{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:59Z","timestamp":1750307579432,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1656137","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"1167-1171","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Design and implementation of SIP-aware DDoS attack detection system"],"prefix":"10.1145","author":[{"given":"Do-Yoon","family":"Ha","sequence":"first","affiliation":[{"name":"Korea Information Security Agency, Seoul, Korea"}]},{"given":"Hwan-Kuk","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea Information Security Agency, Seoul, Korea"}]},{"given":"Kyoung-Hee","family":"Ko","sequence":"additional","affiliation":[{"name":"Korea Information Security Agency, Seoul, Korea"}]},{"given":"Chang-Yong","family":"Lee","sequence":"additional","affiliation":[{"name":"Korea Information Security Agency, Seoul, Korea"}]},{"given":"Jeong-Wook","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea Information Security Agency, Seoul, Korea"}]},{"given":"Hyun-Cheol","family":"Jeong","sequence":"additional","affiliation":[{"name":"Korea Information Security Agency, Seoul, Korea"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"RFC","author":"Rosenberg J.","year":"2002","unstructured":"J. Rosenberg , H. Schulzrinne , G. Camarillo , A. Johnston , J. Peterson , R. Sparks , M. Handley and E. Schooler , \" SIP: Session Initiation Protocol \", RFC 3261, June 2002 . J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley and E. Schooler, \"SIP: Session Initiation Protocol\", RFC 3261, June 2002."},{"key":"e_1_3_2_1_2_1","volume-title":"RFC 1889","author":"Schulzrinne H.","year":"1996","unstructured":"H. Schulzrinne , S. Casner , R. Frederick and V. Jacobsonm , \" RTP: A Transport Protocol for Real-Time Applications \", RFC 1889 , January , 1996 H. Schulzrinne, S. Casner, R. Frederick and V. Jacobsonm, \"RTP: A Transport Protocol for Real-Time Applications\", RFC 1889, January, 1996"},{"key":"e_1_3_2_1_3_1","volume-title":"Greece","author":"Geneiatakis D.","year":"2005","unstructured":"D. Geneiatakis , G. Kambourakis , T. Dagiuklas , C. Lambrinoudakis and S. Gritzalis , \" A Framework for Detecting Malformed Messages in SIP Networks\", the 14th IEEE Workshop on Local and Metropolitan Area Networks LANMAN) , Greece , September 2005 D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis and S. Gritzalis, \"A Framework for Detecting Malformed Messages in SIP Networks\", the 14th IEEE Workshop on Local and Metropolitan Area Networks LANMAN), Greece, September 2005"},{"key":"e_1_3_2_1_4_1","volume-title":"2004 International Conference on Dependable Systems and Networks (DSN'04)","author":"Wu Y.","year":"2004","unstructured":"Y. Wu , S. Bagchi , S. Garg , N. Singh and T. Tsai , SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments \", 2004 International Conference on Dependable Systems and Networks (DSN'04) , Florence, Italy , 2004 Y. Wu, S. Bagchi, S. Garg, N. Singh and T. Tsai, SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments\", 2004 International Conference on Dependable Systems and Networks (DSN'04), Florence, Italy, 2004"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1269880.1269891"}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656137","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1656137","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:13Z","timestamp":1750250473000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656137"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":5,"alternative-id":["10.1145\/1655925.1656137","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1656137","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}