Identification Based on Principal Component Analysis and Learning Vector Quantization [PDF]
The encrypted Session Initiation Protocol(SIP) is difficult to identify and there is less related research,which makes the intrusion detection and the network traffic monitoring inconvenient.Aiming at these problems,this paper proposes a SIP ...
LI Jindong,WANG Tao,WU Yang,LEI Dong
doaj +1 more source
High Load Control Mechanism for SIP Servers [PDF]
To start voice, image, instant messaging, and generally multimedia communication, session communication must begin between two participants. SIP (session initiation protocol) that is an application layer control induces management and terminates this ...
Budiarto, Rahmat +3 more
core +4 more sources
Telephony Denial of Service Defense at Data Plane (TDoSD@DP) [PDF]
The Session Initiation Protocol (SIP) is an application-layer control protocol used to establish and terminate calls that are deployed globally. A flood of SIP INVITE packets sent by an attacker causes a Telephony Denial of Service (TDoS) incident ...
Febro, Aldo +2 more
core +2 more sources

