{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:25:38Z","timestamp":1725701138708},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642326851"},{"type":"electronic","value":"9783642326868"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32686-8_33","type":"book-chapter","created":{"date-parts":[[2012,8,22]],"date-time":"2012-08-22T02:57:34Z","timestamp":1345604254000},"page":"359-370","source":"Crossref","is-referenced-by-count":0,"title":["Stop the Flood \u2013 Perimeter Security- and Overload- Pre-evaluation in Carrier Grade VoIP Infrastructures"],"prefix":"10.1007","author":[{"given":"Michael","family":"Hirschbichler","sequence":"first","affiliation":[]},{"given":"Joachim","family":"Fabini","sequence":"additional","affiliation":[]},{"given":"Bernhard","family":"Seifert","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Egger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"ETSI. NGN Congestion and Overload Control; Part 4: Overload and Congestion Control for H.248 MG\/MGC. ES 283 039-4, Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN) (April 2007)"},{"key":"33_CR2","unstructured":"Gurbani, V., Hilt, V., Schulzrinne, H.: Session Initiation Protocol (SIP) Overload Control. Internet-Draft draft-ietf-soc-overload-control-07, Internet Engineering Task Force (January 2012) (work in progress)"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Hautakorpi, J., Camarillo, G., Penfield, R., Hawrylyshen, A., Bhatia, M.: Requirements from Session Initiation Protocol (SIP) Session Border Control (SBC) Deployments. RFC 5853, Internet Engineering Task Force (April 2010)","DOI":"10.17487\/rfc5853"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Hilt, V., Noel, E., Shen, C., Abdelal, A.: Design Considerations for Session Initiation Protocol (SIP) Overload Control. RFC 6357, Internet Engineering Task Force (August 2011)","DOI":"10.17487\/rfc6357"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Hirschbichler, M., Egger, C., Pasteka, O., Berger, A.: Using E-Mail SPAM DNS Blacklists for Qualifying the SPAM-over-Internet-Telephony Probability of a SIP Call. In: Third International Conference on Digital Society, ICDS 2009, pp. 254\u2013259 (February 2009)","DOI":"10.1109\/ICDS.2009.20"},{"key":"33_CR6","unstructured":"Noel, E., Johnson, C.R.: Novel overload controls for SIP networks. In: 21st International Teletraffic Congress, ITC 21 2009, pp. 1\u20138 (September 2009)"},{"key":"33_CR7","unstructured":"Noel, E., PhilipWilliams, P.: Session Initiation Protocol (SIP) Rate Control. Internet-Draft draft-noel-soc-overload-rate-control-02, Internet Engineering Task Force (December 2011) (work in progress)"},{"key":"33_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-89054-6_6","volume-title":"Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks","author":"G. Ormazabal","year":"2008","unstructured":"Ormazabal, G., Nagpal, S., Yardeni, E., Schulzrinne, H.: Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems. In: Schulzrinne, H., State, R., Niccolini, S. (eds.) IPTComm 2008. LNCS, vol.\u00a05310, pp. 107\u2013132. Springer, Heidelberg (2008)"},{"key":"33_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-540-73530-4_9","volume-title":"Dependable and Adaptable Networks and Services","author":"V.M. Quinten","year":"2007","unstructured":"Quinten, V.M., van de Meent, R., Pras, A.: Analysis of Techniques for Protection Against Spam over Internet Telephony. In: Pras, A., van Sinderen, M. (eds.) EUNICE 2007. LNCS, vol.\u00a04606, pp. 70\u201377. Springer, Heidelberg (2007)"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Rosenberg, J.: Requirements for Management of Overload in the Session Initiation Protocol. RFC 5390, Internet Engineering Task Force (December 2008)","DOI":"10.17487\/rfc5390"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Jennings, C.: The Session Initiation Protocol (SIP) and Spam. RFC 5039, Internet Engineering Task Force (January 2008)","DOI":"10.17487\/rfc5039"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. RFC 3261, Internet Engineering Task Force (June 2002)","DOI":"10.17487\/rfc3261"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Polk, J.: Communications Resource Priority for the Session Initiation Protocol (SIP). RFC 4412, Internet Engineering Task Force (February 2006)","DOI":"10.17487\/rfc4412"},{"issue":"6","key":"33_CR14","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1109\/TPDS.2007.70786","volume":"19","author":"H. Sengar","year":"2008","unstructured":"Sengar, H., Wang, H., Wijesekera, D., Jajodia, S.: Detecting VOIP floods using the hellinger distance. IEEE Transactions on Parallel and Distributed Systems\u00a019(6), 794\u2013805 (2008)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Tang, J., Cheng, Y.: Quick detection of stealthy SIP flooding attacks in VOIP networks. In: 2011 IEEE International Conference on Communications (ICC), pp. 1\u20135 (June 2011)","DOI":"10.1109\/icc.2011.5963248"},{"key":"33_CR16","unstructured":"Wing, D., Niccolini, S., Stiemerling, M., Tschofenig, H.: Spam Score for SIP. Internet-Draft draft-wing-sipping-spam-score-02, Internet Engineering Task Force (February 2008) (work in progress)"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32686-8_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:11:47Z","timestamp":1620130307000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32686-8_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642326851","9783642326868"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32686-8_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}