Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Nov 23, 2016 · A trained PCDTA can detect anomalies, and hence various DoS attacks in SIP. We perform a thorough experiment with computer simulated SIP traffic ...
They suggested a model for studying SIP operation and detection of DoS attacks and described algorithms to identify DoS attacks by using the model [16] .
This paper model the SIP operation as discrete event system (DES) and design a new state transition machine, which is named as probabilistic counting ...
Abstract—Session Initiation Protocol (SIP) is an application layer protocol used for signaling purposes to manage Voice over IP (VoIP) connections.
Missing: Behavior | Show results with:Behavior
TL;DR: This paper model the SIP operation as discrete event system (DES) and design a new state transition machine, which is named as probabilistic counting ...
This thesis presents a comprehensive solution to identify anomalous Internet clients based on client behaviors and reputations. We first profile client normal ...
A whitelist model that can detect anomalies and identify locations of anomalous actuators using finite automata during multiple actuators attack is proposed ...
Oct 12, 2020 · This paper seeks to deal with anomaly detection for discrete event data that result from discrete manufacturing systems. Discrete manufacturing ...
The “Detection/Prediction model” block implements the neural network models ... Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling.
Anomaly-based DoS detection and prevention in SIP networks by modeling SIP ... Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling.