1 |
Hemant Sengar , Ram Dantu , et al. SS7 over IP: signaling interworking vulnerabilities. IEEE Network, 2006,20(6): 32~41.
|
2 |
Hemant Sengar . Securing VoIP and PSTN from integrated signaling network vulnerabilities. VoIP Management and Security.In:1st IEEE Workshop on Vancouver , Canada, Piscataway, New Jersey, USA 2006
|
3 |
The voice over IP security alliance VOIPSA . VoIP Security and Privacy Threat Taxonomy-Public Release 1.0 , October2006
|
4 |
Al-Allouni H , Rohiem A E , Hashem M , El-moghazy , et al. VoIP denial of service attacks classification and implementation In:Radio Science Conference, 2009
|
5 |
Bremler-Barr A , Halachmi-Beke R , Kangasharju J , Unregister attacks in SIP 2nd IEEE Workshop on Secure Network Protocols, 2006
|
6 |
Thomas Karagiannis , Roido A , Aloutsos M , et al. Transport layer identification of P2P traffic In: Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, Taormina, Italy, 2004
|
7 |
Thomas T . Signaling system 7(SS7)network security In:Proceedings of the IEEE 45th Midwest Symposium on Circuits and Systems, Aug2004
|
8 |
Sengar H , Wijesekera D , Jajodia S . MTPSec: customizable secure MTP3 tunnels in the SS7 network In: Proceedings of the 19th IEEE Internationl Parallel and Distributed Processing Symposium,Colorado,, 2005
|
9 |
黄瑛 . 电信网络安全现状浅析. 现代商业, 2009(24): 232~232
|
10 |
傅华, 杨义先 . 七号信令网上的攻击与防范. 信息网络安全, 2003(3): 48~50
|
11 |
Hemant Sengar , Haining Wang , etal. Detecting VoIP floods using the hellinger distance. IEEE Transactions on Parallel and Distributed Systems, 2008,19(6)
|
12 |
Muhammad Sher , Thomas Magedanz . Protecting IP multimedia subsystem(IMS)service delivery platform from time independent attacks. In:Information Assurance and Security, Third International Symposium, Aug2008
|
13 |
Walsh T J , Kuhn D R . Challenges in securing voice over IP. In IEEE Security & Privacy, June2005
|
14 |
傅华, 李志蜀, 袁小玲 . 分布式拒绝服务攻击及防范研究. 计算机应用研究, 2006,23(8): 136~151
|
15 |
Savage S , Wetherall D , Karlin A . Network support for IP traceback. IEEE/ACM Transactions on Networking, 2001,9(3): 226~237
|
16 |
Feinstein L , Schnackenberg D , Balupari R , et al. Statistical approaches to DDoS attack detection and reponse. In:Proceedings of the DARPA Information Survivability Conference and Exposition, Washington 2003
|
17 |
Mirkovic J , Prier G , Reiher P L . Attacking DDoS at the source. In:Proceedings of the 10th IEEE International Conference on Network Protocols, Paris 2002
|
18 |
Cabrera J B D , Lewis L , Qin X , et al. Proactive detection of distributed denial of service attacks using MIB traffic variables a feasibility study. In: Proceeding of the IEEE/IFIP International Symposium on Integrated Network Management, Seattle, WA, USA, 2001
|
19 |
Bolotin V A . Telephone circuit holding time distributions. In:Proceeding of 14th Int Teletraffic Cong, Antibes, France, North-Holland 1994
|
20 |
Barcel O F , Jord A N J . Channel holding time distribution in public telephony system(PAMR and PCS) IEEE Trans On vehicular Technology, 2000,49(5)
|
21 |
Jedrzycki C C , Leung V C M . Probaility distribution of channel holding time in cellular telephony systems. In:IEEE Vehicular Technology Conference VTC'96, 1996
|
22 |
Jin Cao , Cleveland W S , Yuan Gao , et al. Stochastic models for generating synthetic HTTP source traffic. In: Proceedings of IEEE INFOCOM, Hong Kong, China, March2001
|