컨텐츠로 이동
Intrusion detection for IP-based multimedia communications over wireless networks 해당 항목을 미리보기
닫기해당 항목을 미리보기
확인중입니다…

Intrusion detection for IP-based multimedia communications over wireless networks

저자: Jin Tang; Yu Cheng
출판사: New York, New York : Springer, 2013.
시리즈: SpringerBriefs in computer science
판/형식:   전자도서 : 문서 : 영어모든 판과 형식 보기
데이터베이스:WorldCat
요약:
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11  더 읽기…
평가:

(아무런 평가가 없습니다.) 0 리뷰와 함께 - 첫번째로 올려주세요.

주제
다음과 같습니다:

 

온라인으로 문서 찾기

이 항목에 대한 링크

도서관에서 사본 찾기

&AllPage.SpinnerRetrieving; 해당항목을 보유하고 있는 도서관을 찾는 중

상세정보

장르/형태: Electronic books
자료 유형: 문서, 인터넷 자료
문서 형식: 인터넷 자원, 컴퓨터 파일
모든 저자 / 참여자: Jin Tang; Yu Cheng
ISBN: 9781461489962 1461489962
OCLC 번호: 860981228
설명: 1 online resource (x, 86 pages) : illustrations.
내용: Real-Time Misbehavior Detection in IEEE 802:11TM: An Analytical Approach --
Adaptive Misbehavior Detection in IEEE 802:11TM Based on Markov Decision Process --
SIP Flooding Attack Detection --
SIP stealthy attack detection and resource-drained malformed message attack detection.
일련 제목: SpringerBriefs in computer science
책임: Jin Tang, Yu Cheng.
더 많은 정보:

초록:

IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11 standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11 or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.

리뷰

사용자-기여 리뷰
GoodReads 리뷰 가져오는 중…
DOGObooks 리뷰를 가지고 오는 중…

태그

첫번째 되기
요청하신 것을 확인하기

이 항목을 이미 요청하셨을 수도 있습니다. 만약 이 요청을 계속해서 진행하시려면 Ok을 선택하세요.

링크된 데이터


<http://www.worldcat.org/oclc/860981228>
library:oclcnum"860981228"
library:placeOfPublication
owl:sameAs<info:oclcnum/860981228>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/1176222>
rdf:typeschema:Intangible
schema:name"Wireless communication systems--Security measures"@en
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:creator
schema:datePublished"2013"
schema:description"IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11 standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11 or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1409431493>
schema:genre"Electronic books."@en
schema:inLanguage"en"
schema:name"Intrusion detection for IP-based multimedia communications over wireless networks"@en
schema:url
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=645055>
schema:url<http://lib.myilibrary.com?id=547740>
schema:url
schema:workExample
schema:workExample

Content-negotiable representations

윈도우 닫기

WorldCat에 로그인 하십시오 

계정이 없으세요? 아주 간단한 절차를 통하여 무료 계정을 만드실 수 있습니다.