참고문헌
- Rsemberg, H.Schulzrinne, G Camarillo, A.Johnstion, J,Peterson, R.Sparks, M.handly, and E. Schooler, "SIP: Session Initation Protocol." RFC 3261, June 20, 1996.
- Kyung-Hee Kwon, "Protecting Deregistration Attack in SIP Using Delayed Deregistration", Journal of the Korea Contents Association, Vol. 12, No.12, pp.18-23, 2015.
- Mirko Raimondi,https://hakin9.org/voip-hacking-techniques.
- http://www.voip-info.org/
- Yun-Mi Go, Kyung-Hee Kwon, "Expanding the User Authentication Scheme in SIP", Journal of the Korea Contents Association, Vol.11, No.12, pp.88-98, 2011. https://doi.org/10.5392/JKCA.2011.11.12.088
- ETRI, "VoIP technology and market trends", ETRI 2006.
- Ruhul Islam, Smarajit Ghosh "SIP Security Mechanism Techniques on Voice over Internet Protocol(VoIP) System", International Journal of Computer Application In Engineering Science, Vol. 1, issue. 1, pp.94-99, 2011.
- Ha-na Yun, Hyung-Woo Lee, "Stateful SIP Protocol with Enhanced Security for Proactive Response on SIP Attack", Journal of the Korea Contents Association, Vol.10, No.1, pp.46-58, 2010. https://doi.org/10.5392/JKCA.2010.10.1.046
- El Sawda S., Urien P. "SIP Security Attacks and Solutions: A state-of-the-art Review", Information and Communication Technologies, ICTTA'06. 2nd, Vol 2, pp.3187-3191, 2006.
- Yijun Zeng, Omar Cherkaoui "Performance Study of COPS over TLS and IPSec Secure Session" LNCS2506, pp.133-144, Springer-Verlag, Berlin, Heidelberg, 2002.
- https://www.k2esec.com/network-security-protocolsipsec-vs-tlsssl-vs-ssh-part-ii/