{"id":"https://openalex.org/W2556408062","doi":"https://doi.org/10.1109/tifs.2016.2632071","title":"Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling","display_name":"Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling","publication_year":2016,"publication_date":"2016-11-23","ids":{"openalex":"https://openalex.org/W2556408062","doi":"https://doi.org/10.1109/tifs.2016.2632071","mag":"2556408062"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2016.2632071","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2632071","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040531159","display_name":"Diksha Golait","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162141","display_name":"Microsoft (India)","ror":"https://ror.org/04ww0w091","country_code":"IN","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210162141"]},{"id":"https://openalex.org/I64295750","display_name":"Indian Institute of Technology Indore","ror":"https://ror.org/01hhf7w52","country_code":"IN","type":"education","lineage":["https://openalex.org/I64295750"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Diksha Golait","raw_affiliation_strings":["IIT Indore, Indore, India","R&D, Microsoft India, City-Hyderabad, Telangana, India"],"affiliations":[{"raw_affiliation_string":"IIT Indore, Indore, India","institution_ids":["https://openalex.org/I64295750"]},{"raw_affiliation_string":"R&D, Microsoft India, City-Hyderabad, Telangana, India","institution_ids":["https://openalex.org/I4210162141"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028480555","display_name":"Neminath Hubballi","orcid":"https://orcid.org/0000-0001-9669-9773"},"institutions":[{"id":"https://openalex.org/I64295750","display_name":"Indian Institute of Technology Indore","ror":"https://ror.org/01hhf7w52","country_code":"IN","type":"education","lineage":["https://openalex.org/I64295750"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Neminath Hubballi","raw_affiliation_strings":["IIT Indore, Indore, India"],"affiliations":[{"raw_affiliation_string":"IIT Indore, Indore, India","institution_ids":["https://openalex.org/I64295750"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5040531159"],"corresponding_institution_ids":["https://openalex.org/I4210162141","https://openalex.org/I64295750"],"apc_list":null,"apc_paid":null,"fwci":1.3938,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.84125909,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"12","issue":"3","first_page":"730","last_page":"745"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11125","display_name":"Petri Nets in System Modeling","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8445019721984863},{"id":"https://openalex.org/keywords/session-initiation-protocol","display_name":"Session Initiation Protocol","score":0.7902690172195435},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7406454086303711},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.7254703044891357},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.7005687952041626},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6775909066200256},{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.6135879755020142},{"id":"https://openalex.org/keywords/stateless-protocol","display_name":"Stateless protocol","score":0.5880147218704224},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3425135612487793},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.2954660952091217},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20467033982276917},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.13492238521575928}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8445019721984863},{"id":"https://openalex.org/C41878487","wikidata":"https://www.wikidata.org/wiki/Q191018","display_name":"Session Initiation Protocol","level":3,"score":0.7902690172195435},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7406454086303711},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.7254703044891357},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.7005687952041626},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6775909066200256},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.6135879755020142},{"id":"https://openalex.org/C103613024","wikidata":"https://www.wikidata.org/wiki/Q230924","display_name":"Stateless protocol","level":3,"score":0.5880147218704224},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3425135612487793},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.2954660952091217},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20467033982276917},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.13492238521575928}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2016.2632071","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2632071","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W57218725","https://openalex.org/W138607541","https://openalex.org/W1486103693","https://openalex.org/W1504192099","https://openalex.org/W1519361431","https://openalex.org/W1562236607","https://openalex.org/W1587663028","https://openalex.org/W1968002881","https://openalex.org/W1975113377","https://openalex.org/W1977616396","https://openalex.org/W1988909165","https://openalex.org/W1989098493","https://openalex.org/W1989816772","https://openalex.org/W2040328877","https://openalex.org/W2057729437","https://openalex.org/W2068572856","https://openalex.org/W2081281113","https://openalex.org/W2093942808","https://openalex.org/W2095953397","https://openalex.org/W2096159591","https://openalex.org/W2101508170","https://openalex.org/W2104175528","https://openalex.org/W2110822847","https://openalex.org/W2122754944","https://openalex.org/W2130549302","https://openalex.org/W2145083203","https://openalex.org/W2153692371","https://openalex.org/W2154521828","https://openalex.org/W2155322560","https://openalex.org/W2159205978","https://openalex.org/W2164225237","https://openalex.org/W2169089774","https://openalex.org/W2295783870","https://openalex.org/W2477190870","https://openalex.org/W2509841691","https://openalex.org/W3015681923","https://openalex.org/W4241372395","https://openalex.org/W6602341554","https://openalex.org/W6629181655","https://openalex.org/W6630129321","https://openalex.org/W6682520190"],"related_works":["https://openalex.org/W2035312053","https://openalex.org/W2908539414","https://openalex.org/W112987992","https://openalex.org/W4246017188","https://openalex.org/W2234619324","https://openalex.org/W4298846198","https://openalex.org/W358240276","https://openalex.org/W17249245","https://openalex.org/W2398270998","https://openalex.org/W3094791883"],"abstract_inverted_index":{"Session":[0],"initiation":[1],"protocol":[2,8,23],"(SIP)":[3],"is":[4,24,150],"an":[5],"application":[6],"layer":[7],"used":[9],"for":[10,68],"signaling":[11],"purposes":[12],"to":[13,26,113,162],"manage":[14],"voice":[15],"over":[16],"IP":[17],"connections.":[18],"SIP":[19,41,77,84,89,118,161,207],"being":[20],"a":[21,27,98,131,163,180,201],"text-based":[22],"vulnerable":[25],"range":[28],"of":[29,31,59,117,125,139,165,173,182,214],"denial":[30],"service":[32],"(DoS)":[33],"attacks.":[34],"These":[35],"DoS":[36,60,158,195],"attacks":[37,64,67,71,81,159,196,218],"can":[38,128,170,189],"render":[39],"the":[40,88,115,137,211],"servers/SIP":[42],"proxy":[43],"servers":[44,78],"unusable":[45],"by":[46],"depleting":[47],"memory":[48],"and":[49,65,75,96,145,176,192,209],"CPU":[50],"time.":[51],"In":[52],"this":[53],"paper,":[54],"we":[55,104,155],"consider":[56],"two":[57],"types":[58,124],"attacks,":[61],"namely,":[62],"flooding":[63],"coordinated":[66,80],"detection.":[69],"Flooding":[70],"affect":[72,82],"both":[73],"stateless":[74],"stateful":[76,83],"while":[79],"servers.":[85],"We":[86,120,199],"model":[87],"operation":[90],"as":[91,106],"discrete":[92],"event":[93],"system":[94],"(DES)":[95],"design":[97],"new":[99],"state":[100],"transition":[101],"machine,":[102],"which":[103,134,149],"name":[105],"probabilistic":[107],"counting":[108],"deterministic":[109],"timed":[110],"automata":[111],"(PCDTA)":[112],"describe":[114],"behavior":[116],"operations.":[119],"also":[121],"identify":[122],"different":[123],"anomalies":[126],"that":[127],"occur":[129],"in":[130,136,147,160,167,197],"DES":[132],"model,":[133],"appear":[135,146],"form":[138],"illegal":[140],"transitions,":[141],"violating":[142],"timing":[143],"constraints,":[144],"number":[148],"otherwise":[151],"not":[152],"seen.":[153],"Subsequently,":[154],"map":[156],"various":[157,174,194,217],"type":[164],"anomaly":[166],"DES.":[168],"PCDTA":[169,188,215],"learn":[171],"probabilities":[172],"transitions":[175],"timings":[177],"delay":[178],"from":[179],"set":[181],"nonmalicious":[183],"training":[184],"sequences.":[185],"A":[186],"trained":[187],"detect":[190],"anomalies,":[191],"hence":[193],"SIP.":[198],"perform":[200],"thorough":[202],"experiment":[203],"with":[204],"computer":[205],"simulated":[206],"traffic":[208],"report":[210],"detection":[212],"performance":[213],"on":[216],"generated":[219],"through":[220],"custom":[221],"scripts.":[222]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
