Search Results 1-1 of 1

  • SIP Flooding Attack Detection Using a Trust Model and Statistical Algorithms

    Chaisamran Noppawat , Okuda Takeshi , Kadobayashi Youki , Yamaguchi Suguru

    … The IP Multimedia Subsystem (IMS) has been constantly evolving to meet the tremendous rise in popularity of mobile services and Internet applications. … Since IMS uses Session Initiation Protocol as the main protocol to control a signal, it inherits numerous known security vulnerabilities. … One of the most severe issues is the Denial of Service attack. …

    Journal of information processing 22(2), 118-129, 2014-04-15

    IPSJ  J-STAGE 

Page Top