2014
DOI: 10.4304/jnw.9.12.3415-3426
|View full text |Cite
|
Sign up to set email alerts
|

SIP-Based QoS in IP Telephony

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…5 administrator can determine the fake authentications are coming from the IP address 202.4.96.199 which actually the IP address of Back Track operating system with running DoS attack using invite flood tool form the VoIP portion. As victim SIP server receives lots of fake SIP invite authentication requests, sever service asterisk process increases during attacking period with high CPU utilization [14]. Due to this reason server performance severely damaged specially attacking period all the SIP user agents that all ready registered to the victim SIP server also get poor performance form the server as well as voice quality too.…”
mentioning
confidence: 99%
“…5 administrator can determine the fake authentications are coming from the IP address 202.4.96.199 which actually the IP address of Back Track operating system with running DoS attack using invite flood tool form the VoIP portion. As victim SIP server receives lots of fake SIP invite authentication requests, sever service asterisk process increases during attacking period with high CPU utilization [14]. Due to this reason server performance severely damaged specially attacking period all the SIP user agents that all ready registered to the victim SIP server also get poor performance form the server as well as voice quality too.…”
mentioning
confidence: 99%