{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T17:46:15Z","timestamp":1750959975150},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,11,19]],"date-time":"2009-11-19T00:00:00Z","timestamp":1258588800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1007\/s11235-009-9234-1","type":"journal-article","created":{"date-parts":[[2009,11,19]],"date-time":"2009-11-19T00:31:51Z","timestamp":1258590711000},"page":"61-76","source":"Crossref","is-referenced-by-count":14,"title":["Blocking attacks on SIP VoIP proxies caused by external processing"],"prefix":"10.1007","volume":"45","author":[{"given":"Ge","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]},{"given":"Sven","family":"Ehlert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,11,19]]},"reference":[{"key":"9234_CR1","unstructured":"Voice over IP Security Alliance (VOIPSA). http:\/\/www.voipsa.org\/ . Accessed at 16 September 2008."},{"issue":"3","key":"9234_CR2","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/COMST.2006.253270","volume":"8","author":"D. Geneiatakis","year":"2006","unstructured":"Geneiatakis, D., Dagiuklas, T., Kambourakis, G., Lambrinoudakis, C., Gritzalis, S., Ehlert, S., & Sisalem, D. (2006). Survey of security vulnerabilities in session initiation protocol. IEEE Communications Surveys & Tutorials, 8(3), 68\u201381.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"9234_CR3","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., & Schooler, E. (2002). SIP: Session initiation protocol. RFC 3261.","DOI":"10.17487\/rfc3261"},{"key":"9234_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, G., Ehlert, S., Magedanz, T., & Sisalem, D. (2007). Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding. In IPTComm \u201907: Proceedings of the 1st international conference on principles, systems and applications of IP telecommunications (pp. 57\u201366). New York, NY, USA, July 2007. ACM.","DOI":"10.1145\/1326304.1326314"},{"key":"9234_CR5","doi-asserted-by":"crossref","unstructured":"Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., & Berners-Lee, T. (1999). Hypertext transfer protocol\u2014HTTP\/1.1. RFC 2616.","DOI":"10.17487\/rfc2616"},{"key":"9234_CR6","doi-asserted-by":"crossref","unstructured":"Handley, M., & Jacobson, V. (1998). SDP: Session description protocol. RFC 2327.","DOI":"10.17487\/rfc2327"},{"issue":"5","key":"9234_CR7","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MNET.2006.1705880","volume":"20","author":"D. Sisalem","year":"2006","unstructured":"Sisalem, D., Kuthan, J., & Ehlert, S. (2006). Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms. IEEE Network, 20(5), 26\u201331.","journal-title":"IEEE Network"},{"key":"9234_CR8","unstructured":"Sengar, H., Wijesekera, D., Wang, H., & Jajodia, S. (2006). Fast detection of denial of service attacks on IP telephone. In 14th IEEE international workshop on quality of service, New Haven, USA, June 2006. IEEE."},{"key":"9234_CR9","doi-asserted-by":"crossref","unstructured":"Chen, E. Y. (2006). Detecting DoS attacks on SIP system. In 1st IEEE workshop on VoIP management and security, Vancouver, Canada, April 2006. IEEE.","DOI":"10.1109\/VOIPMS.2006.1638123"},{"key":"9234_CR10","doi-asserted-by":"crossref","unstructured":"Sengar, H., Wijesekera, D., Wang, H., & Jajodia, S. (2006). VoIP intrusion detection through interacting protocol state machines. In DSN \u201906: the international conference on dependable systems and networks, June.","DOI":"10.1109\/DSN.2006.73"},{"key":"9234_CR11","doi-asserted-by":"crossref","unstructured":"Ehlert, S., Wang, C., Magedanz, T., & Sisalem, D. (2008). Specification-based denial-of-service detection for SIP voice-over-IP networks. In 3rd international conference on Internet monitoring and protection, Bucharest, Hungary, July 2008. IEEE.","DOI":"10.1109\/ICIMP.2008.14"},{"key":"9234_CR12","doi-asserted-by":"crossref","unstructured":"Conner, W., & Nahrstedt, K. (2008). Protecting SIP proxy servers from ringing-based denial-of-service attacks. In The tenth IEEE international symposium on multimedia (ISM), Berkeley, USA, December 2008. IEEE.","DOI":"10.1109\/ISM.2008.65"},{"issue":"10","key":"9234_CR13","doi-asserted-by":"crossref","first-page":"2580","DOI":"10.1016\/j.comnet.2006.11.014","volume":"51","author":"D. Geneiatakis","year":"2007","unstructured":"Geneiatakis, D., Kambourakis, G., Lambrinoudakis, C., Dagiuklas, T., & Gritzalis, S. (2007). A framework for protecting a SIP-based infrastructure against malformed message attacks. Computer Networks, 51(10), 2580\u20132593.","journal-title":"Computer Networks"},{"key":"9234_CR14","unstructured":"Fei, A., Pei, G., Liu, R., & Zhang, L. (1998). Measurements on delay and hop-count of the Internet. In IEEE GLOBECOM\u201998\u2014Internet mini-conference, Sydney, Australia, November 1998. IEEE."},{"key":"9234_CR15","doi-asserted-by":"crossref","unstructured":"Mockapetris, P. V. (1987). Domain names\u2014implementation and specification. RFC 1035.","DOI":"10.17487\/rfc1035"},{"key":"9234_CR16","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Fielding, R., & Masinter, L. (2005). Uniform resource identifier (URI): Generic syntax. RFC 3986.","DOI":"10.17487\/rfc3986"},{"key":"9234_CR17","unstructured":"Faltstrom, P., & Mealling, M. (2004). The e.164 to uniform resource identifiers (URI) dynamic delegation discovery system (DDDS) application (ENUM). RFC 3761."},{"key":"9234_CR18","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., & Schulzrinne, H. (2002). Session initiation protocol (SIP): locating SIP servers. RFC 3263.","DOI":"10.17487\/rfc3263"},{"key":"9234_CR19","doi-asserted-by":"crossref","unstructured":"Nassar, M., State, R., & Festor, O. (2007). VoIP honeypot architecture. In IEEE international symposium on integrated network management, Munich, Germany, May 2007. IEEE.","DOI":"10.1109\/INM.2007.374775"},{"key":"9234_CR20","doi-asserted-by":"crossref","unstructured":"Peterson, J., & Jennings, C. (2006). Enhancements for authenticated identity management in the session initiation protocol (SIP). RFC 4474.","DOI":"10.17487\/rfc4474"},{"key":"9234_CR21","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Masinter, L., & McCahill, M. (1994). Uniform resource locators (URL). RFC 1738.","DOI":"10.17487\/rfc1738"},{"key":"9234_CR22","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., & Jennings, C. (2008). The session initiation protocol (SIP) and spam. RFC 5039.","DOI":"10.17487\/rfc5039"},{"key":"9234_CR23","unstructured":"The MIT \u201cking\u201d dataset: http:\/\/pdos.csail.mit.edu\/p2psim\/kingdata\/ . Accessed 16 January 2009."},{"key":"9234_CR24","doi-asserted-by":"crossref","unstructured":"Gummadi, K. P., Saroiu, S., & Gribble, S. D. (2002). King: estimating latency between arbitrary Internet end hosts. In IMW\u201902: proceedings of the 2nd ACM SIGCOMM workshop on Internet measurement (pp. 5\u201318). New York, NY, USA. ACM.","DOI":"10.1145\/637201.637203"},{"key":"9234_CR25","unstructured":"SIPp: http:\/\/sipp.sourceforge.net\/ . Accessed 16 September 2008."},{"key":"9234_CR26","unstructured":"Express Router, S. I. P. (SER): http:\/\/www.iptel.org . Accessed 16 September 2008."},{"key":"9234_CR27","unstructured":"Minihttpd: http:\/\/www.acme.com\/software\/mini_httpd\/ . Accessed 16 September 2008."},{"key":"9234_CR28","unstructured":"Dnsmasq: http:\/\/www.thekelleys.org.uk\/dnsmasq\/doc.html . Accessed 16 September 2008."},{"key":"9234_CR29","unstructured":"Stewart, J. (2003). DNS cache poisoning\u2014the next generation (Technical report). http:\/\/www.lurhq.com\/dnscache.pdf . Accessed 4 November 2008."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-009-9234-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-009-9234-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-009-9234-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:50:07Z","timestamp":1559386207000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-009-9234-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,19]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["9234"],"URL":"https:\/\/doi.org\/10.1007\/s11235-009-9234-1","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,11,19]]}}}