skip to content
Intrusion detection for IP-based multimedia communications over wireless networks Preview this item
ClosePreview this item
Checking...

Intrusion detection for IP-based multimedia communications over wireless networks

Author: Jin Tang; Yu Cheng
Publisher: New York, New York : Springer, 2013.
Series: SpringerBriefs in computer science
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Jin Tang; Yu Cheng
ISBN: 9781461489962 1461489962
OCLC Number: 860981228
Description: 1 online resource (x, 86 pages) : illustrations.
Contents: Real-Time Misbehavior Detection in IEEE 802:11TM: An Analytical Approach --
Adaptive Misbehavior Detection in IEEE 802:11TM Based on Markov Decision Process --
SIP Flooding Attack Detection --
SIP stealthy attack detection and resource-drained malformed message attack detection.
Series Title: SpringerBriefs in computer science
Responsibility: Jin Tang, Yu Cheng.
More information:

Abstract:

IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11 standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11 or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/860981228>
library:oclcnum"860981228"
library:placeOfPublication
owl:sameAs<info:oclcnum/860981228>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/1176222>
rdf:typeschema:Intangible
schema:name"Wireless communication systems--Security measures"@en
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:creator
schema:datePublished"2013"
schema:description"IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11 standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11 or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1409431493>
schema:genre"Electronic books."@en
schema:inLanguage"en"
schema:name"Intrusion detection for IP-based multimedia communications over wireless networks"@en
schema:url
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=645055>
schema:url<http://lib.myilibrary.com?id=547740>
schema:url
schema:workExample
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.