{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:09:08Z","timestamp":1743106148762,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642154966"},{"type":"electronic","value":"9783642154973"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15497-3_40","type":"book-chapter","created":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T14:51:46Z","timestamp":1283352706000},"page":"663-678","source":"Crossref","is-referenced-by-count":4,"title":["D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks"],"prefix":"10.1007","author":[{"given":"Alexandros","family":"Kapravelos","sequence":"first","affiliation":[]},{"given":"Iasonas","family":"Polakis","sequence":"additional","affiliation":[]},{"given":"Elias","family":"Athanasopoulos","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[]},{"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Ebay Inc. FQ, results (2008), http:\/\/investor.ebay.com\/results.cfm","DOI":"10.3833\/pdr.v2008i92.217"},{"key":"40_CR2","unstructured":"IDC Predicts more than 1.8 billion Worldwide Personal IP Communications Subscribers by 2013, http:\/\/www.idc.com\/getdoc.jsp?containerId=219742"},{"key":"40_CR3","unstructured":"Skype Fast Facts, Q4 2008, http:\/\/ebayinkblog.com\/wp-content\/uploads\/2009\/01\/skype-fast-facts-q4-08.pdf"},{"key":"40_CR4","unstructured":"Snortsam, http:\/\/www.snortsam.net"},{"key":"40_CR5","unstructured":"Statistics of Communications Common Carriers 2005\/2006 Edition, http:\/\/hraunfoss.fcc.gov\/edocs_public\/attachmatch\/DOC-282813A1.pdf"},{"key":"40_CR6","unstructured":"Thieves Flood Victims Phone With Calls to Loot Bank Accounts, http:\/\/www.wired.com\/threatlevel\/2010\/05\/telephony-dos\/"},{"key":"40_CR7","unstructured":"Voipdiscount, http:\/\/www.voipdiscount.com"},{"key":"40_CR8","unstructured":"Voipuser.org, http:\/\/www.voipuser.org"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Aschenbruck, N., Frank, M., Martini, P., Tolle, J., Legat, R., Richmann, H.: Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks. In: Proceedings of International Workshop on Information Assurance (2006)","DOI":"10.1109\/IWIA.2006.19"},{"issue":"469","key":"40_CR10","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1198\/016214504000001808","volume":"100","author":"L. Brown","year":"2005","unstructured":"Brown, L., Gans, N., Mandelbaum, A., Sakov, A., Shen, H., Zeltyn, S., Zhao, L.: Statistical analysis of a telephone call center. Journal of the American Statistical Association\u00a0100(469), 36\u201350 (2005)","journal-title":"Journal of the American Statistical Association"},{"key":"40_CR11","volume-title":"Proceedings of The IFIP International Information Security Conference","author":"S. Dritsas","year":"2008","unstructured":"Dritsas, S., Soupionis, Y., Theoharidou, M., Mallios, Y., Gritzalis, D.: SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned. In: Proceedings of The IFIP International Information Security Conference, Springer, Heidelberg (2008)"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"Enck, W., Traynor, P., McDaniel, P., Porta, T.L.: Exploiting Open Functionality in SMS Capable Cellular Networks. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005), Alexandria, Virginia, USA (2005)","DOI":"10.1145\/1102120.1102171"},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Floyd, S., Jacobson, V.: Random early detection gateways for congestion avoidance. IEEE\/ACM Transactions on Networking (1993)","DOI":"10.1109\/90.251892"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Fuchs, C., Aschenbruck, N., Leder, F., Martini, P.: Detecting VoIP based DoS attacks at the public safety answering point. In: ASIACCS (2008)","DOI":"10.1145\/1368310.1368333"},{"key":"40_CR15","unstructured":"Keromytis, A.D.: A Look at VoIP Vulnerabilities. USENIX; login: Magazine\u00a035(1) (February 2010)"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Kohler, E., Morris, R., Chen, B., Jannotti, J., Kaashoek, M.F.: The click modular router. ACM Transactions on Computer Systems (2000)","DOI":"10.1145\/319151.319166"},{"key":"40_CR17","unstructured":"Mathieu, B., Gourhant, Y., Loudier, Q.: SPIT mitigation by a network level Anti-SPIT entity. In: Proc. of the 3rd Annual VoIP Security Workshop (2006)"},{"key":"40_CR18","unstructured":"Roesch, M.: Snort - lightweight intrusion detection for networks. In: LISA 1999: Proceedings of the 13th USENIX Conference on System Administration. USENIX Association (1999)"},{"key":"40_CR19","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. RFC 3261 (Proposed Standard), Updated by RFCs 3265, 3853, 4320, 4916 (2002)","DOI":"10.17487\/rfc3261"},{"key":"40_CR20","doi-asserted-by":"crossref","unstructured":"Traynor, P., Enck, W., McDaniel, P., Porta, T.L.: Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks. In: 12th Annual International Conference on Mobile Computing and Networking (2006)","DOI":"10.1145\/1161089.1161111"},{"key":"40_CR21","unstructured":"Traynor, P., Mcdaniel, P., Porta, T.L.: On attack causality in internet-connected cellular networks. In: USENIX Security Symposium (2007)"},{"key":"40_CR22","series-title":"Lecture Notes in Computer Science","volume-title":"CAPTCHA: Using Hard AI Problems for Security","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. LNCS. Springer, Heidelberg (2003)"},{"key":"40_CR23","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, S., Jajodia, S.: Tracking anonymous peer-to-peer VoIP calls on the internet. In: CCS 2005: Proceedings of the 12th ACM conference on Computer and Communications Security (2005)","DOI":"10.1145\/1102120.1102133"},{"key":"40_CR24","unstructured":"Wright, C.V., Ballard, L., Monrose, F., Masson, G.M.: Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In: SS 2007: Proceedings of the 16th USENIX Security Symposium. USENIX Association, Berkeley (2007)"},{"key":"40_CR25","unstructured":"Zhang, R., Wang, X., Yang, X., Jiang, X.: Billing attacks on SIP-based VoIP systems. In: WOOT 2007: Proceedings of the First USENIX Workshop On Offensive Technologies"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2010"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15497-3_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T03:16:04Z","timestamp":1685762164000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15497-3_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642154966","9783642154973"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15497-3_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}