Research Article

A Secured Load Mitigation and Distribution Scheme for Securing SIP Server

Figure 10

(a) Threshold value for flooding attack. (b) Threshold value for fake signal.
(a)
(b)