2008
DOI: 10.1093/ietcom/e91-b.12.3956
|View full text |Cite
|
Sign up to set email alerts
|

A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Initially, it was intended for execution monitoring of security-critical programs in distributed system [10]. However, it has been applied to routing protocols such AODV [12], [13], [14] or OSLR [15], DNP3 protocol [16], [17], [18] Voice over IP [19], [20], [21] and other areas of CPS as discussed in section III. A practical experience in the use of specification-based intrusion is presented by Uppuluri and Sekar in [11].…”
Section: B Specification-based Intrusion Detectionmentioning
confidence: 99%
“…Initially, it was intended for execution monitoring of security-critical programs in distributed system [10]. However, it has been applied to routing protocols such AODV [12], [13], [14] or OSLR [15], DNP3 protocol [16], [17], [18] Voice over IP [19], [20], [21] and other areas of CPS as discussed in section III. A practical experience in the use of specification-based intrusion is presented by Uppuluri and Sekar in [11].…”
Section: B Specification-based Intrusion Detectionmentioning
confidence: 99%