نتایج جستجو برای: امنیت voip sip h323 spit
تعداد نتایج: 20451 فیلتر نتایج به سال:
In this paper we argue that contextual multi-armed bandit algorithms could open avenues for designing self-learning security modules for computer networks and related tasks. The paper has two contributions: a conceptual one and an algorithmical one. The conceptual contribution is to formulate – as an example – the real-world problem of preventing SPIT (Spam in VoIP networks), which is currently...
In this paper we argue that contextual multi-armed bandit algorithms could open avenues for designing self-learning security modules for computer networks and related tasks. The paper has two contributions: a conceptual one and an algorithmical one. The conceptual contribution is to formulate – as an example – the real-world problem of preventing SPIT (Spam in VoIP networks), which is currently...
Session Initiation Protocol (SIP) has been widely used in current Internet protocols such as Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a powerful signaling protocol that controls communications on the Internet for establishing, maintaining and terminating sessions. The services that are enabled by SIP are equally applicable to mobile and ubiquitous c...
Ubiquitous worldwide broadband Internet access as well the coming of age of VoIP technology have made Voice-over-IP an increasingly attractive and useful network application. Currently the “human-readable” Session Initiation Protocol (SIP) which is based on a simple HTTP-like request/response exchange is steadily gaining headway against the considerably more complex ASN.1 encoded H.323 Multimed...
The threat of voice spam, commonly known as Spam over Internet Telephony (SPIT) is a real and contemporary problem. If the problem remains unchecked then it may become as potent as email spam today. In this paper, we present two approaches to detect and prevent SPITting over the Internet. Both of our approaches are based on the anomaly detection of the distributions of selected call features (i...
The Session Initiation Protocol (SIP) is a strong contender as a call control protocol for Voice over IP (VoIP), and indeed commercial implementations are readily available off-the-shelf. SIP supports flexible service provisioning not only through third parties, but also end-users. Laboratory experience shows that as these services are interworking they are subject to the feature interaction pr...
The Session Initiation Protocol (SIP), which is becoming the de facto standard for the next-generation VoIP networks, is currently receiving much attention in many aspects. One aspect that was not deeply addressed in the original SIP is its authentication procedure. Apart from its security, an SIP authentication procedure should be e cient. This paper proposes a robust and e cient three-party S...
The new SIP-P2P approach brings many advantages like the improved reliability and the ease of setup. However, Communications Service Providers (CSPs) offering VoIP services seem to be afraid to lose their profits due to the introduction of SIP-P2P. Claimed is the lack of session establishment control leading to revenue leakages. In this work we introduce a charging system for SIP-P2P that assur...
The Session Initiation Protocol (SIP) is widely used as a call control protocol for Voice over IP (VoIP), and indeed commercial implementations are readily available off-the-shelf. SIP supports flexible service provisioning not only through third parties, but also end-users. Laboratory experience shows that as these services are interworking they are subject to the feature interaction problem. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید