Iisa 2013 2013
DOI: 10.1109/iisa.2013.6623704
|View full text |Cite
|
Sign up to set email alerts
|

The Sphinx enigma in critical VoIP infrastructures: Human or botnet?

Abstract: Abstract---Sphinx

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…A typical way to tackle these attacks is the use of a Reverse Turing Test, called CAPTCHA (Completely Automated Public Turing Test to Tell Computer and Humans Apart). Since visual CAPTCHA are hard to apply in VoIP systems, audio CAPTCHA appear to be appropriate for defending against SPIT calls/messages [39][100] [99].…”
Section: Introductionmentioning
confidence: 99%
“…A typical way to tackle these attacks is the use of a Reverse Turing Test, called CAPTCHA (Completely Automated Public Turing Test to Tell Computer and Humans Apart). Since visual CAPTCHA are hard to apply in VoIP systems, audio CAPTCHA appear to be appropriate for defending against SPIT calls/messages [39][100] [99].…”
Section: Introductionmentioning
confidence: 99%
“… Anonymous Eavesdropping and Call Redirection  Spam Over Internet Telephony(Gritzalis et al, 2013) 5.2. Network Logging FrameworkThis framework focuses on artefacts that can be collected in a VoIP service and especially in the SIP headers and the SIP body message where the SDP data lie.…”
mentioning
confidence: 99%