D. Barbará, N. Wu, and S. Jajodia, Detecting Novel Network Intrusions Using Bayes Estimators, Proceedings of the First SIAM Conference on Data Mining, 2001.
DOI : 10.1137/1.9781611972719.28

N. Bonelli, S. Giordano, G. Procissi, and R. Secchi, BRUTE : A high performance and extensible trac generator, Proceedings of International Symposium on Performance and Extensible Trac Generator (SPECTS'05), 2005.

C. Chang and C. Lin, LIBSVM, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, 2001.
DOI : 10.1145/1961189.1961199

E. Y. Chen, Detecting DoS attacks on SIP systems, 1st IEEE Workshop on VoIP Management and Security, 2006., p.5358, 2006.
DOI : 10.1109/VOIPMS.2006.1638123

T. Dierks and C. Allen, RFC2246 : The TLS protocol version 1, 1999.

Y. Ding and G. Su, Intrusion detection system for signal based SIP attacks through timed HCPN, The Second International Conference on Availability, Reliability and Security (ARES'07), 2007.
DOI : 10.1109/ARES.2007.102

S. Ehlert, C. Wang, T. Magedanz, and D. Sisalem, Specication-based denial-ofservice detection for SIP Voice-over-IP networks, The Third International Conference on Internet Monitoring and Protection (ICIMP), p.5966, 2008.

D. Endler and M. Collier, Hacking Exposed VoIP : Voice Over IP Security Secrets and Solutions, 2007.

D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis, and S. Gritzalis, SIP security mechanisms : A state-of-the-art review, Proceedings of the Fifth International Network Conference, p.147155, 2005.

D. Geneiatakis, G. Kambourakis, C. Lambrinoudakis, T. Dagiuklas, and S. Gritzalis, A framework for protecting a SIP-based infrastructure against malformed message attacks, Computer Networks, vol.51, issue.10, p.5125802593, 2007.
DOI : 10.1016/j.comnet.2006.11.014

I. Guyon, J. Weston, S. Barnhill, and V. Vapnik, Gene selection for cancer classication using support vector machines, Mach. Learn, vol.46, pp.1-3389422, 2002.

H. Javitz and A. Valdes, The SRI IDES statistical anomaly detector, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, p.316326, 1991.
DOI : 10.1109/RISP.1991.130799

H. Kang, Z. Zhang, S. Ranjan, and A. Nucci, SIP-based VoIP trac behavior proling and its applications, Proceedings of the 3rd annual ACM workshop on Mining network data (MineNet '07), p.3944, 2007.

S. Kent and R. Atkinson, RFC2401 : Security architecture for the Internet protocol, 1998.

P. Kolan and R. Dantu, Socio-technical defense against voice spamming, ACM Transactions on Autonomous and Adaptive Systems, vol.2, issue.1, 2007.
DOI : 10.1145/1216895.1216897

C. Kruegel, D. Mutz, W. Robertson, and F. Valeur, Bayesian event classication for intrusion detection, Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC '03), p.14, 2003.

D. , R. Kuhn, T. J. Walsh, and S. Fries, Security considerations for Voice over IP systems, Special Publication, pp.800-58, 2005.

K. Li and G. Teng, Unsupervised SVM based on p-kernels for anomaly detection, Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC '06), p.5962, 2006.

M. Luo, T. Peng, and C. Leckie, CPU-based DoS attacks against SIP servers, IEEE/IFIP Network Operations and Management Symposium, 2008.

S. Mukkamala, G. Janoski, and A. Sung, Intrusion detection : Support vector machines and neural networks. The IEEE Computer Society Student Magazine, 2002.
DOI : 10.1109/ijcnn.2002.1007774

K. P. Murphy, The Bayes Net Toolbox for MATLAB, Computing Science and Statistics, vol.33, p.120, 2001.

S. Niccolini, R. G. Garroppo, S. Giordano, G. Risi, and S. Ventura, SIP intrusion detection and prevention: recommendations and prototype implementation, 1st IEEE Workshop on VoIP Management and Security, 2006., p.4752, 2006.
DOI : 10.1109/VOIPMS.2006.1638122

P. O. Doherty, M. Ranganathan, and . Jain, Serving the developer community

J. Pearl, Probabilistic Reasoning in Intelligent Systems : Networks of Plausible Inference, 1988.

J. Peterson and C. Jennings, RFC4774 : Enhancements for authenticated identity management in the Session Initiation Protocol (SIP), 2006.

F. Pouget and M. Dacier, Honeypot-based forensics, Asia pacic information technology security conference (AusCERT '04), 2004.

J. Quittek, S. Niccolini, S. Tartarelli, M. Stiemerling, M. Brunner et al., Detecting SPIT Calls by Checking Human Communication Patterns, 2007 IEEE International Conference on Communications, 2007.
DOI : 10.1109/ICC.2007.329

J. Ransome and J. Rittinghouse, Voice over Internet Protocol (VoIP) Security, 2004.

B. Reynolds and D. Ghosal, Secure IP telephony using multi-layered protection, Proceedings of The 10th Annual Network and Distributed System Security Symposium, 2003.

K. Rieck, S. Wahl, P. Laskov, P. Domschitz, and K. Müller, A Self-learning System for Detection of Anomalous SIP Messages, Principles, Systems and Applications of IP Telecommunications (IPTCOMM), Second International Conference, 2008.
DOI : 10.1007/978-3-540-89054-6_5

R. Romano, C. Aragon, and C. Ding, Supernova Recognition Using Support Vector Machines, 2006 5th International Conference on Machine Learning and Applications (ICMLA'06), p.7782, 2006.
DOI : 10.1109/ICMLA.2006.49

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.9096

J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson et al., RFC3261 : SIP : Session initiation protocol, 2002.

R. Schlegel, S. Niccolini, S. Tartarelli, and M. Brunner, ISE03-2: SPam over Internet Telephony (SPIT) Prevention Framework, IEEE Globecom 2006, 2006.
DOI : 10.1109/GLOCOM.2006.192

H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, RFC3550 : RTP : A Transport Protocol for Real-time applications, 2003.

H. Sengar, R. Dantu, and D. Wijesekera, Securing VoIP and PSTN from integrated signaling network vulnerabilities, 1st IEEE Workshop on VoIP Management and Security, 2006., 2006.
DOI : 10.1109/VOIPMS.2006.1638116

H. Sengar, D. Wijesekera, H. Wang, and S. Jajodia, VoIP Intrusion Detection Through Interacting Protocol State Machines, International Conference on Dependable Systems and Networks (DSN'06), 2006.
DOI : 10.1109/DSN.2006.73

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.2311

D. Shin and C. Shim, Progressive multi gray-leveling : A voice Spam protection algorithm, IEEE Network, vol.20, issue.5, p.1824, 2006.

P. Truong, D. Nieh, and M. Moh, Specication-based intrusion detection for H.323- based Voice over IP, Proccedings of the IEEE International Symposium on Signal Processing and Information Technology, 2005.

A. Valdes and K. Skinner, Adaptive, Model-Based Monitoring for Cyber Attack Detection, Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection, p.8092, 2000.
DOI : 10.1007/3-540-39945-3_6

V. Vapnik, The nature of statistical learning theory, 1995.

V. Vapnik, Statistical Learning Theory, 1998.

. Voipsa, VoIP security and privacy threat taxonomy Public Realease 1.0, 2005.

T. J. Walsh and R. Kuhn, Challenges in Securing Voice over IP, IEEE Security and Privacy Magazine, vol.3, issue.3, p.4449, 2005.
DOI : 10.1109/MSP.2005.62

Y. Wu, S. Bagchi, S. Garg, N. Singh, and T. K. Tsai, SCIDIVE : A stateful and cross protocol intrusion detection architecture for Voice-over-IP environments, International Conference on Dependable Systems and Networks, p.433442, 2004.

H. Yan, K. Sripanidkulchai, H. Zhang, Z. Shae, and D. Saha, Incorporating active ngerprinting into SPIT prevention systems, Third annual security workshop (VSW'06, 2006.

G. Zhang, S. Ehlert, T. Magedanz, and D. Sisalem, Denial of service attack and prevention on SIP VoIP infrastructures using DNS ooding, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications (IPTComm '07), p.5766, 2007.