Анализ результатов испытаний действующей сети нового поколения (NGN) на уязвимость к атакам DoS - page 14

NGN к различным типам угроз информационной безопасности и по-
иска мер противодействия этим угрозам.
ЛИТЕРАТУРА
1.
Dorgham
Sisalem, et. al. SIP security. John Wiley & Sons, Ltd., 2009.
2.
Yao
Jiang, et. al. Evaluation model for DoS attack effect in softswitch network
// International Conference on Communications and Intelligence Information //
Security, 2010. P. 88–91.
3.
Гольдштейн А.Б.
,
Гольдштейн Б.С.
Softswitch. СПб.: БХВ – Санкт-Петербург.
2006.
4.
Щербаков В.Б.
,
Ермаков С.А.
Безопасность беспроводных сетей: стандарт IEEE
802.11. М.: РадиоСофт, 2010.
5.
Ehlert S.
,
Geneiatakis D.
,
Magedanz T.
Survey of network security systems to counter
SIP-based denial-of-service attacks, Elsevier, 2009.
6.
Schulzrinne H.
, et. al. SIP: Session Initiation Protocol, RFC 3261, June 2002.
7.
SIPp
официальный сайт.
/
8.
Page E.S.
(June, 1954). Continuous Inspection Scheme. Biometrika 41 (1/2): 100–
115.
9.
Basseville M.
and
Nikiforov I.V.
Detection of abrupt changes: Theory and application.
Prentice-Hall Inc, 1993.
10.
Kim H.
,
Rozovskii B.
and
Tartakovsky A.
A nonparametric multichart cusum test
for rapid intrusion detection // International Journal of Computing and Information
Science, 2(3):149–158, December, 2004.
11.
Chen Z.
, et. al. Detecting SIP flooding attacks on IP multimedia subsystem
(IMS) // Computing, Networking and Communications (ICNC), 2012 International
Conference, Conference Publications, p. 154–158, Feb. 2012.
12.
Li W.
, et. al. On Sliding Window Based Change Point Detection for Hybrid SIP DoS
attack // IEEE Asia-Pacific Services Computing Conference. 2010.
REFERENCES
[1] Sisalem D., Floroiu J., Kuthan J., Abend U., Schulzrinne H. SIP security. Chichester,
John Wiley & Sons, 2009. 350 p. doi: 10.1002/9780470516997
[2] Jiang Y., Zheng K., Yang Y., Luo S., Zhao J. Evaluation model for DoS attack effect
in softswitch network. Proc. Int. Conf. Commun. Intell. Inf. Secur. (ICCIIS), 2010,
pp. 88–91. doi: 10.1109/ICCIIS.2010.30
[3] Gol’dshteyn A.B., Gol’dshteyn B.S. Softswitch. St. Petersburg, BKhV–Peterburg
Publ., 2006. 368 p. (in Russ.).
[4] Shcherbakov V.B., Ermakov S.A. Bezopasnost’ besprovodnykh setey: standart IEEE
802.11 [Wireless security: standard IEEE 802.11]. Moscow, RadioSoft Publ., 2010.
255 p.
[5] Ehlert S., Geneiatakis D., Magedanz T. Survey of network security systems to counter
SIP-based denial-of-service attacks.
Comput. Secur.
, 2009, vol. 29, no. 2, pp. 225–
243.
[6] Rosenberg J., Schulzrinne H., Camarillo G., Johnston A., Peterson J., Sparks R.,
Handley M., Schooler E. SIP: Session Initiation Protocol, RFC 3261, 2002. Available
at:
(Accessed 14 July 2013).
[7] SIPp website. Available at:
/ (Accessed 14 July 2013).
[8] Page E.S. Continuous inspection schemes.
Biometrika
, 1954, vol. 4, nos. 1–2,
pp. 100–115. doi:10.1093/biomet/41.1-2.100
56 ISSN 0236-3933. Вестник МГТУ им. Н.Э. Баумана. Сер. “Приборостроение”. 2013. № 3
1...,4,5,6,7,8,9,10,11,12,13 15
Powered by FlippingBook