|
[1]陳文生,「網路電話 (IP電信) 系統規劃與建置」,松崗文魁,Mar. 2005。 [2]賈文康,「SIP 會談啟始協議操典 (第2版) 」,松崗文魁,Apr. 2008。 [3]Peterson, R. Sparks, M. Handlay and E. Schooler,“SIP: Session Initiation Protocol,”IETF RFC 3261, Jun. 2006. [4]H. Schulzrinne, S. Casner, R. Frederick and V. Jacobson,“RTP: A Transport Protocol for Real-time Applications,”IETF RFC3550, Jul. 2003. [5]Agrawal, A., Kumar, K.R.P. and Athithan, G,“SIP/RTP session analysis and tracking for VoIP loggings,”Conference on Networks, 2008. ICON 2008. 16th IEEE International, pp.1-5, Dec. 2008. [6][eval]Peter Thermos,“Evaluating the Security of Enterprise VoIP Networks,” IT Professional, vol. 11, pp. 30-36, May/Jun. 2009. [7]S. McGann and D. Sicker,“An analysis of security threats and tools in SIP-based VoIP systems,”presented at the 2nd Annu. Workshop VoIP Secur., 2005. [8]Butcher, D., Xiangyang Li and Jinhua Guo,“Security Challenge and Defense in VoIP Infrastructures,”IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 1152-1162, Nov. 2007. [9]T. Dierks and E. Rescorla,“The Transport Layer Security (TLS) Protocol,” IETF RFC 5246, Aug. 2008. [10]M. Baugher, D. McGrew, M. Naslund, E. Carrara and K. Nor-rman,“The Secure Real-time Transport Protocol (SRTP) ,”IETF RFC 3711, Mar. 2004. [11]VPN Consortium,“VPN Technologies: Definitions and Requirements,” http://www.vpnc.org/vpn-technologies.html , retrieved on Apr. 2012. [12] H. Son and Y. Lee,“An Anomaly Traffic Detection Method for VoIP Applications using Flow Data,”PAM2009 Student Workshop, 2009. [13] C. Lee, H. Kim, K. Ko, J. Kim, and H. Jeong,“A VoIP Traffic Monitoring System based on NetFlow v9,”International Journal of Advanced Technology, vol. 4, Mar. 2009. [14]Windump , http://www.winpcap.org/windump/, retrieved on Apr. 2012. [15]PHP: Hypertext Preprocessor , http://www.php.net/ , retrieved on Apr. 2012. [16]MySQL , http://www.mysql.com/ , retrieved on Apr. 2012. [17]SIPp, http://sipp.sourceforge.net/index.html, retrieved on Apr. 2012.
|