{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:21:14Z","timestamp":1740108074910,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2017,2,21]],"date-time":"2017-02-21T00:00:00Z","timestamp":1487635200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Deanship of Scientific Research, Prince Sattam Bin Abdulaziz University, Al-Karj, KSA, under the research project","award":["2015\/01\/4128"],"award-info":[{"award-number":["2015\/01\/4128"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s00521-017-2886-y","type":"journal-article","created":{"date-parts":[[2017,2,21]],"date-time":"2017-02-21T00:51:50Z","timestamp":1487638310000},"page":"2873-2881","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Performance evaluation of framework of VoIP\/SIP server under virtualization environment along with the most common security threats"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9152-3242","authenticated-orcid":false,"given":"Manjur","family":"Kolhar","sequence":"first","affiliation":[]},{"given":"Abdalla","family":"Alameen","sequence":"additional","affiliation":[]},{"given":"Mujthaba","family":"Gulam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,21]]},"reference":[{"issue":"2","key":"2886_CR1","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MIC.2012.144","volume":"17","author":"D Drutskoy","year":"2013","unstructured":"Drutskoy D, Keller E, Rexford J (2013) Scalable network virtualization in software-defined networks. IEEE Internet Comput 17(2):20\u201327","journal-title":"IEEE Internet Comput"},{"key":"2886_CR2","doi-asserted-by":"crossref","unstructured":"Barker SK, Shenoy P (2010) Empirical evaluation of latency-sensitive application performance in the cloud. In: Proceedings of the first annual ACM SIGMM conference on multimedia systems. ACM, New York","DOI":"10.1145\/1730836.1730842"},{"issue":"5","key":"2886_CR3","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/MC.2005.176","volume":"38","author":"M Rosenblum","year":"2005","unstructured":"Rosenblum M, Garfinkel T (2005) Virtual machine monitors: current technology and future trends. Computer 38(5):39\u201347","journal-title":"Computer"},{"issue":"1","key":"2886_CR4","first-page":"44","volume":"11","author":"K Salah","year":"2013","unstructured":"Salah K, Calero JMA, Zeadally S, Al-Mulla S, Alzaabi M (2013) Using cloud computing to implement a security overlay network. IEEE Secur Priv 11(1):44\u201353","journal-title":"IEEE Secur Priv"},{"key":"2886_CR5","doi-asserted-by":"crossref","unstructured":"Karol M, Krishnan P, Jenny Li J (2004) Using overlay networks to improve VoIP reliability. In: Automated technology for verification and analysis. Springer, Berlin, pp 392\u2013401","DOI":"10.1007\/978-3-540-30476-0_32"},{"key":"2886_CR6","doi-asserted-by":"crossref","unstructured":"Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2005) 1-800-OVERLAYS: using overlay networks to improve VoIP quality. In: Proceedings of the international workshop on Network and operating systems support for digital audio and video. ACM, New York, pp 51\u201356","DOI":"10.1145\/1065983.1065997"},{"issue":"6","key":"2886_CR7","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/TMM.2006.884609","volume":"8","author":"Y Amir","year":"2006","unstructured":"Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2006) An overlay architecture for high-quality VoIP streams. IEEE Trans Multimed 8(6):1250\u20131262","journal-title":"IEEE Trans Multimed"},{"key":"2886_CR8","unstructured":"Bui QD, Jennings A (2009) Relay node selection in large-scale VoIP overlay networks. First international conference on ubiquitous and future networks, 2009 (ICUFN 2009), pp 56, 61"},{"key":"2886_CR9","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1016\/j.jnca.2013.11.005","volume":"41","author":"L Ssu-Hsuan","year":"2014","unstructured":"Ssu-Hsuan L, Li K-C, Lai K-C, Chung Y-C (2014) Effectiveness of a replica mechanism to improve availability with arrangement graph-based overlay. J Netw Comput Appl 41:441\u2013450","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"2886_CR10","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.future.2004.10.010","volume":"21","author":"Yu Wei","year":"2005","unstructured":"Wei Yu, Chellappan S, Xuan D (2005) P2P\/Grid-based overlay architecture to support VoIP services in large-scale IP networks. Future Gener Comput Syst 21(1):209\u2013219","journal-title":"Future Gener Comput Syst"},{"issue":"16","key":"2886_CR11","doi-asserted-by":"crossref","first-page":"3055","DOI":"10.1016\/j.comcom.2007.05.037","volume":"30","author":"H Chen","year":"2007","unstructured":"Chen H, Hui-Kai S, Cheng B-C (2007) An objective-oriented service model for VoIP overlay networks over DiffServ\/MPLS networks. Comput Commun 30(16):3055\u20133062","journal-title":"Comput Commun"},{"issue":"4","key":"2886_CR12","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/1899928.1899933","volume":"44","author":"R McDougall","year":"2010","unstructured":"McDougall R, Anderson J (2010) Virtualization performance: perspectives and challenges ahead. ACM SIGOPS Oper Syst Rev 44(4):40\u201356","journal-title":"ACM SIGOPS Oper Syst Rev"},{"key":"2886_CR13","doi-asserted-by":"crossref","unstructured":"Vieira K, Schulter A, Westphall CB, Westphall CM (2010) Intrusion detection for grid and cloud computing. IT Prof 12(4):38, 43","DOI":"10.1109\/MITP.2009.89"},{"issue":"6","key":"2886_CR14","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/TMM.2006.884609","volume":"8","author":"Y Amir","year":"2006","unstructured":"Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2006) An overlay architecture for high-quality VoIP streams. IEEE Trans Multimed 8(6):1250\u20131262","journal-title":"IEEE Trans Multimed"},{"issue":"6","key":"2886_CR15","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1109\/TNET.2003.820436","volume":"11","author":"Z Duan","year":"2003","unstructured":"Duan Z, Zhang Z-L, Hou YT (2003) Service overlay networks: SLAs, QoS, and bandwidth provisioning. IEEE\/ACM Trans Netw 11(6):870\u2013883","journal-title":"IEEE\/ACM Trans Netw"},{"key":"2886_CR16","unstructured":"Mishra PP, Saran H (2000) Capacity management and routing policies for voice over IP traffic. Network, IEEE, vol 14, no 2, pp 20, 27"},{"key":"2886_CR17","doi-asserted-by":"crossref","unstructured":"Li H, Mason L, Rabbat M (2009) Distributed adaptive diverse routing for voice-over-IP in service overlay networks. IEEE transactions on network and service management, vol 6, no 3, pp 175, 189","DOI":"10.1109\/TNSM.2009.03.090304"},{"key":"2886_CR18","doi-asserted-by":"crossref","unstructured":"Seedorf J (2006) Security challenges for peer-to-peer SIP. Network, IEEE, vol 20, no 5, pp 38, 45","DOI":"10.1109\/MNET.2006.1705882"},{"key":"2886_CR19","unstructured":"Walsh TJ, Kuhn R (2005) Challenges in securing voice over IP. Security & Privacy, IEEE, vol 3, no 3, pp 44, 49"},{"key":"2886_CR20","doi-asserted-by":"crossref","unstructured":"Bouzida Y, Mangin C (2008) A framework for detecting anomalies in VoIP networks. Third international conference on availability, reliability and security, 2008 (ARES 08), pp 204, 211","DOI":"10.1109\/ARES.2008.205"},{"issue":"1","key":"2886_CR21","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s11235-009-9234-1","volume":"45","author":"G Zhang","year":"2010","unstructured":"Zhang G, Fischer-H\u00fcbner S, Ehlert S (2010) Blocking attacks on SIP VoIP proxies caused by external processing. Telecommun Syst 45(1):61\u201376","journal-title":"Telecommun Syst"},{"issue":"3","key":"2886_CR22","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1007\/s11235-015-0015-8","volume":"61","author":"D Gon\u00e7alves","year":"2016","unstructured":"Gon\u00e7alves D, Ant\u00f3nio A, Ant\u00f3nio C, Pedro S (2016) Towards automated test and validation of SIP solutions. Telecommun Syst 61(3):579\u2013590","journal-title":"Telecommun Syst"},{"issue":"4","key":"2886_CR23","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"S Zargar","year":"2013","unstructured":"Zargar S, James J, David T (2013) A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun Surv Tut 15(4):2046\u20132069","journal-title":"IEEE Commun Surv Tut"},{"key":"2886_CR24","unstructured":"Thomas P, Michael G (2007) Chapter 9\u2014IETF encryption solutions for VoIP, how to cheat, Syngress, Burlington, 2007. How to cheat at VoIP security, pp 239\u2013251"},{"issue":"8","key":"2886_CR25","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1016\/j.cose.2009.05.003","volume":"28","author":"R Dantu","year":"2009","unstructured":"Dantu R, Fahmy S, Schulzrinne H, Cangussu J (2009) Issues and challenges in securing VoIP. Comput Secur 28(8):743\u2013753","journal-title":"Comput Secur"},{"key":"2886_CR26","doi-asserted-by":"crossref","unstructured":"Keromytis AD (2010) Voice-over-IP security: research and practice. Security & privacy, IEEE, vol 8, no 2, pp 76, 78","DOI":"10.1109\/MSP.2010.87"},{"issue":"8","key":"2886_CR27","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MCOM.2008.4597108","volume":"46","author":"J Quittek","year":"2008","unstructured":"Quittek J, Niccolini S, Tartarelli S, Schlegel R (2008) On spam over internet telephony (SPIT) prevention. IEEE Commun Mag 46(8):80\u201386","journal-title":"IEEE Commun Mag"},{"key":"2886_CR28","unstructured":"Heo J, Singaravelu L (2013) Deploying extremely latency-sensitive applications in vSphere 5.5: performance study. Tech. rep., VMware, Inc. www.vmware.com\/files\/pdf\/techpaper\/latency-sensitive-perf-vsphere55.pdf"},{"key":"2886_CR29","unstructured":"Cisco (2014) Cisco active network abstraction reference guide. Sanfrancisco"},{"key":"2886_CR30","unstructured":"Voznak M, Rozhon J (2010) SIP infrastructure performance testing. In: Proceedings 9th WSEAS international conference on telecommunications and informatics"},{"key":"2886_CR31","unstructured":"Kimmel JS, Alfieri RA, Miles A, McGrath WK, McLeod MJ, O\u2019connell MA, Simpson GA (2000) Operating system for a non-uniform memory access multiprocessor system. U.S. Patent 6,105,053, issued August 15, 2000"},{"key":"2886_CR32","doi-asserted-by":"crossref","unstructured":"Lange J, Pedretti K, Hudson T, Dinda P, Cui Z, Xia L, Bridges P et al (2010) Palacios and kitten: new high performance operating systems for scalable virtualized and native supercomputing. In: 2010 IEEE international symposium on, parallel & distributed processing (IPDPS). IEEE, pp 1\u201312","DOI":"10.1109\/IPDPS.2010.5470482"},{"key":"2886_CR33","unstructured":"Cloudera reference architecture for Microsoft azure deployments, Version CDH 5.3"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-017-2886-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-017-2886-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-017-2886-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T18:25:33Z","timestamp":1568831133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-017-2886-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,21]]},"references-count":33,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["2886"],"URL":"https:\/\/doi.org\/10.1007\/s00521-017-2886-y","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2017,2,21]]}}}