Sciweavers

49 search results - page 1 / 10
» Intrusion detection mechanisms for VoIP applications
Sort
View
CORR
2006
Springer
117views Education» more  CORR 2006»
13 years 4 months ago
Intrusion detection mechanisms for VoIP applications
Mohamed El Baker Nassar, Radu State, Olivier Festo...
IFIP
2010
Springer
13 years 2 months ago
Labeled VoIP Data-Set for Intrusion Detection Evaluation
Abstract. VoIP has become a major application of multimedia communications over IP. Many initiatives around the world focus on the detection of attacks against VoIP services and in...
Mohamed Nassar, Radu State, Olivier Festor
DSN
2006
IEEE
13 years 11 months ago
VoIP Intrusion Detection Through Interacting Protocol State Machines
Being a fast-growing Internet application, Voice over Internet Protocol (VoIP) shares the network resources with the regular Internet traffic, and is susceptible to the existing ...
Hemant Sengar, Duminda Wijesekera, Haining Wang, S...
ICETE
2004
253views Business» more  ICETE 2004»
13 years 6 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
WETICE
2007
IEEE
13 years 11 months ago
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT...
Chun-Ming Leung, Yuen-Yan Chan