BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a diagram showing a scheme of an example of an embodiment of a method according to the invention to protect SIP-based applications;
FIG. 2 is a diagram showing a scheme of storing identities in hash tables with doubled entries;
FIG. 3 is a diagram showing a scheme of storing identities in hash tables with shared entries;
FIG. 4 is a diagram showing a scheme of extracting different identities from a SIP message;
FIG. 5 is a diagram showing an example of an embodiment of a hyperspace of the dimension N=2; and
FIG. 6 is a diagram showing the hyperspace referred to in FIG. 5, wherein additionally distances are depicted.