참고문헌
- S.T. Chow, C. Gustave, and D. Vinokurov, "Authenticating Displayed Names in Telephony," Bell Lab Techn. J., vol. 14, no. 1, 2009, pp. 267-282. https://doi.org/10.1002/bltj.20367
- "Voice Phishing Victims Retrieve Stolen Money," Yonhap News, Mar. 2012.
- J.-H. Chang, "Statistical Model-Based Voice Activity Detection Based on Second-Order Conditional MAP with Soft Decision," ETRI J., vol. 34, no. 2, Apr. 2012, pp. 184-189. https://doi.org/10.4218/etrij.12.0111.0344
- J. Evers, "Security Expert: User Education is Pointless," Oct. 2006. http://news.cnet.com/2100-7350_3-6125213.html
- S. Gorling, "The Myth of User Education," Proc. Virus Bulletin Int. Conf., Oct. 19, 2006.
- J.H. Chang and K.H. Lee, "Voice Phishing Detection Technique Based on Minimum Classification Error Method Incorporating Codec Parameters," IET Signal Process J., vol. 4, no. 5, Oct. 2010, pp. 502-509. https://doi.org/10.1049/iet-spr.2009.0066
- IETF RFC 3261, "SIP: Session Initiation Protocol," June 2002.
- E.-J. Yoon et al., "A Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks," Comput. Commun., vol. 33, no. 14, Sept. 2010, pp. 1674-1681. https://doi.org/10.1016/j.comcom.2010.03.026
- H. Dwivedi, "Unconventional VoIP Security Threats," in Hacking VoIP: Protocols, Attacks, and Countermeasures, No Starch Press, 2008.
- A. Majumder and J. Caffery Jr. "Power Line Communications," IEEE Potentials, vol. 23, no. 4, Oct. 2004, pp. 4-8.
- M. Qadeer and A. Imran, "Asterisk Voice Exchange: An Alternative to Conventional EPBX," Int. Conf. Comput. Electr. Eng., Phuket, Thailand, Dec. 20-22, 2008, pp. 652-656.
- R.P. Ejzak, C.K. Florkey, and R.W. Hemmeter, "Network Overload and Congestion: A Comparison of ISUP and SIP," Bell Labs Techn. J., vol. 9, no. 3, 2004, pp. 173-182.
- ETSI EN 300 356-1, Integrated Services Digital Network (ISDN); Signaling System No. 7; ISDN User Part (ISUP) Version 2 for the International Interface; Part 1: Basic Services, 1999.
- IETF RFC 3398, Integrated Services Digital Network (ISDN) User Part (ISUP) to Session Initiation Protocol (SIP) Mapping, Dec. 2002.
- S.E. Griffn and C.C. Rackley, "Vishing," Proc. Annual Conf. Inf. Security Curriculum Develop., 2008, pp. 33-35.
- F. Maggi, "Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds," IEEE Int. Conf. Comput. Inf. Technol., Bradford, UK, June 29-July 1, 2010, pp. 824-831.
- J. Quittek et al., "On Spam over Internet Telephony (SPIT) Prevention," IEEE Commun. Mag., vol. 46, no. 8, Aug. 2008, pp. 80-86.
- 3GPP TR 33.937, Study of Mechanisms for Protection against Unsolicited Communication for IMS (PUCI), 2012.
- A. Tsakountakis, G. Kambourakis, and S. Gritzalis, "SIPA: Generic and Secure Accounting for SIP," Security Commun. Netw., vol. 5, no. 9, Sept. 2012, pp. 1006-1027. https://doi.org/10.1002/sec.387
- G. Karopoulos, G. Kambourakis, and S. Gritzalis, "PrivaSIP: Adhoc Identity Privacy in SIP," Comput. Standard Interfaces J., vol. 33, no. 3, Mar. 2011, pp. 301-314. https://doi.org/10.1016/j.csi.2010.07.002
- X. Wang et al., "Voice Pharming Attack and the Trust of VoIP," Proc. Int. Conf. Security Privacy Commun. Netw., no. 24, 2008, pp. 1-11.
- M. Nassar et al., "Holistic VoIP Intrusion Detection and Prevention System," Proc. Int. Conf. Principles, Syst. Appl. IP Telecommun., 2007, pp. 1-9.
- 3GPP TS 23.014, Support of Dual Tone Multi-frequency (DTMF) Signaling, 2012.
- 3GPP TS 23.087, User-to-User Signaling (UUS) Supplementary Service; Stage 2, 2012.
- M. Roesch, "Snort - Lightweight Intrusion Detection for Networks," Proc. USENIX Conf. Syst. Administration, 1999, pp. 229-238.
- W. Lee and S.J. Stolfo, "Data Mining Approaches for Intrusion Detection," Proc. USENIX Security Symp., vol. 7, 1998, p. 6.
- R.A. Kemmerer and G. Vigna "Intrusion Detection: A Brief History and Overview," Comput. Mag., vol. 35, no. 4, Apr. 2002, pp. 27-30.
- J. Lennox et al., "Interworking Internet Telephony and Wireless Telecommunications Networks," ACM SIGCOMM Comput. Commun. Rev., vol. 31, no. 5, Oct. 2001, pp. 25-36.
- 3GPP TS 29.002, Mobile Application Part (MAP) Specification, 2011.
- IETF RFC 1034, DOMAIN NAMES - Concepts and Facilities, Nov. 1987.
- ITU-T E.721, Network Grade of Service Parameters and Target Values for Circuit Switched Services in the Evolving ISDN, 1999.
- S.A. Ahson and M. Ilyas, "Measurement and Analysis on Quality of Skype VoIP," in VoIP Handbook: Applications, Technologies, Reliability, and Security, CRC Press, Inc., Dec. 2008.
피인용 문헌
- Host-based intrusion detection system for secure human-centric computing vol.72, pp.7, 2016, https://doi.org/10.1007/s11227-015-1506-9
- End-to-End Detection of Caller ID Spoofing Attacks vol.15, pp.3, 2014, https://doi.org/10.1109/tdsc.2016.2580509