VoIP Applications-2

An Anomaly Traffic Detection Method for VoIP Applications using Flow Data

FREE-DOWNLOAD [PDF] H Son… – PAM2009 Student Workshop, 2009
ABSTRACT Recently VoIP applications have been popular due to the wide deployment of the
wired/wireless Internet. Commer- cial VoIP services typically employ SIP and RTP for signal-
ing and media transport protocols. Therefore, the VoIP ser- vice is vulnerable to a lot of