{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:37:33Z","timestamp":1725892653236},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642365157"},{"type":"electronic","value":"9783642365164"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36516-4_19","type":"book-chapter","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T13:11:01Z","timestamp":1363180261000},"page":"187-197","source":"Crossref","is-referenced-by-count":2,"title":["Characteristics of Real Open SIP-Server Traffic"],"prefix":"10.1007","author":[{"given":"Jan","family":"Stanek","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lukas","family":"Kencl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiri","family":"Kuthan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Handley et. al. Sip: Session initiation protocol (rfc 2543), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc2543.txt"},{"key":"19_CR2","unstructured":"Rosenberg et. al. Sip: Session initiation protocol (rfc 3261), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc3261.txt"},{"key":"19_CR3","unstructured":"Rosenberg, J., et al.: Session traversal utilities for nat (stun), \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc5389"},{"key":"19_CR4","unstructured":"Mahy, R., et al.: Traversal using relays around nat (turn): Relay extensions to session traversal utilities for nat (stun), \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc5766"},{"key":"19_CR5","unstructured":"Rosenberg, J.: Ice: A protocol for network address translator traversal for offer\/answer protocols, \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc5245"},{"issue":"2","key":"19_CR6","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/1229899.1229909","volume":"5","author":"R. Sparks","year":"2007","unstructured":"Sparks, R.: Sip: Basics and beyond. Queue\u00a05(2), 22\u201333 (2007)","journal-title":"Queue"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Prasad, J.K., Kumar, B.A.: Analysis of sip and realization of advanced ip-pbx features. In: ICECT 2011, vol.\u00a06, pp. 218\u2013222 (April 2011)","DOI":"10.1109\/ICECTECH.2011.5942085"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Yeryomin, Y., Evers, F., Seitz, J.: Solving the firewall and nat traversal issues for sip-based voip. In: ICT 2008, pp. 1\u20136 (June 2008)","DOI":"10.1109\/ICTEL.2008.4652645"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Song, M., Chi, J., Pi, R., Song, J.: Implementing an express sip nat traversal server. In: ICPCA 2007, pp. 527\u2013529 (July 2007)","DOI":"10.1109\/ICPCA.2007.4365500"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Heo, J., Chen, E.Y., Kusumoto, T., Itoh, M.: Statistical sip traffic modeling and analysis system. In: ISCIT, pp. 1223 \u20131228 (2010)","DOI":"10.1109\/ISCIT.2010.5665175"},{"issue":"3","key":"19_CR11","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1002\/bltj.20048","volume":"9","author":"M. Cortes","year":"2004","unstructured":"Cortes, M., Ensor, J.R., Esteban, J.O.: On sip performance. Bell Labs Technical Journal\u00a09(3), 155\u2013172 (2004)","journal-title":"Bell Labs Technical Journal"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Kang, H.J., Zhang, Z.-L., Ranjan, S., Nucci, A.: Sip-based voip traffic behavior profiling and its applications. In: MineNet 2007, pp. 39\u201344 (2007)","DOI":"10.1145\/1269880.1269891"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Ehlert, S., Wang, C., Magedanz, T., Sisalem, D.: Specification-based denial-of-service detection for sip voice-over-ip networks. In: Internet Monitoring and Protection, ICIMP 2008, June 29 -July 5, pp. 59\u201366 (2008)","DOI":"10.1109\/ICIMP.2008.14"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-540-87403-4_17","volume-title":"Recent Advances in Intrusion Detection","author":"M. Nassar","year":"2008","unstructured":"Nassar, M., State, R., Festor, O.: Monitoring SIP Traffic Using Support Vector Machines. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 311\u2013330. Springer, Heidelberg (2008)"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Hentehzadeh, N., et al.: Statistical analysis of self-similar session initiation protocol (sip) messages for anomaly detection. In: 2011 4th IFIP Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20135 (February 2011)","DOI":"10.1109\/NTMS.2011.5720662"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Ali Akbar, M., Farooq, M.: Application of evolutionary algorithms in detection of sip based flooding attacks. In: GECCO 2009 (2009)","DOI":"10.1145\/1569901.1570092"},{"issue":"5","key":"19_CR17","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MNET.2006.1705880","volume":"20","author":"D. Sisalem","year":"2006","unstructured":"Sisalem, D., Kuthan, J., Ehlert, S.: Denial of service attacks targeting a sip voip infrastructure: attack scenarios and prevention mechanisms. IEEE Network\u00a020(5), 26\u201331 (2006)","journal-title":"IEEE Network"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Andel, L., Kuthan, J., Sisalem, D.: Distributed media server architecture for sip using ip anycast. In: IPTComm 2009, pp. 5:1\u20135:11 (2009)","DOI":"10.1145\/1595637.1595644"},{"key":"19_CR19","unstructured":"Community of developers. The sip router project (developed from openser), \n                    \n                      http:\/\/sip-router.org\/"},{"key":"19_CR20","unstructured":"Van Jacobson, Leres, C., McCanne, S., many later contributors: Tcpdump: Commandline packet analyzer, \n                    \n                      http:\/\/www.tcpdump.org\/"},{"key":"19_CR21","unstructured":"Combs, G., contributors: Wireshark - network protocol analyzer, \n                    \n                      http:\/\/www.wireshark.org"},{"key":"19_CR22","unstructured":"WEBNet77. Ip to country multi-lookup tool, \n                    \n                      http:\/\/software77.net\/geo-ip\/multi-lookup\/"},{"key":"19_CR23","unstructured":"ACM SIGCOMM partners. The internet traffic archive, \n                    \n                      http:\/\/ita.ee.lbl.gov\/html\/traces.html"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36516-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T19:08:33Z","timestamp":1557601713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36516-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642365157","9783642365164"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36516-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}