[1] Huici F, Niccolini S, d'Heureuse N. Protecting SIP against very large flooding DoS attacks [C]//Proceedings of the IEEE Global Telecommunications Conference. USA: IEEE Communications Society, 2009: 1-6.[2] Wang Yulong, Yang Yi. A practical method for SIP-DoS attack effect evaluation [J]. Journal of Information and Computational Science, 2012, 9(2): 333-345.[3] 王玉龙, 杨鸿飞, 杨逸. IMS 网络中畸形SIP信令的快速检测[J]. 北京邮电大学学报, 2011, 34(6): 51-54. Wang Yulong, Yang Hongfei, Yangyi. Fast detection of malformed SIP signaling in IMS network [J]. Journal of Beijing University of Posts and Telecommunications, 2011, 34(6): 51-54.[4] Wang Yulong, Wang Dong, Wang Lei. A parsing mode based method for malformed SIP messages testing for IMS network [J]. Jounal of Networks, 2013: 8(4): 812-821.[5] Christian Wieser, Marko Laakso. PROTOS Test-Suite: c07-sip [EB/OL]. Finland: University of OULU [2013-12-14]. https://www.ee.oulu.fi/research/ouspg/PROTOS_Test-Suite_c07-sip.[6] Abdelnur H, Radu S, Festor O. KiF: a stateful SIP fuzzer [C]//Proceedings of the 1st International Conference on Principles, Systems and Applications of IP Telecommunications. USA: ACM, 2007: 47-56. |