跳到内容
Intrusion detection for IP-based multimedia communications over wireless networks 预览资料
关闭预览资料
正在查...

Intrusion detection for IP-based multimedia communications over wireless networks

著者: Jin Tang; Yu Cheng
出版商: New York, New York : Springer, 2013.
丛书: SpringerBriefs in computer science
版本/格式:   电子图书 : 文献 : 英语查看所有的版本和格式
数据库:WorldCat
提要:
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11  再读一些...
评估:

(尚未评估) 0 附有评论 - 争取成为第一个。

主题
更多类似这样的

 

在线查找

与资料的链接

在图书馆查找

&AllPage.SpinnerRetrieving; 正在查找有这资料的图书馆...

详细书目

类型/形式: Electronic books
材料类型: 文献, 互联网资源
文件类型: 互联网资源, 计算机文档
所有的著者/提供者: Jin Tang; Yu Cheng
ISBN: 9781461489962 1461489962
OCLC号码: 860981228
描述: 1 online resource (x, 86 pages) : illustrations.
内容: Real-Time Misbehavior Detection in IEEE 802:11TM: An Analytical Approach --
Adaptive Misbehavior Detection in IEEE 802:11TM Based on Markov Decision Process --
SIP Flooding Attack Detection --
SIP stealthy attack detection and resource-drained malformed message attack detection.
丛书名: SpringerBriefs in computer science
责任: Jin Tang, Yu Cheng.
更多信息:

摘要:

IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11 standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11 or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.

评论

用户提供的评论
正在获取GoodReads评论...
正在检索DOGObooks的评论

标签

争取是第一个!
确认申请

你可能已经申请过这份资料。如果还是想申请,请选确认。

链接数据


<http://www.worldcat.org/oclc/860981228>
library:oclcnum"860981228"
library:placeOfPublication
owl:sameAs<info:oclcnum/860981228>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/1176222>
rdf:typeschema:Intangible
schema:name"Wireless communication systems--Security measures"@en
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:creator
schema:datePublished"2013"
schema:description"IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11 standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11 or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1409431493>
schema:genre"Electronic books."@en
schema:inLanguage"en"
schema:name"Intrusion detection for IP-based multimedia communications over wireless networks"@en
schema:url
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=645055>
schema:url<http://lib.myilibrary.com?id=547740>
schema:url
schema:workExample
schema:workExample

Content-negotiable representations

关闭窗口

请登入WorldCat 

没有张号吗?很容易就可以 建立免费的账号.