H. J. Abdelnur, T. Avanesov, M. Rusinowitch, and R. State, Abusing SIP Authentication, 2008 The Fourth International Conference on Information Assurance and Security, pp.237-242, 2008.
DOI : 10.1109/IAS.2008.29

URL : https://hal.archives-ouvertes.fr/inria-00405356

H. J. Abdelnur, R. State, I. Chrisment, and C. Popi, Assessing the security of VoIP Services, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, 2007.
DOI : 10.1109/INM.2007.374802

URL : https://hal.archives-ouvertes.fr/inria-00148363

H. J. Abdelnur and R. , State, and O. Festor. a method for fingerprinting : cas 193, 2007.

H. J. Abdelnur, R. State, and O. Festor, KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.47-56, 2007.
DOI : 10.1145/1326304.1326313

URL : https://hal.archives-ouvertes.fr/inria-00166947

H. J. Abdelnur, R. State, and O. Festor, Advanced Network Fingerprinting, RAID '08 : Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, pp.372-389, 2008.
DOI : 10.1007/978-3-540-87403-4_20

URL : https://hal.archives-ouvertes.fr/inria-00326054

H. J. Abdelnur, R. State, and O. Festor, Failles et VoIP, MISC Magazine -Edition française : Multi-System & Internet Security Cookbook. Misc #39, 2008.

H. J. Abdelnur, R. State, and O. Festor, Fuzzing for vulnerabilities in the VoIP space, EICAR '08 : 17th Annual Conference of the European Institute for Computer Anti-Virus Research, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00326086

R. Badonnel, R. State, and O. Festor, Management of mobile ad-hoc networks: evaluating the network behavior, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005., pp.17-30
DOI : 10.1109/INM.2005.1440766

URL : https://hal.archives-ouvertes.fr/inria-00000227

R. Badonnel, R. State, and O. Festor, Management of mobile ad hoc networks: information model and probe-based architecture, International Journal of Network Management, vol.1, issue.5, pp.335-347, 2005.
DOI : 10.1002/nem.577

URL : https://hal.archives-ouvertes.fr/inria-00000257

R. Badonnel, R. State, and O. Festor, Fault Monitoring in Ad-Hoc Networks Based on Information Theory, Lecture Notes in Computer Science, vol.29, issue.4, pp.427-438, 2006.
DOI : 10.1109/18.761251

URL : https://hal.archives-ouvertes.fr/inria-00090211

R. Badonnel, R. State, and O. Festor, Probabilistic Management of Ad-Hoc Networks, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 2006.
DOI : 10.1109/NOMS.2006.1687564

URL : https://hal.archives-ouvertes.fr/inria-00090206

R. Badonnel, R. State, and O. Festor, Probabilistic Management of Ad-Hoc Networks, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, pp.339-350
DOI : 10.1109/NOMS.2006.1687564

URL : https://hal.archives-ouvertes.fr/inria-00090206

R. Badonnel, R. State, and O. Festor, A probabilistic approach for managing mobile ad-hoc networks, IEEE Transactions on Network and Service Management, vol.4, issue.1, 2007.
DOI : 10.1109/TNSM.2007.030104

URL : https://hal.archives-ouvertes.fr/inria-00153555

R. Badonnel, R. State, and O. Festor, Self-configurable fault monitoring in ad-hoc networks, Ad Hoc Networks, vol.6, issue.3, pp.458-473, 2008.
DOI : 10.1016/j.adhoc.2007.04.001

URL : https://hal.archives-ouvertes.fr/inria-00153604

R. Badonnel, R. State, O. Festor, and A. Schaff, A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks, Journal of Network and Systems Management, vol.26, issue.12, pp.479-497, 2005.
DOI : 10.1007/s10922-005-9008-3

URL : https://hal.archives-ouvertes.fr/inria-00000235

A. Ben-hur, D. Horn, H. T. Siegelmann, and V. Vapnik, Support vector clustering, Scholarpedia, vol.3, issue.6, pp.125-137, 2001.
DOI : 10.4249/scholarpedia.5187

D. Buttler, A Short Survey of Document Structure Similarity Algorithms, The 5th International Conference on Internet Computing, 2005.

W. Chen, N. Jain, and S. Singh, ANMP: ad hoc network management protocol, IEEE Journal on Selected Areas in Communications, vol.17, issue.8, pp.1506-1531, 1999.
DOI : 10.1109/49.780355

T. Clausen and P. Jacquet, Optimized Link State Routing (OLSR) Protocol, 2003.
DOI : 10.17487/rfc3626

URL : https://hal.archives-ouvertes.fr/inria-00471712

C. Cortes and V. Vapnik, Support-vector networks, Machine Learning, pp.273-297, 1995.
DOI : 10.1007/BF00994018

V. Cridlig, H. J. Abdelnur, R. State, and O. Festor, A voip security management architecture, Hellerstein and Stiller

V. Cridlig, H. J. Abdelnur, R. State, and O. Festor, XBGP-MAN: an XML management architecture for BGP, International Journal of Network Management, vol.42, issue.4, pp.295-309, 2006.
DOI : 10.1002/nem.600

V. Cridlig, O. Festor, and R. State, Role-Based Access Control for XML Enabled Management Gateways, Lecture Notes in Computer Science, vol.13, pp.183-195, 2004.
DOI : 10.1145/775412.775421

URL : https://hal.archives-ouvertes.fr/inria-00100139

V. Cridlig, R. State, and O. Festor, An integrated security framework for XML based management, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005., pp.587-600
DOI : 10.1109/INM.2005.1440831

URL : https://hal.archives-ouvertes.fr/inria-00000213

V. Cridlig, R. State, and O. Festor, Role-Based Access Control for XML enabled multi-protocol management gateways, IEEE Transactions on Network and Service Management, vol.3, issue.1, 2006.
DOI : 10.1109/TNSM.2006.4798304

URL : https://hal.archives-ouvertes.fr/inria-00001222

V. Cridlig, R. State, and O. Festor, A model for checking consistency in access control policies for network management, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pp.11-19, 2007.
DOI : 10.1109/INM.2007.374765

URL : https://hal.archives-ouvertes.fr/inria-00172054

M. Crispin, Internet Message Access Protocol -Version 4rev1, Mar. 2003. Updated by RFCs 4466, pp.4551-5032

W. H. Day and H. Edelsbrunner, Efficient algorithms for agglomerative hierarchical clustering methods, Journal of Classification, vol.25, issue.1, pp.7-24, 1984.
DOI : 10.1007/BF01890115

D. Comer and J. C. Lin, Probing TCP implementations, USENIX Summer, pp.245-255, 1994.

D. Endler and M. Collier, Hacking Exposed VoIP : Voice Over IP Security Secrets and Solutions, 2007.

J. Francois, H. J. Abdelnur, R. State, and O. Festor, Behavioral Fingerprinting, RAID '09 : Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00406482

S. G. Glisic, Advanced Wireless Networks: 4G Technologies, 2006 IEEE Ninth International Symposium on Spread Spectrum Techniques and Applications, 2006.
DOI : 10.1109/ISSSTA.2006.311811

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.643.6326

D. Harrington, R. Presuhn, and B. Wijnen, An Architecture for Describing Simple Network Management Protocol (SNMP) Management FrameWorks, 2002.
DOI : 10.17487/rfc3411

J. Klensin, Simple Mail Transfer Protocol, 2001.

C. Krügel, T. Toth, and E. Kirda, Service specific anomaly detection for network intrusion detection, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.201-208, 2002.
DOI : 10.1145/508791.508835

D. Lee, D. Chen, R. Hao, R. Miller, J. Wu et al., A formal approach for passive testing of protocol data portions, 10th IEEE International Conference on Network Protocols, 2002. Proceedings., pp.122-131, 2002.
DOI : 10.1109/ICNP.2002.1181393

M. Nassar, S. Niccolini, R. State, and T. Ewald, Holistic VoIP intrusion detection and prevention system, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.1-9, 2007.
DOI : 10.1145/1326304.1326306

URL : https://hal.archives-ouvertes.fr/inria-00169036

M. Nassar, R. State, and O. Festor, Intrusion detections mechanisms for VoIP applications, Third annual security workshop (VSW'06, 2006.

M. Nassar, R. State, and O. Festor, VoIP Honeypot Architecture, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, 2007.
DOI : 10.1109/INM.2007.374775

URL : https://hal.archives-ouvertes.fr/inria-00149554

M. Nassar, R. State, and O. Festor, Monitoring SIP Traffic Using Support Vector Machines, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID '08), pp.311-330, 2008.
DOI : 10.1007/978-3-540-87403-4_17

URL : https://hal.archives-ouvertes.fr/inria-00325290

C. Prehofer and C. Bettstetter, Self-organization in communication networks: principles and design paradigms, IEEE Communications Magazine, vol.43, issue.7, pp.78-85, 2005.
DOI : 10.1109/MCOM.2005.1470824

G. Shu and D. Lee, Network Protocol System Fingerprinting - A Formal Approach, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-12, 2006.
DOI : 10.1109/INFOCOM.2006.157

G. Wagener, R. State, A. Dulaunoy, and T. Engel, Self Adaptive High Interaction Honeypots Driven by Game Theory, Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, 2009.
DOI : 10.1007/978-3-642-05118-0_51

. Mpack, Insight into MPACK Hacker kit

H. Abdelnur, T. Avanesov, M. Rusinowitch, and R. State, Abusing SIP Authentication, 2008 The Fourth International Conference on Information Assurance and Security, pp.237-242, 2008.
DOI : 10.1109/IAS.2008.29

URL : https://hal.archives-ouvertes.fr/inria-00405356

H. Abdelnur, R. State, I. Chrisment, and C. Popi, Assessing the security of VoIP Services, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pp.373-382, 2007.
DOI : 10.1109/INM.2007.374802

URL : https://hal.archives-ouvertes.fr/inria-00148363

H. Abdelnur, R. State, and O. Festor, Security Advisory: SIP Digest Access Authentication RELAY-ATTACK for Toll-Fraud, 2007.

H. Abdelnur, R. State, and O. Festor, Security Advisory: SQL injection in asteriskaddons and XSS injection in WWW application in Areski, FreePBX and Trixbox, 2007.

H. Abdelnur, R. State, and O. Festor, Fuzzing for vulnerabilities in the VoIP space, 17th EICAR Annual Conference 17th EICAR Annual Conference European Institute for Computer Antivirus Research, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00326086

H. J. Abdelnur, T. Avanesov, M. Rusinowitch, and R. State, Abusing SIP Authentication, 2008 The Fourth International Conference on Information Assurance and Security, pp.237-242, 2008.
DOI : 10.1109/IAS.2008.29

URL : https://hal.archives-ouvertes.fr/inria-00405356

H. J. Abdelnur, T. Avanesov, M. Rusinowitch, and R. State, Abusing SIP Authentication, 2008 The Fourth International Conference on Information Assurance and Security, 2009.
DOI : 10.1109/IAS.2008.29

URL : https://hal.archives-ouvertes.fr/inria-00405356

H. J. Abdelnur, R. State, and O. Festor, KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.47-56, 2007.
DOI : 10.1145/1326304.1326313

URL : https://hal.archives-ouvertes.fr/inria-00166947

H. J. Abdelnur, R. State, and O. Festor, Advanced Network Fingerprinting, RAID '08: Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, pp.372-389, 2008.
DOI : 10.1007/978-3-540-87403-4_20

URL : https://hal.archives-ouvertes.fr/inria-00326054

H. J. Abdelnur, R. State, and O. Festor, Failles et VoIP, MISC Magazine -Edition française: Multi-System & Internet Security Cookbook. Misc #39, 2008.

H. J. Abdelnur, R. State, and O. Festor, Fuzzing for vulnerabilities in the VoIP space, EICAR '08: 17th Annual Conference of the European Institute for Computer Anti-Virus Research, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00326086

H. J. Abdelnur, R. State, and O. Festor, Fuzzing for vulnerabilities in the VoIP space, ACM International Journal of Computer Virology, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00326086

D. Angluin, Learning regular sets from queries and counterexamples, Information and Computation, vol.75, issue.2, pp.87-106, 1987.
DOI : 10.1016/0890-5401(87)90052-6

R. Badonnel, R. State, and O. Festor, Management of mobile ad-hoc networks: evaluating the network behavior, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005., pp.17-30
DOI : 10.1109/INM.2005.1440766

URL : https://hal.archives-ouvertes.fr/inria-00000227

R. Badonnel, R. State, and O. Festor, Management of mobile ad hoc networks: information model and probe-based architecture, International Journal of Network Management, vol.1, issue.5, pp.335-347, 2005.
DOI : 10.1002/nem.577

URL : https://hal.archives-ouvertes.fr/inria-00000257

R. Badonnel, R. State, and O. Festor, Fault Monitoring in Ad-Hoc Networks Based on Information Theory, Lecture Notes in Computer Science, vol.29, issue.4, pp.427-438
DOI : 10.1109/18.761251

URL : https://hal.archives-ouvertes.fr/inria-00090211

R. Badonnel, R. State, and O. Festor, Probabilistic Management of Ad-Hoc Networks, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, pp.339-350
DOI : 10.1109/NOMS.2006.1687564

URL : https://hal.archives-ouvertes.fr/inria-00090206

R. Badonnel, R. State, and O. Festor, A probabilistic approach for managing mobile ad-hoc networks, 2007. [33] R. Badonnel, R. State, and O. Festor. Self-configurable fault monitoring in ad-hoc networks
DOI : 10.1109/TNSM.2007.030104

URL : https://hal.archives-ouvertes.fr/inria-00153555

R. Badonnel, R. State, O. Festor, and A. Schaff, A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks, Journal of Network and Systems Management, vol.26, issue.12, pp.479-497, 2005.
DOI : 10.1007/s10922-005-9008-3

URL : https://hal.archives-ouvertes.fr/inria-00000235

V. A. Balasubramaniyan, M. Ahamad, and H. Park, CallRank: Combating SPIT using call duration, social networks and global reputation, Fourth Conference on Email and Anti-Spam (CEAS2007), 2007.

P. Baldi, S. Brunak, Y. Chauvin, C. A. Andersen, and H. Nielsen, Assessing the accuracy of prediction algorithms for classification: an overview, Bioinformatics, vol.16, issue.5, pp.412-436, 2000.
DOI : 10.1093/bioinformatics/16.5.412

G. Banks, M. Cova, V. Felmetsger, K. C. Almeroth, R. A. Kemmerer et al., SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr, In of Lecture Notes in Computer Science, pp.343-358, 2006.
DOI : 10.1007/11836810_25

S. Becker, R. State, and T. Engel, Using game theory to configure P2P SIP, Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications, IPTComm '09, 2009.
DOI : 10.1145/1595637.1595645

M. Beddoe, Protocol informatics

A. Ben-hur, D. Horn, H. T. Siegelmann, and V. Vapnik, Support vector clustering, Scholarpedia, vol.3, issue.6, pp.125-137, 2001.
DOI : 10.4249/scholarpedia.5187

P. Berkhin, A Survey of Clustering Data Mining Techniques, Grouping Multidimensional Data, pp.25-71, 2006.
DOI : 10.1007/3-540-28349-8_2

D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, Revealing skype traffic, ACM SIGCOMM Computer Communication Review, vol.37, issue.4, pp.37-48, 2007.
DOI : 10.1145/1282427.1282386

A. Broder, On the resemblance and containment of documents, Proceedings. Compression and Complexity of SEQUENCES 1997 (Cat. No.97TB100171), 1997.
DOI : 10.1109/SEQUEN.1997.666900

D. Bruschi, L. Martignoni, and M. Monga, Recognizing self-mutating malware by code normalization and control-flow graph analysis, IEEE Security & Privacy, 2007.
DOI : 10.1007/11790754_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.7758

L. Butti and J. Tinnes, Discovering and exploiting 802.11 wireless driver vulnerabilities, Journal in Computer Virology, vol.4, issue.1, pp.25-37, 2008.
DOI : 10.1007/s11416-007-0065-x

D. Buttler, A Short Survey of Document Structure Similarity Algorithms, The 5th International Conference on Internet Computing, 2005.

J. Caballero, S. Venkataraman, P. Poosankam, M. G. Kang, D. Song et al., FiG: Automatic Fingerprint Generation, The 14th Annual Network & Distributed System Security Conference, 2007.

J. Caballero, H. Yin, Z. Liang, and D. Song, Polyglot, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.317-329, 2007.
DOI : 10.1145/1315245.1315286

C. Chang and C. Lin, LIBSVM, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, 2001.
DOI : 10.1145/1961189.1961199

C. Chang and C. Lin, LIBSVM, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, 2001.
DOI : 10.1145/1961189.1961199

E. Chen, Detecting DoS attacks on SIP systems, 1st IEEE Workshop on VoIP Management and Security, 2006., pp.53-58, 2006.
DOI : 10.1109/VOIPMS.2006.1638123

M. Christodorescu, S. Jha, and C. Kruegel, Mining specifications of malicious behavior, ESEC-FSE '07: Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, pp.5-14, 2007.

M. Collins and N. Duffy, New ranking algorithms for parsing and tagging, Proceedings of the 40th Annual Meeting on Association for Computational Linguistics , ACL '02, 2002.
DOI : 10.3115/1073083.1073128

C. Cortes and V. Vapnik, Support-vector networks, Machine Learning, pp.273-297, 1995.
DOI : 10.1007/BF00994018

V. Cridlig, H. J. Abdelnur, R. State, and O. Festor, A voip security management architecture, Hellerstein and Stiller

V. Cridlig, H. J. Abdelnur, R. State, and O. Festor, XBGP-MAN: an XML management architecture for BGP, International Journal of Network Management, vol.42, issue.4, pp.295-309, 2006.
DOI : 10.1002/nem.600

V. Cridlig, O. Festor, and R. State, Role-Based Access Control for XML Enabled Management Gateways, Lecture Notes in Computer Science, vol.13, pp.183-195, 2004.
DOI : 10.1145/775412.775421

URL : https://hal.archives-ouvertes.fr/inria-00100139

V. Cridlig, R. State, and O. Festor, An integrated security framework for XML based management, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005., pp.587-600
DOI : 10.1109/INM.2005.1440831

URL : https://hal.archives-ouvertes.fr/inria-00000213

V. Cridlig, R. State, and O. Festor, Role-based access control for xml enabled multiprotocol management gateways, IEEE Transactions on Network and Service Management, vol.2, issue.1, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00001222

V. Cridlig, R. State, and O. Festor, A model for checking consistency in access control policies for network management, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pp.11-19, 2007.
DOI : 10.1109/INM.2007.374765

URL : https://hal.archives-ouvertes.fr/inria-00172054

M. Crispin, Internet Message Access Protocol -Version 4rev1, Mar. 2003. Updated by RFCs 4466, pp.4551-5032
DOI : 10.17487/rfc2060

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.179.184

N. Cristianini and J. Shawe-taylor, An introduction to support Vector Machines: and other kernel-based learning methods, 2000.
DOI : 10.1017/CBO9780511801389

D. H. Crocker and P. Overell, Augmented BNF for Syntax Specifications: ABNF, 1997.

W. Cui, V. Paxson, N. Weaver, and R. H. Katz, Protocol-Independent Adaptive Replay of Application Dialog, NDSS, 2006.

W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irun-briz, Tupni, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.391-4027, 1984.
DOI : 10.1145/1455770.1455820

R. Debnath, N. Takahide, and H. Takahashi, A decision based one-against-one method for multi-class support vector machine, Pattern Analysis and Applications, vol.7, issue.2, pp.164-175, 2004.
DOI : 10.1007/s10044-004-0213-6

D. E. Denning, An intrusion-detection model, IEEE Symposium on Security and Privacy, pp.118-133, 1986.

D. Comer and J. C. Lin, Probing TCP implementations, USENIX Summer, pp.245-255, 1994.

M. Dutta, A. Mahanta, and A. Pujari, QROCK: A quick version of the ROCK algorithm for clustering of categorical data, Pattern Recognition Letters, vol.26, issue.15, pp.2364-2373, 2005.
DOI : 10.1016/j.patrec.2005.04.008

S. Embleton, S. Sparks, and R. Cunningham, Sidewinder: An Evolutionary Guidance System for Malicious Input Crafting, 2006.

D. Endler and M. Collier, Hacking Exposed VoIP: Voice Over IP Security Secrets and Solutions, 2007.

D. Endler, D. Ghosal, R. Jafari, A. K. Kolenko, N. Nguyen et al., VoIP Security and Privacy Threat Taxonomy. VOIPSA, 2005.

J. Fiedler, S. Kupka, T. Ehlert, D. Magedanz, and . Sisalem, VoIP defender, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, 2007.
DOI : 10.1145/1326304.1326307

J. Francois, H. J. Abdelnur, R. State, and O. Festor, Behavioral Fingerprinting, RAID '09: Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00406482

K. Gopalratnam, S. Basu, J. Dunagan, and H. J. Wang, Automatically Extracting Fields from Unknown Network Protocols, Systems and Machine Learning Workshop, 2006.

K. Gopalratnam, S. Basu, J. Dunagan, and H. J. Wang, Automatically extracting fields from unknown network protocols, 2006.

P. Haffner, S. Sen, O. Spatscheck, and D. Wang, ACAS, Proceeding of the 2005 ACM SIGCOMM workshop on Mining network data , MineNet '05, pp.197-202, 2005.
DOI : 10.1145/1080173.1080183

C. Hsu and C. Lin, A comparison of methods for multiclass support vector machines, Neural Networks IEEE Transactions on, vol.13, issue.2, pp.415-425, 2002.

A. B. Johnston and D. M. Piscitello, Understanding Voice over Ip Security, Artech, 2006.

R. Kaksonen, A Functional Method for Assessing Protocol Implementation Security, 2001.

H. J. Kang, Z. Zhang, S. Ranjan, and A. Nucci, SIP-based VoIP traffic behavior profiling and its applications, Proceedings of the 3rd annual ACM workshop on Mining network data , MineNet '07, pp.39-44, 2007.
DOI : 10.1145/1269880.1269891

J. Klensin, Simple Mail Transfer Protocol, 2001.
DOI : 10.17487/rfc5321

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.184.8066

P. Kolan and R. Dantu, Socio-technical defense against voice spamming, ACM Transactions on Autonomous and Adaptive Systems, vol.2, issue.1, 2007.
DOI : 10.1145/1216895.1216897

C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna, Automating mimicry attacks using static binary analysis, SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium, pp.11-11, 2005.

C. Krügel, T. Toth, and E. Kirda, Service specific anomaly detection for network intrusion detection, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.201-208, 2002.
DOI : 10.1145/508791.508835

A. Lahmadi and O. Festor, SecSip: A Stateful Firewall for SIP-based Networks Long Island États-Unis d'Amérique, 11th IFIP/IEEE International Symposium on Integrated Network Management -IM 2009, 2009.

D. Lee, D. Chen, R. Hao, R. Miller, J. Wu et al., A formal approach for passive testing of protocol data portions, 10th IEEE International Conference on Network Protocols, 2002. Proceedings., pp.122-131, 2002.
DOI : 10.1109/ICNP.2002.1181393

C. Leita, K. Mermoud, and M. Dacier, ScriptGen: an automated script generation tool for honeyd, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.203-214, 2005.
DOI : 10.1109/CSAC.2005.49

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.3033

Z. Lin, X. Jiang, D. Xu, and X. Zhang, Automatic protocol format reverse engineering through conectect-aware monitored execution, 15th Symposium on Network and Distributed System Security (NDSS), 2008.

D. Litchfield, C. Anley, J. Heasman, and B. Grindlay, The Database Hacker's Handbook: Defending Database Servers, 2005.

A. M. Swimmer and B. L. Charlier, Dynamic detection and classification of computer viruses using general behavior patterns, Proceedings of the 5th International Virus Bulletin Conference, pp.75-88, 1995.

J. Ma, K. Levchenko, C. Kreibich, S. Savage, G. M. Voelker et al., Unexpected means of protocol inference Transport and application protocol scrubbing, INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, pp.1381-1390, 2000.

M. Maloof, Machine Learning and Data Mining for Computer Security: Methods and Applications, 2005.
DOI : 10.1007/1-84628-253-5

P. M. Maurer, Generating test data with enhanced context-free grammars, IEEE Software, vol.7, issue.4, pp.50-55, 1990.
DOI : 10.1109/52.56422

A. Moschitti, Efficient Convolution Kernels for Dependency and Constituent Syntactic Trees, ECML: Proceedings of the 17th European Conference on Machine Learning, 2006.
DOI : 10.1007/11871842_32

A. Moschitti, Making tree kernels practical for natural language learning, Proceedings of the Eleventh International Conference on European Association for Computational Linguistics, 2006.

A. Moschitti, D. Pighin, and R. Basili, Tree kernel engineering for proposition re-ranking, Proceedings of Mining and Learning with Graphs, 2006.

S. Mukkamala, G. Janoski, and A. Sung, Intrusion detection: Support vector machines and neural networks. The IEEE Computer Society Student Magazine, 2002.

J. F. Nash, Non-Cooperative Games, The Annals of Mathematics, vol.54, issue.2, pp.286-295, 1951.
DOI : 10.2307/1969529

M. Nassar, S. Niccolini, R. State, and T. Ewald, Holistic VoIP intrusion detection and prevention system, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.1-9, 2007.
DOI : 10.1145/1326304.1326306

URL : https://hal.archives-ouvertes.fr/inria-00169036

M. Nassar, R. State, and O. Festor, Intrusion detections mechanisms for VoIP applications, Third annual security workshop (VSW'06, 2006.

M. Nassar, R. State, and O. Festor, VoIP Honeypot Architecture, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pp.109-118, 2007.
DOI : 10.1109/INM.2007.374775

URL : https://hal.archives-ouvertes.fr/inria-00149554

M. Nassar, R. State, and O. Festor, Monitoring SIP Traffic Using Support Vector Machines, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID '08), pp.311-330, 2008.
DOI : 10.1007/978-3-540-87403-4_17

URL : https://hal.archives-ouvertes.fr/inria-00325290

J. Newsome, D. Brumley, J. Franklin, and D. Song, Replayer, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.311-321, 2006.
DOI : 10.1145/1180405.1180444

S. Niccolini, R. Garroppo, S. Giordano, G. Risi, and S. Ventura, SIP intrusion detection and prevention: recommendations and prototype implementation, 1st IEEE Workshop on VoIP Management and Security, 2006., pp.47-52, 2006.
DOI : 10.1109/VOIPMS.2006.1638122

P. Ning and S. Jajodia, Intrusion Detection in Distributed Systems: An Abstraction-Based Approach, 2003.
DOI : 10.1007/978-1-4615-0467-2

T. Porter, Practical VoIP Security, 2006.

J. Quittek, S. Niccolini, S. Tartarelli, M. Stiemerling, M. Brunner et al., Detecting SPIT Calls by Checking Human Communication Patterns, 2007 IEEE International Conference on Communications, 2007.
DOI : 10.1109/ICC.2007.329

B. Reynolds and D. Ghosal, Secure IP Telephony using Multi-layered Protection, Proceedings of The 10th Annual Network and Distributed System Security Symposium, 2003.

R. L. Rivest and R. E. Schapire, Inference of finite automata using homing sequences, STOC '89: Proceedings of the twenty-first annual ACM symposium on Theory of computing, pp.411-420, 1989.

U. Roedig, R. Ackermann, and R. Steinmetz, Evaluating and improving firewalls for iptelephony environments, 1st IP telephony workshop, 2000.

R. E. Schapire, Diversity-based inference of finite automata, 1988.

H. Scholz, SIP Stack Fingerprinting and Stack Difference Attacks, Black Hat Briefings, 2006.

H. Sengar, R. Dantu, and D. Wijesekera, Securing VoIP and PSTN from integrated signaling network vulnerabilities, 1st IEEE Workshop on VoIP Management and Security, 2006., 2006.
DOI : 10.1109/VOIPMS.2006.1638116

H. Sengar, H. Wang, D. Wijesekera, and S. Jajodia, Detecting VoIP Floods using the Hellinger Distance. Transactions on Parallel and Distributed Systems : Accepted for future publication, 2007.

D. Shin and C. Shim, Progressive multi gray-leveling: a voice spam protection algorithm, IEEE Network, vol.20, issue.5, pp.18-24, 2006.
DOI : 10.1109/MNET.2006.1705879

G. Shu and D. Lee, Network Protocol System Fingerprinting - A Formal Approach, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-12, 2006.
DOI : 10.1109/INFOCOM.2006.157

M. Sutton, A. Greene, and P. Amini, Fuzzing: Brute Force Vulnerability Discovery, 2007.

G. M. Thomason, Probabilistic trees and automata for application behavior modeling, Proceedings of the 43rd ACM Southeast Conference, 2003.

J. J. Lee, Behavioral classification, Proceedings Eicar'06, 2006.

O. University, PROTOS Test-Suite: c07-sip Adaptive, model-based monitoring for cyber attack detection, RAID '00: Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection, pp.80-92, 2000.

S. Vishwanathan and A. Smola, Fast kernels on strings and trees, Proceedings of Neural Information Processing Systems, 2002.

G. Wagener, R. State, and A. Dulaunoy, Malware behaviour analysis, Journal in Computer Virology, vol.5, issue.2, pp.279-287, 2008.
DOI : 10.1007/s11416-007-0074-9

G. Wagener, R. State, A. Dulaunoy, and T. Engel, Self Adaptive High Interaction Honeypots Driven by Game Theory, Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, 2009.
DOI : 10.1007/978-3-642-05118-0_51

. Weidong and . Discoverer, Automatic protocol reverse engineering from network traces, pp.199-212

C. Wieser, M. Laakso, and H. Schulzrinne, SIP Robustness Testing for Large-Scale Use, SOQUA/TECOS, pp.165-178, 2004.

G. Wondracek, P. M. Comparetti, C. Kruegel, and E. Kirda, Automatic network protocol analysis, Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSSâ08), 2008.

Y. Wu, S. Bagchi, S. Garg, N. Singh, and T. K. Tsai, SCIDIVE: A stateful and cross protocol intrusion detection architecture for Voice-over-IP environments, International Conference on Dependable Systems and Networks, pp.433-442, 2004.

H. Yan, K. Sripanidkulchai, H. Zhang, Z. Shae, and D. Saha, Incorporating active fingerprinting into SPIT prevention systems, Third annual security workshop

H. Yan, K. Sripanidkulchai, H. Zhang, Z. Shae, and D. Saha, Incorporating Active Fingerprinting into SPIT Prevention Systems, Third Annual VoIP Security Workshop, 2006.

G. Zhang, S. Ehlert, T. Magedanz, and D. Sisalem, Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.57-66, 2007.
DOI : 10.1145/1326304.1326314

X. Zhu and Z. Ghahraman, Learning from labeled and unlabeled data with label propagation, 2002.