DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Detecting spam in VoIP networks
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Monitoring SIP Traffic Using Support Vector Machines
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Automatic Adaptation and Analysis of SIP Headers Using Decision Trees
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
SIP intrusion detection and response architecture for protecting SIP-based services
ACS'08 Proceedings of the 8th conference on Applied computer scince
Design and implementation of SIP-aware DDoS attack detection system
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
A Novel real time voice quality testing model for VoIP ambience environment in wireless LAN
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Simulation of SPIT filtering: quantitative evaluation of parameter tuning
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Labeled VoIP data-set for intrusion detection evaluation
EUNICE'10 Proceedings of the 16th EUNICE/IFIP WG 6.6 conference on Networked services and applications: engineering, control and management
Characteristics of real open SIP-Server traffic
PAM'13 Proceedings of the 14th international conference on Passive and Active Measurement
Hi-index | 0.00 |
With the widespread adoption of SIP-based VoIP, understanding the characteristics of SIP traffic behavior is critical to problem diagnosis and security protection of IP Telephony. In this paper, we propose a general methodology for profiling SIP-based VoIP traffic behavior at multiple levels: SIP server host, server entity and individual user levels. Using SIP traffic traces captured in a production VoIP service, we illustrate the characteristics of SIP-based VoIP traffic behavior in an operational network and demonstrate the effectiveness of our general profiling methodology. In particular, we show how our profiling methodology can help identify performance anomalies through a case study.