نتایج جستجو برای: حملات طوفانی سرورهای sip

تعداد نتایج: 5004  

بامداد, کورش, رحیمی قره میرشاملو, فاطمه, نعیمی, سیروس,

زمینه و هدف: پلی­مورفیسم‌های تک نوکلئوتیدی عامل ایجاد تنوع ژنتیکی در جانداران می­باشند و در این میان، پلی­مورفیسم‌های تک نوکلئوتیدی غیر مترادف (nsSNPs) باعث تغییر در باقیمانده‌های اسیدآمینه می­شوند. تحقیق اخیر با هدف بررسی احتمال ارتباط بین تمامی چندشکلی‌های گزارش‌شده از ژن پریون انسانی و بروز بیماری انجام‌شده است. مواد و روش‌ها: در این مطالعه توالی اسیدآمینه ایزوفرم اصلی ژن پروتئین پریون انسان...

2015
Pavel O. Abaev Konstantin E. Samouylov Ivan Sinitsyn Sergey Shorgin

The rapid development of services provided on SIP networks not only define the necessity of creating new equipment and standards but also requires the development of new methods and programming software tools for modeling and analyzing the effectiveness of the overload control mechanisms in SIP-server networks. The modeling process utilizes mathematical and simulation models as well as simulato...

2006
Jan Seedorf

Today, the session initiation protocol (SIP) is the predominant protocol for Voice-over-IP (VoIP) signalling. The intention of this paper is to present an overview of VoIP security issues both current and future – focusing on SIP. We start by presenting some fundamental differences between VoIP and the public switched telephone network (PSTN). We then look at specific problems for SIP signallin...

2005
G Camarillo J Rosenberg

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document describes how to u...

Journal: :Computers & Security 2010
Sven Ehlert Dimitris Geneiatakis Thomas Magedanz

Session Initiation Protocol is a core protocol for coming real time communication networks, including VoIP, IMS and IPTV networks. Based on the open IP stack, it is similarly susceptible to Denial-of-Service Attacks launched against SIP servers. More than 20 different research works have been published to address SIP-related DoS problems. In this survey we explain three different types of DoS a...

2015
C. Davids V. Gurbani

This document provides a methodology for benchmarking the Session Initiation Protocol (SIP) performance of devices. Terminology related to benchmarking SIP devices is described in the companion terminology document (RFC 7501). Using these two documents, benchmarks can be obtained and compared for different types of devices such as SIP Proxy Servers, Registrars, and Session Border Controllers. T...

2018
Nicholas D. Youngblut Samuel E. Barnett Daniel H. Buckley

Combining high throughput sequencing with stable isotope probing (HTS-SIP) is a powerful method for mapping in situ metabolic processes to thousands of microbial taxa. However, accurately mapping metabolic processes to taxa is complex and challenging. Multiple HTS-SIP data analysis methods have been developed, including high-resolution stable isotope probing (HR-SIP), multi-window high-resoluti...

2006
Fan Pu

Session Initiation Protocol (SIP) is a control protocol standardized by IETF and implemented on the application layer. It can be used to establish, modify, and terminate Internet conferencing, telephony and some other multimedia sessions.[1] SIP uses server and client architecture, Peer-toPeer (P2P) is another popular technology that accomplishes the same functionality in an overlay network whe...

Journal: :IJCNIS 2016
Tadasuke Nozoe Masahiko Noguchi Minoru Sakuma Mikio Isawa

The concept of network virtualization, such as network functions virtualization, has attracted considerable attention from telecom carriers and a live migration technique is a key feature of virtualization technology. However, there are some challenges associated with applying server virtualization technology including live migration to a SIP server. Previous work has not dealt with the perform...

2007
H. Tschofenig

SPAM, defined as sending unsolicited messages to someone in bulk, might be a problem on SIP open-wide deployed networks. The responsibility for filtering or blocking calls can belong to different elements in the call flow and may depend on various factors. This document defines an authorization based policy language that allows end users to upload anti-SPIT policies to intermediaries, such as S...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید