{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T21:31:40Z","timestamp":1771191100370,"version":"3.50.1"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319075686","type":"print"},{"value":"9783319075693","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07569-3_15","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T14:15:55Z","timestamp":1400595355000},"page":"182-192","source":"Crossref","is-referenced-by-count":3,"title":["Creating Covert Channel Using SIP"],"prefix":"10.1007","author":[{"given":"Miralem","family":"Mehi\u0107","sequence":"first","affiliation":[]},{"given":"Martin","family":"Mikulec","sequence":"additional","affiliation":[]},{"given":"Miroslav","family":"Voznak","sequence":"additional","affiliation":[]},{"given":"Lukas","family":"Kapicak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Zander, S., Armitage, G., Branch, P.: A Survey of Covert Channels and Countermeasures in Computer Network Protocols. IEEE Communications Surveys & Tutorials\u00a09(3), 44\u201357 (2007) (cited on page 7)","DOI":"10.1109\/COMST.2007.4317620"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1007\/978-3-540-88873-4_6","volume-title":"On the Move to Meaningful Internet Systems: OTM 2008","author":"W. Mazurczyk","year":"2008","unstructured":"Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP Streams. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol.\u00a05332, pp. 1001\u20131018. Springer, Heidelberg (2008)"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Janicki, A., Mazurczyk, W., Szczypiorski, K.: Steganalysis of transcoding steganography. Ann. Telecommun., doi:10.1007\/s12243-013-0385-4","DOI":"10.1007\/s12243-013-0385-4"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/11875567_13","volume-title":"Computer Safety, Reliability, and Security","author":"W. Mazurczyk","year":"2006","unstructured":"Mazurczyk, W., Kotulski, Z.: New VoIP Traffic Security Scheme with Digital Watermarking. In: G\u00f3rski, J. (ed.) SAFECOMP 2006. LNCS, vol.\u00a04166, pp. 170\u2013181. Springer, Heidelberg (2006)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. Multimed. Tools Appl., doi:10.1007\/s11042-012-1224-8","DOI":"10.1007\/s11042-012-1224-8"},{"key":"15_CR6","unstructured":"Anonymous, DNS Covert Channels and Bouncing Techniques (2005), \n                  \n                    http:\/\/www.archives.neohapsis.com\/archives\/fulldisclosure\/2005-07\/att-0472\/p63_dns_worm_covert_channel.txt"},{"key":"15_CR7","unstructured":"Berk, V., Giani, A., Cybenko, G.: Detection of covert channel encoding in network packet delays (Tech. Rep. TR2005-536). Department of Computer Science, Dartmouth College (November 2005)"},{"key":"15_CR8","unstructured":"Szczypiorski, K.: HICCUPS: Hidden Communication System for Corrupted Networks. In Proc. of ACS 2003, Mi\u0119dzyzdroje, Poland, October 22-24, 2003, pp. 31\u201340 (2003) 23."},{"issue":"2","key":"15_CR9","first-page":"1113","volume":"52","author":"W. Mazurczyk","year":"2013","unstructured":"Mazurczyk, W., Smolarczyk, M., Szczypiorski, K.: Hiding Information in Retransmissions. Telecommunication Systems\u00a052(2), 1113\u20131121 (2013)","journal-title":"Telecommunication Systems"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Kulin, M., Kazaz, T., Mrdovi\u0107, S.: SIP Server Security with TLS: Relative Performance, Evaluation. In: 2012 IX International Symposium on Telecommunications (BIHTEL). Fac. of Electr. Eng., Univ. of Sarajevo, Sarajevo, Bosnia-Herzegovina, pp. 1\u20136. IEEE (2012)","DOI":"10.1109\/BIHTEL.2012.6412062"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Tang, J., Cheng, Y., Hao, Y.: Detection and prevention of SIP flooding attacks in voice over IP networks. In: 2012 Proceedings IEEE INFOCOM. IEEE (2012)","DOI":"10.1109\/INFCOM.2012.6195475"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Tang, J., Cheng, Y.: Quick detection of stealthy sip flooding attacks in voip networks. In: 2011 IEEE International Conference on Communications (ICC), pp. 1\u20135. IEEE (June 2011)","DOI":"10.1109\/icc.2011.5963248"},{"key":"15_CR13","unstructured":"US Department of Defense \u2013 Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD (The Orange Book) (1985)"},{"key":"15_CR14","unstructured":"Session Initiation Protocol (SIP) Parameters, \n                  \n                    http:\/\/iana.org\/assignments\/sip-parameters\/sip-parameters.xhtml"},{"key":"15_CR15","unstructured":"[RFC3261][RFC3427][RFC5727]"},{"key":"15_CR16","unstructured":"SDP: Session Description Protocol, \n                  \n                    http:\/\/ietf.org\/rfc\/rfc2327.txt"},{"key":"15_CR17","unstructured":"Snort.AD - Snort(tm) preprocessor based on traffic anomalies detection, \n                  \n                    http:\/\/anomalydetection.info"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Szmit, M., Adamus, S., Bugala, S., Szmit, A.: Implementation of Brutlag\u2019s algorithm in Anomaly Detection 3.0. In: FedCSIS, pp. 685\u2013691 (September 2012)","DOI":"10.1155\/2012\/192913"},{"key":"15_CR19","unstructured":"The R Project for Statistical Computing, \n                  \n                    http:\/\/r-project.org"},{"key":"15_CR20","unstructured":"Szmit, M., Szmit, A.: Usage of Modified Holt-Winters Method in The Anomaly Detection of Network Traffic. Case Studies. Journal of Computer Networks and Communication (article in press)"},{"key":"15_CR21","unstructured":"Brutlag, J.D.: Aberrant Behavior Detection in Time Series for Network Monitoring. In: 14th System Administration Conference Proceedings, New Orleans, pp. 139\u2013146 (2000)"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Szmit, M., Szmit, A., Bugala, S.: Usage of Holt-Winters Model and Multilayer Perceptron in Network Traffic Modelling and Anomaly Detection. Informatica (03505596) 36(4) (2012)","DOI":"10.1155\/2012\/192913"},{"key":"15_CR23","unstructured":"Digium\/Asterisk JIRA \u2013 Asterisk Issues, \n                  \n                    http:\/\/issues.asterisk.org\/jira\/browse\/ASTERISK-8320"},{"key":"15_CR24","unstructured":"Open Source SIP Server, \n                  \n                    http:\/\/www.kamailio.org\/w"}],"container-title":["Communications in Computer and Information Science","Multimedia Communications, Services and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07569-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T21:40:45Z","timestamp":1558906845000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07569-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319075686","9783319075693"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07569-3_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}