Review of SIP based DoS attacks
The Voice over Internet Protocol (VoIP). The VoIP is relatively new and is gaining more and more popularity as it offers a wide range of features and is much more cost effective as compared to the traditional PSTN. But the VoIP brings with it certain security threats which need to be resolved in o...
| Main Authors: | Jama, Abdirisaq M., Khalifa, Othman Omran |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
ATS (Association of Technology and Science, India)
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/54044/ http://irep.iium.edu.my/54044/1/Review%20of%20SIP%20based%20DoS%20attacks.pdf |
Similar Items
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
Security against DoS attack in mobile IP communication
by: Parvin, S., et al.
Published: (2009)
by: Parvin, S., et al.
Published: (2009)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Towards DoS attack prevention based on clustering architecture in mobile IP communication
by: Parvin, S., et al.
Published: (2009)
by: Parvin, S., et al.
Published: (2009)
Application of Artificial Neural Network in Detection of DOS Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
by: Mina, Malekzadeh, et al.
Published: (2011)
by: Mina, Malekzadeh, et al.
Published: (2011)
Video transmission over wireless networks review and recent advances
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2015)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2015)
Real-time MPEG-4 transmission over wireless LAN
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011)
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011)
An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2008)
by: Malekzadeh, Mina, et al.
Published: (2008)
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Identifying DOS attacks using data pattern analysis
by: Salem, Mohammed, et al.
Published: (2008)
by: Salem, Mohammed, et al.
Published: (2008)
Design and implementation of a lightweight security model to prevent IEEE 802.11 wireless DoS attacks.
by: Malekzadeh, Mina, et al.
Published: (2011)
by: Malekzadeh, Mina, et al.
Published: (2011)
SIP mediated services
by: Reid, G., et al.
Published: (2007)
by: Reid, G., et al.
Published: (2007)
Video transmission over an enhancement approach of
IEEE802.11e
by: Jama, Abdirisaq Mohammed, et al.
Published: (2015)
by: Jama, Abdirisaq Mohammed, et al.
Published: (2015)
Analysis of real time video traffic for enhanced distributed channel access over WLAN
by: Jama, Abdirisaq Mohammed, et al.
Published: (2013)
by: Jama, Abdirisaq Mohammed, et al.
Published: (2013)
Low cost softswitch using SIP protocol
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2009)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2009)
Comparative study based on DOS ATTACK at network layer in wired and wireless network / Norfarina Nordin
by: Nordin, Norfarina
Published: (2020)
by: Nordin, Norfarina
Published: (2020)
SIP bantu membina hidup
by: Mohd Khalid, Mohammad Khairil Ashraf
Published: (2023)
by: Mohd Khalid, Mohammad Khairil Ashraf
Published: (2023)
SIP-based proactive and adaptive mobility management framework for heterogeneous networks
by: YEE, Y, et al.
Published: (2008)
by: YEE, Y, et al.
Published: (2008)
SIP-based proactive and adaptive mobility management framework for heterogeneous networks
by: YEE, Y, et al.
Published: (2008)
by: YEE, Y, et al.
Published: (2008)
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Take a sip of the future with pepsi black
by: New Straits Times
Published: (2018)
by: New Straits Times
Published: (2018)
SIP-based IEEE802.21 media independent handover — a BT Intel collaboration
by: Choong, K. N., et al.
Published: (2007)
by: Choong, K. N., et al.
Published: (2007)
Early Adolescent Alcohol Use: Are Sipping and Drinking Distinct?
by: Wadolowski, M., et al.
Published: (2015)
by: Wadolowski, M., et al.
Published: (2015)
Sip N Bite cafe / Amirul Nadim Ruslan
by: Amirul Nadim, Ruslan
Published: (2020)
by: Amirul Nadim, Ruslan
Published: (2020)
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table
by: Jaber, Aws Naser
Published: (2013)
by: Jaber, Aws Naser
Published: (2013)
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Tree planting by UPMKB, agencies at sip to restore degraded areas
by: The Borneo Post Sarawak
Published: (2023)
by: The Borneo Post Sarawak
Published: (2023)
Sipping, Drinking, and Early Adolescent Alcohol Consumption: A Cautionary Note
by: Wadolowski, M., et al.
Published: (2015)
by: Wadolowski, M., et al.
Published: (2015)
An attack proof intelligent digital watermarking based on safe region of fast fourier transform
by: Olanrewaju, Rashidah Funke, et al.
Published: (2010)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2010)
The dos and don'ts during thunderstorms
by: The Star
Published: (2019)
by: The Star
Published: (2019)
Pakar saran dos pertama vaksin
by: Berita Harian
Published: (2021)
by: Berita Harian
Published: (2021)
Kita perlukan dos penggalak kedua
by: Khairul, Alwani Zafirah
Published: (2022)
by: Khairul, Alwani Zafirah
Published: (2022)
SIP in China How Privatization Affect Firm Financial and Operating Performance?
by: Wang, Yu
Published: (2004)
by: Wang, Yu
Published: (2004)
RD-Optimisation analysis for H.264/AVC scalable video coding
by: Issa, Sinzobakwira, et al.
Published: (2010)
by: Issa, Sinzobakwira, et al.
Published: (2010)
Performance evaluation of MPEG-4 video transmission over IEEE802.11e
by: Mohammed Jama, Abdi Risaq, et al.
Published: (2010)
by: Mohammed Jama, Abdi Risaq, et al.
Published: (2010)
Vision-Based Road Detection for Autonomous Intelligent
Vehicle
by: Khalifa, Othman Omran
Published: (2015)
by: Khalifa, Othman Omran
Published: (2015)
Similar Items
-
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015) -
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014) -
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018) -
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017) -
Security against DoS attack in mobile IP communication
by: Parvin, S., et al.
Published: (2009)