{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T21:57:51Z","timestamp":1649195871763},"reference-count":21,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2017]]},"DOI":"10.1587\/transinf.2016inp0023","type":"journal-article","created":{"date-parts":[[2017,9,30]],"date-time":"2017-09-30T22:24:29Z","timestamp":1506810269000},"page":"2287-2294","source":"Crossref","is-referenced-by-count":0,"title":["Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design"],"prefix":"10.1587","volume":"E100.D","author":[{"given":"Na","family":"RUAN","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Mingli","family":"WU","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Shiheng","family":"MA","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Haojin","family":"ZHU","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Weijia","family":"JIA","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Songyang","family":"WU","sequence":"additional","affiliation":[{"name":"The Third Research Institute of Ministry of Public Security"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] H. Kim, D. Kim, M. Kwon, H. Han, Y. Jang, D. Han, T. Kim, and Y. Kim, \u201cBreaking and fixing volte: Exploiting hidden data channels and mis-implementations,\u201d Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.328-339, ACM, 2015. 10.1145\/2810103.2813718"},{"key":"2","unstructured":"[2] C.-Y. Li, G.-H. Tu, C. Peng, Z. Yuan, Y. Li, S. Lu, and X. Wang, \u201cInsecurity of voice solution volte in lte mobile networks,\u201d Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.316-327, ACM, 2015. 10.1145\/2810103.2813618"},{"key":"3","unstructured":"[3] G.-H. Tu, C.-Y. Li, C. Peng, and S. Lu, \u201cHow voice call technology poses security threats in 4g lte networks,\u201d Communications and Network Security (CNS), 2015 IEEE Conference on, pp.442-450, IEEE, 2015. 10.1109\/cns.2015.7346856"},{"key":"4","unstructured":"[4] J. Tang, Y. Cheng, and Y. Hao, \u201cDetection and prevention of sip flooding attacks in voice over ip networks,\u201d INFOCOM, 2012 Proceedings IEEE, pp.1161-1169, IEEE, 2012. 10.1109\/infcom.2012.6195475"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] J. Tang, Y. Cheng, Y. Hao, and W. Song, \u201cSip flooding attack detection with a multi-dimensional sketch design,\u201d IEEE Transactions on Dependable and Secure Computing, vol.11, no.6, pp.582-595, 2014. 10.1109\/tdsc.2014.2302298","DOI":"10.1109\/TDSC.2014.2302298"},{"key":"6","unstructured":"[6] H. Sengar, H. Wang, D. Wijesekera, and S. Jajodia, \u201cFast detection of denial-of-service attacks on ip telephony,\u201d 2006 14th IEEE International Workshop on Quality of Service, pp.199-208, IEEE, 2006. 10.1109\/iwqos.2006.250469"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] H. Sengar, H. Wang, D. Wijesekera, and S. Jajodia, \u201cDetecting voip floods using the hellinger distance,\u201d IEEE transactions on parallel and distributed systems, vol.19, no.6, pp.794-805, 2008. 10.1109\/tpds.2007.70786","DOI":"10.1109\/TPDS.2007.70786"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] A. Kumar and P.S. Tilagam, \u201cA novel approach for evaluating and detecting low rate sip flooding attack,\u201d International Journal of Computer Applications, vol.26, no.1, pp.31-36, 2011. 10.5120\/3067-4192","DOI":"10.5120\/3067-4192"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] I. Hussain, S. Djahel, Z. Zhang, and F. Na\u00eft-Abdesselam, \u201cA comprehensive study of flooding attack consequences and countermeasures in session initiation protocol (sip),\u201d Security and Communication Networks, vol.8, no.18, pp.4436-4451, 2015. 10.1002\/sec.1328","DOI":"10.1002\/sec.1328"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] L. Fan, P. Cao, J. Almeida, and A.Z. Broder, \u201cSummary cache: a scalable wide-area web cache sharing protocol,\u201d IEEE\/ACM Transactions on Networking (TON), vol.8, no.3, pp.281-293, 2000. 10.1109\/90.851975","DOI":"10.1109\/90.851975"},{"key":"11","unstructured":"[11] W. Meng, W. Li, and L.-F. Kwok, \u201cEfm: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism,\u201d Computers &amp; Security, vol.43, pp.189-204, 2014."},{"key":"12","unstructured":"[12] B.-H. Roh, J.W. Kim, K.-Y. Ryu, and J.-T. Ryu, \u201cA whitelist-based countermeasure scheme using a bloom filter against sip flooding attacks,\u201d Computers &amp; Security, vol.37, pp.46-61, 2013."},{"key":"13","unstructured":"[13] D. Geneiatakis, N. Vrakas, and C. Lambrinoudakis, \u201cPerformance evaluation of a flooding detection mechanism for voip networks,\u201d 2009 16th International Conference on Systems, Signals and Image Processing, pp.1-5, IEEE, 2009. 10.1109\/iwssip.2009.5367698"},{"key":"14","unstructured":"[14] D. Geneiatakis, N. Vrakas, and C. Lambrinoudakis, \u201cUtilizing bloom filters for detecting flooding attacks against sip based services,\u201d Computers &amp; Security, vol.28, no.7, pp.578-591, 2009."},{"key":"15","unstructured":"[15] Y. Rebahi, M. Sher, and T. Magedanz, \u201cDetecting flooding attacks against ip multimedia subsystem (ims) networks,\u201d 2008 IEEE\/ACS International Conference on Computer Systems and Applications, pp.848-851, IEEE, 2008. 10.1109\/aiccsa.2008.4493627"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] T. Ehrenkranz and J. Li, \u201cOn the state of ip spoofing defense,\u201d ACM Transactions on Internet Technology (TOIT), vol.9, no.2, pp.1-29, 2009. 10.1145\/1516539.1516541","DOI":"10.1145\/1516539.1516541"},{"key":"17","unstructured":"[17] J. Tang and Y. Cheng, \u201cQuick detection of stealthy sip flooding attacks in voip networks,\u201d 2011 IEEE International Conference on Communications (ICC), pp.1-5, IEEE, 2011. 10.1109\/icc.2011.5963248"},{"key":"18","unstructured":"[18] A. Akbar, S.M. Basha, and S.A. Sattar, \u201cLeveraging the sip load balancer to detect and mitigate ddos attacks,\u201d Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on, pp.1204-1208, IEEE, 2015. 10.1109\/icgciot.2015.7380646"},{"key":"19","unstructured":"[19] D. Golait and N. Hubballi, \u201cVoipfd: Voice over ip flooding detection,\u201d Communication (NCC), 2016 Twenty Second National Conference on, pp.1-6, IEEE, 2016. 10.1109\/ncc.2016.7561121"},{"key":"20","unstructured":"[20] J.-T. Ryu, B.-H. Roh, and K.-Y. Ryu, \u201cDetection of sip flooding attacks based on the upper bound of the possible number of sip messages,\u201d KSII Transactions on Internet &amp; Information Systems, vol.3, no.5, 2009."},{"key":"21","unstructured":"[21] M. Mehi\u0107, M. Mikulec, M. Voznak, and L. Kapicak, \u201cCreating covert channel using sip,\u201d International Conference on Multimedia Communications, Services and Security, vol.429, pp.182-192, Springer, 2014. 10.1007\/978-3-319-07569-3_15"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E100.D\/10\/E100.D_2016INP0023\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,7]],"date-time":"2017-10-07T04:25:48Z","timestamp":1507350348000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E100.D\/10\/E100.D_2016INP0023\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":21,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2016inp0023","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}