přejít na obsah
Intrusion detection for IP-based multimedia communications over wireless networks Náhled dokumentu
ZavřítNáhled dokumentu
Probíhá kontrola...

Intrusion detection for IP-based multimedia communications over wireless networks

Autor Jin Tang; Yu Cheng
Vydavatel: New York, New York : Springer, 2013.
Edice: SpringerBriefs in computer science
Vydání/formát:   e-kniha : Document : EnglishZobrazit všechny vydání a formáty
Databáze:WorldCat
Shrnutí:
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11  Přečíst více...
Hodnocení:

(ještě nehodnoceno) 0 zobrazit recenze - Buďte první.

Předmětová hesla:
Více podobných

 

Najít online exemplář

Odkazy na tento dokument

Vyhledat exemplář v knihovně

&AllPage.SpinnerRetrieving; Vyhledávání knihoven, které vlastní tento dokument...

Detaily

Žánr/forma: Electronic books
Typ materiálu: Document, Internetový zdroj
Typ dokumentu: Internet Resource, Computer File
Všichni autoři/tvůrci: Jin Tang; Yu Cheng
ISBN: 9781461489962 1461489962
OCLC číslo: 860981228
Popis: 1 online resource (x, 86 pages) : illustrations.
Obsahy: Real-Time Misbehavior Detection in IEEE 802:11TM: An Analytical Approach --
Adaptive Misbehavior Detection in IEEE 802:11TM Based on Markov Decision Process --
SIP Flooding Attack Detection --
SIP stealthy attack detection and resource-drained malformed message attack detection.
Název edice: SpringerBriefs in computer science
Odpovědnost: Jin Tang, Yu Cheng.
Více informací:

Anotace:

IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11 standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11 or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.

Recenze

Recenze vložené uživatelem
Nahrávání recenzí GoodReads...
Přebírání recenzí DOGO books...

Štítky

Buďte první.
Potvrdit tento požadavek

Tento dokument jste si již vyžádali. Prosím vyberte Ok pokud chcete přesto v žádance pokračovat.

Propojená data


<http://www.worldcat.org/oclc/860981228>
library:oclcnum"860981228"
library:placeOfPublication
owl:sameAs<info:oclcnum/860981228>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/1176222>
rdf:typeschema:Intangible
schema:name"Wireless communication systems--Security measures"@en
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:creator
schema:datePublished"2013"
schema:description"IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11 standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11 or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1409431493>
schema:genre"Electronic books."@en
schema:inLanguage"en"
schema:name"Intrusion detection for IP-based multimedia communications over wireless networks"@en
schema:url
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=645055>
schema:url<http://lib.myilibrary.com?id=547740>
schema:url
schema:workExample
schema:workExample

Content-negotiable representations

Zavřít okno

Prosím přihlaste se do WorldCat 

Nemáte účet? Můžete si jednoduše vytvořit bezplatný účet.