[1] Niccolini S, Garroppo R G, Giordano S, et al. SIP intrusion detection and prevention: recommendations and prototype implementation [C]//1st IEEE Workshop on VoIP Management and Security. USA: IEEE Computer Society, 2006: 47-52.[2] Yacine B, Christophe M. Aframework for detecting anomalies in VoIP networks [C]//Proceeding ARES'08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security. USA: IEEE Computer Society, 2008: 204-211.[3] Geneiatakis D, Kambourakis G, Lambrinoudakis C, et al. A framework for protecting a SIP-based infrastructure against malformed message attacks[J]. Computer Networks, 2007, 51(10): 2580-2593.[4] Rieck K, Wahl S, Laskov P, et al. A self-learning system for detection of anomalous SIP messages [C]//2rd Principles, Systems and Applications of IP Telecommunications. Germany: Springer-Verlag, 2008: 90-106.[5] Li Hongbin, Lin Hu, Lü Xin, et al. A rules-based intrusion detection and prevention framework against SIP malformed messages attacks [C]//3rd IEEE International Conference on Broadband Network and Multimedia Technology. New Jersey: IEEE Press, 2010: 700-705.[6] 王玉龙, 杨鸿飞, 杨逸. IMS网络中畸形SIP信令的快速检测[J]. 北京邮电大学学报, 2011, 34(6): 51-54. Wang Yulong, Yang Hongfei, Yangyi. Fast detection of malformed SIP signaling in IMS network [J]. Journal of Beijing University of Posts and Telecommunications, 2011, 34(6): 51-54. |