Chord: a scalable peer-to-peer lookup protocol for internet applications
IEEE/ACM Transactions on Networking (TON)
Peer-to-peer internet telephony using SIP
NOSSDAV '05 Proceedings of the international workshop on Network and operating systems support for digital audio and video
Security Meter: A Practical Decision-Tree Model to Quantify Risk
IEEE Security and Privacy
Minimum-cost network hardening using attack graphs
Computer Communications
Toward measuring network security using attack graphs
Proceedings of the 2007 ACM workshop on Quality of protection
Holistic VoIP intrusion detection and prevention system
Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications
VoIP defender: highly scalable SIP-based security architecture
Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications
A cooperative SIP infrastructure for highly reliable telecommunication services
Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications
A Self-learning System for Detection of Anomalous SIP Messages
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks
AICCSA '08 Proceedings of the 2008 IEEE/ACS International Conference on Computer Systems and Applications
Defensive configuration with game theory
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Measuring the overall security of network configurations using attack graphs
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Strategic games on defense trees
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Security challenges for peer-to-peer SIP
IEEE Network: The Magazine of Global Internetworking
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM
Principles, Systems and Applications of IP Telecommunications
Hi-index | 0.00 |
In this paper we propose a framework for the analysis of the security in peer-to-peer Session Initiation Protocol based infrastructures. The proposed approach defines a game theoretical model for both an attacker as well as the defender and uses the Nash equilibrium to derive optimal attack and defensive strategies for both entities. We address the specific threats related to SPam over Internet Telephony, flooding and non-cooperative behavior and assess defensive mechanisms based on thresholds and redundant retransmissions. The paper summarizes the main results based on extensive Monte-Carlo simulations of this game.