<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="EDITORIAL" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Научно-аналитический журнал &quot;Вестник Санкт-Петербургского университета ГПС МЧС России&quot;</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="online">2218-130X</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">85400</article-id>
   <article-id pub-id-type="doi">10.61260/2218-130X-2024-2-105-125</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>ИНФОРМАТИКА, ВЫЧИСЛИТЕЛЬНАЯ ТЕХНИКА И УПРАВЛЕНИЕ</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>INFORMATICS, COMPUTER ENGINEERING AND CONTROL</subject>
    </subj-group>
    <subj-group>
     <subject>ИНФОРМАТИКА, ВЫЧИСЛИТЕЛЬНАЯ ТЕХНИКА И УПРАВЛЕНИЕ</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">THE REVIEW OF FOREIGN SEGMENT PUBLICATIONS ON VOIP NETWORK SECURITY: GENERATION OF DOS ATTACKS AND THEIR DETECTION</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>ОБЗОР ПУБЛИКАЦИЙ ЗАРУБЕЖНОГО СЕГМЕНТА  ПО БЕЗОПАСНОСТИ VOIP-СЕТЕЙ: ГЕНЕРАЦИЯ DOS-АТАК  И ИХ ОБНАРУЖЕНИЕ</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-7745-3364</contrib-id>
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Макарова</surname>
       <given-names>Александра Константиновна</given-names>
      </name>
      <name xml:lang="en">
       <surname>Makarova</surname>
       <given-names>Alexandra K.</given-names>
      </name>
     </name-alternatives>
     <email>alex-ecureuil@mail.ru</email>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
    <contrib contrib-type="author">
     <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-1283-9180</contrib-id>
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Поляничева</surname>
       <given-names>Анна Валерьевна</given-names>
      </name>
      <name xml:lang="en">
       <surname>Polyanicheva</surname>
       <given-names>Anna V.</given-names>
      </name>
     </name-alternatives>
     <email>polyanicheva.av@sut.ru</email>
     <xref ref-type="aff" rid="aff-2"/>
    </contrib>
    <contrib contrib-type="author">
     <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-0778-3218</contrib-id>
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Матвеев</surname>
       <given-names>Александр Владимирович</given-names>
      </name>
      <name xml:lang="en">
       <surname>Matveev</surname>
       <given-names>Alexandr V.</given-names>
      </name>
     </name-alternatives>
     <email>fcvega_10@mail.ru</email>
     <bio xml:lang="ru">
      <p>кандидат технических наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>candidate of technical sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-3"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича</institution>
     <city>Санкт-Петербург</city>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Saint-Petersburg state university of telecommunications named after professor M.A. Bonch-Bruevich</institution>
     <city>Saint-Petersburg</city>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-2">
    <aff>
     <institution xml:lang="ru">Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича</institution>
     <city>Санкт-Петербург</city>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Saint-Petersburg state university of telecommunications named after professor M.A. Bonch-Bruevich</institution>
     <city>Saint-Petersburg</city>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-3">
    <aff>
     <institution xml:lang="ru">Санкт-Петербургский университет ГПС МЧС России</institution>
     <city>Санкт-Петербург</city>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Saint-Petersburg university of State fire service of EMERCOM of Russia</institution>
     <city>Saint-Petersburg</city>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2024-07-14T17:44:57+03:00">
    <day>14</day>
    <month>07</month>
    <year>2024</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2024-07-14T17:44:57+03:00">
    <day>14</day>
    <month>07</month>
    <year>2024</year>
   </pub-date>
   <volume>2024</volume>
   <issue>2</issue>
   <fpage>105</fpage>
   <lpage>125</lpage>
   <history>
    <date date-type="received" iso-8601-date="2024-05-23T00:00:00+03:00">
     <day>23</day>
     <month>05</month>
     <year>2024</year>
    </date>
    <date date-type="accepted" iso-8601-date="2024-06-10T00:00:00+03:00">
     <day>10</day>
     <month>06</month>
     <year>2024</year>
    </date>
   </history>
   <self-uri xlink:href="https://journals.igps.ru/en/nauka/article/85400/view">https://journals.igps.ru/en/nauka/article/85400/view</self-uri>
   <abstract xml:lang="ru">
    <p>Статья посвящена проблеме защиты VoIP-систем от Dos/DDos-атак, как одних из наиболее актуальных для области цифровой телекоммуникации. Произведен обзор существенного количества публикаций зарубежных ученых, посвященных методам, как создания данного рода атак, так и противодействия им. Предложена систематизация результатов исследования в виде сравнительной таблицы по 10 следующим критериям: год публикации, этап жизненного цикла атаки, ее тип, метод защиты, степень реализации, ее работоспособность, расход сетевого ресурса, практическая применимость, результативность метода, применение машинного обучения. Сделаны основополагающие выводы по каждому из критериев, дана краткая характеристика проведенного исследования, а также пути его продолжения.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>The paper is devoted to the problem of protecting VoIP systems from DoS/DDoS attacks, as one of the most relevant for the field of digital telecommunications. A review of a significant number of publications by foreign scientists devoted to methods of creating this type of attack, as well as countering them, was carried out. A systematization of the review results is proposed in the form of a comparative table according to the following 10 criteria: year of publication, stage of the life cycle of the attack, its type, protection method, degree of implementation, its resource intensity, practical applicability, effectiveness of the method, application of machine learning. Fundamental conclusions were drawn for each of the criteria, a brief description of the research was given, as well as ways to continue it.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>VoIP</kwd>
    <kwd>сравнительный анализ</kwd>
    <kwd>отказ в обслуживании</kwd>
    <kwd>DoS</kwd>
    <kwd>атака</kwd>
    <kwd>безопасность</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>VoIP</kwd>
    <kwd>benchmarking</kwd>
    <kwd>denial of service</kwd>
    <kwd>DoS</kwd>
    <kwd>attack</kwd>
    <kwd>security</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Ehlert S., Geneiatakis D., Magedanz T. Survey of network security systems to counter SIP-based denial-of-service attacks // Computers &amp; Security. 2010. Vol. 29. Iss. 2. P. 225–243. DOI: 10.1016/j.cose.2009.09.004.</mixed-citation>
     <mixed-citation xml:lang="en">Ehlert S., Geneiatakis D., Magedanz T. Survey of network security systems to counter SIP-based denial-of-service attacks // Computers &amp; Security. 2010. Vol. 29. Iss. 2. P. 225–243. DOI: 10.1016/j.cose.2009.09.004.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Liu Z., Yin X., Lee H. An Efficient Defense Scheme against SIP DoS Attack in SDN Using Cloud SFW // Ninth Asia Joint Conference on Information Security. Wuhan, China, 2014. P. 52–55. DOI: 10.1109/AsiaJCIS.2014.12.</mixed-citation>
     <mixed-citation xml:lang="en">Liu Z., Yin X., Lee H. An Efficient Defense Scheme against SIP DoS Attack in SDN Using Cloud SFW // Ninth Asia Joint Conference on Information Security. Wuhan, China, 2014. P. 52–55. DOI: 10.1109/AsiaJCIS.2014.12.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Ferdous R., Cigno R.L., Zorat A. On the Use of SVMs to Detect Anomalies in a Stream of SIP Messages // 11th International Conference on Machine Learning and Applications. Boca Raton, FL, USA, 2012. P. 592–597. DOI: 10.1109/ICMLA.2012.109.</mixed-citation>
     <mixed-citation xml:lang="en">Ferdous R., Cigno R.L., Zorat A. On the Use of SVMs to Detect Anomalies in a Stream of SIP Messages // 11th International Conference on Machine Learning and Applications. Boca Raton, FL, USA, 2012. P. 592–597. DOI: 10.1109/ICMLA.2012.109.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Safoine R., Mounir S., Farchi A. Comparative study on DOS attacks Detection Techniques in SIP-based VOIP networks // 6th International Conference on Multimedia Computing and Systems (ICMCS). Rabat, Morocco, 2018. P. 1–5. DOI: 10.1109/ICMCS.2018.8525878.</mixed-citation>
     <mixed-citation xml:lang="en">Safoine R., Mounir S., Farchi A. Comparative study on DOS attacks Detection Techniques in SIP-based VOIP networks // 6th International Conference on Multimedia Computing and Systems (ICMCS). Rabat, Morocco, 2018. P. 1–5. DOI: 10.1109/ICMCS.2018.8525878.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Xiao-Yu Wan, Zhang Li, Zi-Fu Fan. A SIP DoS flooding attack defense mechanism based on priority class queue // IEEE International Conference on Wireless Communications, Networking and Information Security. Beijing, China, 2010. P. 428–431. DOI: 10.1109/WCINS.2010.5541813.</mixed-citation>
     <mixed-citation xml:lang="en">Xiao-Yu Wan, Zhang Li, Zi-Fu Fan. A SIP DoS flooding attack defense mechanism based on priority class queue // IEEE International Conference on Wireless Communications, Networking and Information Security. Beijing, China, 2010. P. 428–431. DOI: 10.1109/WCINS.2010.5541813.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Fan Z., Wan X. The design and realization of SIP DOS attack detection plugin based on balanced message number principle // IEEE International Conference on Communications Technology and Applications. Beijing, China, 2009. P. 780–784. DOI: 10.1109/ICCOMTA.2009.5349092.</mixed-citation>
     <mixed-citation xml:lang="en">Fan Z., Wan X. The design and realization of SIP DOS attack detection plugin based on balanced message number principle // IEEE International Conference on Communications Technology and Applications. Beijing, China, 2009. P. 780–784. DOI: 10.1109/ICCOMTA.2009.5349092.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Pourmohseni S., Asgharian H., Akbari A. Detecting authentication misuse attacks against SIP entities // 10th International ISC Conference on Information Security and Cryptology (ISCISC). Yazd, Iran, 2013. P. 1–5. DOI: 10.1109/ISCISC.2013.6767324.</mixed-citation>
     <mixed-citation xml:lang="en">Pourmohseni S., Asgharian H., Akbari A. Detecting authentication misuse attacks against SIP entities // 10th International ISC Conference on Information Security and Cryptology (ISCISC). Yazd, Iran, 2013. P. 1–5. DOI: 10.1109/ISCISC.2013.6767324.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Zhou C.V., Leckie C., Ramamohanarao K. Protecting SIP server from CPU-based DoS attacks using history-based IP filtering // IEEE Communications Letters. 2009. Vol. 13. № 10. P. 800–802. DOI: 10.1109/LCOMM.2009.090840.</mixed-citation>
     <mixed-citation xml:lang="en">Zhou C.V., Leckie C., Ramamohanarao K. Protecting SIP server from CPU-based DoS attacks using history-based IP filtering // IEEE Communications Letters. 2009. Vol. 13. № 10. P. 800–802. DOI: 10.1109/LCOMM.2009.090840.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Zhe C., Rong D. The Formal Analyse of DoS Attack to SIP Based on the SIP Extended Finite State Machines // International Conference on Computational Intelligence and Software Engineering. Wuhan, China, 2010. P. 1–4. DOI: 10.1109/CISE.2010.5676902.</mixed-citation>
     <mixed-citation xml:lang="en">Zhe C., Rong D. The Formal Analyse of DoS Attack to SIP Based on the SIP Extended Finite State Machines // International Conference on Computational Intelligence and Software Engineering. Wuhan, China, 2010. P. 1–4. DOI: 10.1109/CISE.2010.5676902.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Akbar A., Basha S.M., Sattar S.A. Leveraging the SIP load balancer to detect and mitigate DDos attacks // International Conference on Green Computing and Internet of Things (ICGCIoT). Greater Noida, India, 2015. P. 1204–1208. DOI: 10.1109/ICGCIoT.2015.7380646.</mixed-citation>
     <mixed-citation xml:lang="en">Akbar A., Basha S.M., Sattar S.A. Leveraging the SIP load balancer to detect and mitigate DDos attacks // International Conference on Green Computing and Internet of Things (ICGCIoT). Greater Noida, India, 2015. P. 1204–1208. DOI: 10.1109/ICGCIoT.2015.7380646.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Chen Z., Wen W., Yu D. Detecting SIP flooding attacks on IP Multimedia Subsystem (IMS) // International Conference on Computing, Networking and Communications (ICNC. Maui, HI, USA, 2012. P. 154–158. DOI: 10.1109/ICCNC.2012.6167401.</mixed-citation>
     <mixed-citation xml:lang="en">Chen Z., Wen W., Yu D. Detecting SIP flooding attacks on IP Multimedia Subsystem (IMS) // International Conference on Computing, Networking and Communications (ICNC. Maui, HI, USA, 2012. P. 154–158. DOI: 10.1109/ICCNC.2012.6167401.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Fan Z.F., Yang J.R., Wan X.Y. A SIP DoS Flooding Attack Defense Mechanism Based on Custom Weighted Fair Queue Scheduling // International Conference on Multimedia Technology. Ningbo, China, 2010. P. 1–4. DOI: 10.1109/ICMULT.2010.5630386.</mixed-citation>
     <mixed-citation xml:lang="en">Fan Z.F., Yang J.R., Wan X.Y. A SIP DoS Flooding Attack Defense Mechanism Based on Custom Weighted Fair Queue Scheduling // International Conference on Multimedia Technology. Ningbo, China, 2010. P. 1–4. DOI: 10.1109/ICMULT.2010.5630386.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Chen E.Y., Itoh M. A whitelist approach to protect SIP servers from flooding attacks // IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR 2010). Vancouver, BC, Canada, 2010. P. 1–6. DOI: 10.1109/CQR.2010.5619917.</mixed-citation>
     <mixed-citation xml:lang="en">Chen E.Y., Itoh M. A whitelist approach to protect SIP servers from flooding attacks // IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR 2010). Vancouver, BC, Canada, 2010. P. 1–6. DOI: 10.1109/CQR.2010.5619917.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Tas I.M., Unsalver B.G. Baktir S. A Novel SIP Based Distributed Reflection Denial-of-Service Attack and an Effective Defense Mechanism // IEEE Access. 2020. Vol. 8. P. 112574–112584. DOI: 10.1109/ACCESS.2020.3001688.</mixed-citation>
     <mixed-citation xml:lang="en">Tas I.M., Unsalver B.G. Baktir S. A Novel SIP Based Distributed Reflection Denial-of-Service Attack and an Effective Defense Mechanism // IEEE Access. 2020. Vol. 8. P. 112574–112584. DOI: 10.1109/ACCESS.2020.3001688.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Deng X., Shore M. Advanced Flooding Attack on a SIP Server // International Conference on Availability, Reliability and Security. Fukuoka, Japan, 2009. P. 647–651. DOI: 10.1109/ARES.2009.15.</mixed-citation>
     <mixed-citation xml:lang="en">Deng X., Shore M. Advanced Flooding Attack on a SIP Server // International Conference on Availability, Reliability and Security. Fukuoka, Japan, 2009. P. 647–651. DOI: 10.1109/ARES.2009.15.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B16">
    <label>16.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Armoogum S., Mohamudally N. Survey of practical security frameworks for defending SIP based VoIP systems against DoS/DDoS attacks // IST-Africa Conference Proceedings, Pointe aux Piments. Mauritius, 2014. P. 1–11. DOI: 10.1109/ISTAFRICA.2014.6880664.</mixed-citation>
     <mixed-citation xml:lang="en">Armoogum S., Mohamudally N. Survey of practical security frameworks for defending SIP based VoIP systems against DoS/DDoS attacks // IST-Africa Conference Proceedings, Pointe aux Piments. Mauritius, 2014. P. 1–11. DOI: 10.1109/ISTAFRICA.2014.6880664.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B17">
    <label>17.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Bansal A., Pais A.R. Mitigation of Flooding Based Denial of Service Attack against Session Initiation Protocol Based VoIP System // IEEE International Conference on Computational Intelligence &amp; Communication Technology. Ghaziabad, India, 2015. P. 391–396. DOI: 10.1109/CICT.2015.66.</mixed-citation>
     <mixed-citation xml:lang="en">Bansal A., Pais A.R. Mitigation of Flooding Based Denial of Service Attack against Session Initiation Protocol Based VoIP System // IEEE International Conference on Computational Intelligence &amp; Communication Technology. Ghaziabad, India, 2015. P. 391–396. DOI: 10.1109/CICT.2015.66.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B18">
    <label>18.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Chen E.Y. Detecting DoS attacks on SIP systems // 1st IEEE Workshop on VoIP Management and Security. Vancouver, BC, Canada, 2006. P. 53–58. DOI: 10.1109/VOIPMS.2006.1638123.</mixed-citation>
     <mixed-citation xml:lang="en">Chen E.Y. Detecting DoS attacks on SIP systems // 1st IEEE Workshop on VoIP Management and Security. Vancouver, BC, Canada, 2006. P. 53–58. DOI: 10.1109/VOIPMS.2006.1638123.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B19">
    <label>19.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Moh'd A., Tawalbeh L., Sowe A. A novel method to guarantee QoS during DoS attacks for IPTV using SIP // Second International Conference on the Applications of Digital Information and Web Technologies. London, UK, 2009. P. 838–842. DOI: 10.1109/ICADIWT.2009.5273867.</mixed-citation>
     <mixed-citation xml:lang="en">Moh'd A., Tawalbeh L., Sowe A. A novel method to guarantee QoS during DoS attacks for IPTV using SIP // Second International Conference on the Applications of Digital Information and Web Technologies. London, UK, 2009. P. 838–842. DOI: 10.1109/ICADIWT.2009.5273867.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B20">
    <label>20.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Kurt B., Yıldız Ç., Ceritli T.Y., Sankur B., Cemgil A.T. A Bayesian change point model for detecting SIP-based DDoS attacks // Digital Signal Processing. 2018. Vol. 77. P. 48–62. DOI: 10.1016/j.dsp.2017.10.009.</mixed-citation>
     <mixed-citation xml:lang="en">Kurt B., Yıldız Ç., Ceritli T.Y., Sankur B., Cemgil A.T. A Bayesian change point model for detecting SIP-based DDoS attacks // Digital Signal Processing. 2018. Vol. 77. P. 48–62. DOI: 10.1016/j.dsp.2017.10.009.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B21">
    <label>21.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Liu L. Uncovering SIP Vulnerabilities to DoS Attacks Using Coloured Petri Nets // 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. Changsha, China, 2011. P. 29–36. DOI: 10.1109/TrustCom.2011.8.</mixed-citation>
     <mixed-citation xml:lang="en">Liu L. Uncovering SIP Vulnerabilities to DoS Attacks Using Coloured Petri Nets // 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. Changsha, China, 2011. P. 29–36. DOI: 10.1109/TrustCom.2011.8.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B22">
    <label>22.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Stanek J., Kencl L. SIP Protector: Defense architecture mitigating DDoS flood attacks against SIP servers // IEEE International Conference on Communications (ICC). Ottawa, ON, Canada, 2012. P. 6733–6738. DOI: 10.1109/ICC.2012.6364674.</mixed-citation>
     <mixed-citation xml:lang="en">Stanek J., Kencl L. SIP Protector: Defense architecture mitigating DDoS flood attacks against SIP servers // IEEE International Conference on Communications (ICC). Ottawa, ON, Canada, 2012. P. 6733–6738. DOI: 10.1109/ICC.2012.6364674.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B23">
    <label>23.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Hosseinpour M., Hosseini Seno S.A., Yaghmaee Moghaddam M.H., Khosravi Roshkhari H. An anomaly based VoIP DoS attack detection and prevention method using fuzzy logic // 8th International Symposium on Telecommunications (IST). Tehran, Iran, 2016. P. 713–718. DOI: 10.1109/ISTEL.2016.7881916.</mixed-citation>
     <mixed-citation xml:lang="en">Hosseinpour M., Hosseini Seno S.A., Yaghmaee Moghaddam M.H., Khosravi Roshkhari H. An anomaly based VoIP DoS attack detection and prevention method using fuzzy logic // 8th International Symposium on Telecommunications (IST). Tehran, Iran, 2016. P. 713–718. DOI: 10.1109/ISTEL.2016.7881916.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B24">
    <label>24.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Febro A., Xiao H., Spring J. Distributed SIP DDoS Defense with P4 // IEEE Wireless Communications and Networking Conference (WCNC). Marrakesh, Morocco, 2019. P. 1–8. DOI: 10.1109/WCNC.2019.8885926.</mixed-citation>
     <mixed-citation xml:lang="en">Febro A., Xiao H., Spring J. Distributed SIP DDoS Defense with P4 // IEEE Wireless Communications and Networking Conference (WCNC). Marrakesh, Morocco, 2019. P. 1–8. DOI: 10.1109/WCNC.2019.8885926.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B25">
    <label>25.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Zhang G., Fischer-Hübner S. Counteract DNS Attacks on SIP Proxies Using Bloom Filters // International Conference on Availability, Reliability and Security. Regensburg, Germany, 2013. P. 678–684. DOI: 10.1109/ARES.2013.89.</mixed-citation>
     <mixed-citation xml:lang="en">Zhang G., Fischer-Hübner S. Counteract DNS Attacks on SIP Proxies Using Bloom Filters // International Conference on Availability, Reliability and Security. Regensburg, Germany, 2013. P. 678–684. DOI: 10.1109/ARES.2013.89.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B26">
    <label>26.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Cadet F., Fokum D.T. Coping with denial-of-service attacks on the IP telephony system // SoutheastCon 2016. Norfolk, VA, USA, 2016. P. 1–7. DOI: 10.1109/SECON.2016.7506691.</mixed-citation>
     <mixed-citation xml:lang="en">Cadet F., Fokum D.T. Coping with denial-of-service attacks on the IP telephony system // SoutheastCon 2016. Norfolk, VA, USA, 2016. P. 1–7. DOI: 10.1109/SECON.2016.7506691.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B27">
    <label>27.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Tang J., Cheng Y. Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks // IEEE International Conference on Communications (ICC). Kyoto, Japan, 2011. P. 1–5. DOI: 10.1109/icc.2011.5963248.</mixed-citation>
     <mixed-citation xml:lang="en">Tang J., Cheng Y. Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks // IEEE International Conference on Communications (ICC). Kyoto, Japan, 2011. P. 1–5. DOI: 10.1109/icc.2011.5963248.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B28">
    <label>28.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Tang J., Hao Y., Cheng Y., Zhou C. Detection of Resource-Drained Attacks on SIP-Based Wireless VoIP Networks // IEEE Global Telecommunications Conference GLOBECOM 2010. Miami, FL, USA, 2010. P. 1–5. DOI: 10.1109/GLOCOM.2010.5684028.</mixed-citation>
     <mixed-citation xml:lang="en">Tang J., Hao Y., Cheng Y., Zhou C. Detection of Resource-Drained Attacks on SIP-Based Wireless VoIP Networks // IEEE Global Telecommunications Conference GLOBECOM 2010. Miami, FL, USA, 2010. P. 1–5. DOI: 10.1109/GLOCOM.2010.5684028.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B29">
    <label>29.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Tang J., Cheng Y., Zhou C. Sketch-Based SIP Flooding Detection Using Hellinger Distance // GLOBECOM 2009 – 2009 IEEE Global Telecommunications Conference. Honolulu, HI, USA, 2009. P. 1–6. DOI: 10.1109/GLOCOM.2009.5426267.</mixed-citation>
     <mixed-citation xml:lang="en">Tang J., Cheng Y., Zhou C. Sketch-Based SIP Flooding Detection Using Hellinger Distance // GLOBECOM 2009 – 2009 IEEE Global Telecommunications Conference. Honolulu, HI, USA, 2009. P. 1–6. DOI: 10.1109/GLOCOM.2009.5426267.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B30">
    <label>30.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Raza M.A., Khan A.-u.-R., Raza M. A restrictive model (RM) for detection and prevention of INVITE flooding attack // 3rd IEEE International Conference on Computer, Control and Communication (IC4), Karachi, Pakistan, 2013. P. 1–6. DOI: 10.1109/IC4.2013.6653766.</mixed-citation>
     <mixed-citation xml:lang="en">Raza M.A., Khan A.-u.-R., Raza M. A restrictive model (RM) for detection and prevention of INVITE flooding attack // 3rd IEEE International Conference on Computer, Control and Communication (IC4), Karachi, Pakistan, 2013. P. 1–6. DOI: 10.1109/IC4.2013.6653766.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B31">
    <label>31.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Макарова А.К., Поляничева А.В., Саматова К.А. Анализ уязвимостей оборудования передачи голосового трафика // Актуальные проблемы инфотелекоммуникаций в науке и образовании (АПИНО 2022): XI Междунар. науч.-техн. и науч.-метод. конф. СПб.: С.-Петерб. гос. ун-т телекоммуникаций им. проф. М.А. Бонч-Бруевича, 2022. Т. 1. С. 665–669. EDN JRKJAR.</mixed-citation>
     <mixed-citation xml:lang="en">Makarova A.K., Polyanicheva A.V., Samatova K.A. Analiz uyazvimostej oborudovaniya peredachi golosovogo trafika // Aktual'nye problemy infotelekommunikacij v nauke i obrazovanii (APINO 2022): XI Mezhdunar. nauch.-tekhn. i nauch.-metod. konf. SPb.: S.-Peterb. gos. un-t telekommunikacij im. prof. M.A. Bonch-Bruevicha, 2022. T. 1. S. 665–669. EDN JRKJAR.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B32">
    <label>32.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Израилов К.Е., Макарова А.К., Шестаков А.В. Обобщенная модель защиты от кибератак на VOIP // Вопросы кибербезопасности. 2023. № 2 (54). С. 109–121. DOI: 10.21681/2311-3456-2023-2-109-121.</mixed-citation>
     <mixed-citation xml:lang="en">Izrailov K.E., Makarova A.K., SHestakov A.V. Obobshchennaya model' zashchity ot kiberatak na VOIP // Voprosy kiberbezopasnosti. 2023. № 2 (54). S. 109–121. DOI: 10.21681/2311-3456-2023-2-109-121.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B33">
    <label>33.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Израилов К.Е. Модель прогнозирования угроз телекоммуникационной системы на базе искусственной нейронной сети // Вестник ИНЖЭКОНа. Сер.: Технические науки. 2012. № 8 (59). С. 150–153. EDN PJGOAF.</mixed-citation>
     <mixed-citation xml:lang="en">Izrailov K.E. Model' prognozirovaniya ugroz telekommunikacionnoj sistemy na baze iskusstvennoj nejronnoj seti // Vestnik INZHEKONa. Ser.: Tekhnicheskie nauki. 2012. № 8 (59). S. 150–153. EDN PJGOAF.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B34">
    <label>34.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Основные принципы проектирования архитектуры современных систем защиты / М.В. Буйневич [и др.] // Национальная безопасность и стратегическое планирование. 2020. № 3 (31). С. 51–58. DOI: 10.37468/2307-1400-2020-3-51-58.</mixed-citation>
     <mixed-citation xml:lang="en">Osnovnye principy proektirovaniya arhitektury sovremennyh sistem zashchity / M.V. Bujnevich [i dr.] // Nacional'naya bezopasnost' i strategicheskoe planirovanie. 2020. № 3 (31). S. 51–58. DOI: 10.37468/2307-1400-2020-3-51-58.</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
