跳至内容
Intrusion detection for IP-based multimedia communications over wireless networks 線上預覽
關閉線上預覽
正在查...

Intrusion detection for IP-based multimedia communications over wireless networks

作者: Jin Tang; Yu Cheng
出版商: New York, New York : Springer, 2013.
叢書: SpringerBriefs in computer science
版本/格式:   電子書 : 文獻 : 英語所有版本和格式的總覽
資料庫:WorldCat
提要:
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11  再讀一些...
評定級別:

(尚未評分) 0 附有評論 - 成爲第一個。

主題
更多類似這樣的

 

在線上查詢

與資料的連結

在圖書館查詢

&AllPage.SpinnerRetrieving; 正在查詢有此資料的圖書館...

詳細書目

類型/形式: Electronic books
資料類型: 文獻, 網際網路資源
文件類型: 網路資源, 電腦資料
所有的作者/貢獻者: Jin Tang; Yu Cheng
ISBN: 9781461489962 1461489962 1461489954 9781461489955
OCLC系統控制編碼: 860981228
描述: 1 online resource (x, 86 pages) : illustrations.
内容: Real-Time Misbehavior Detection in IEEE 802:11TM: An Analytical Approach --
Adaptive Misbehavior Detection in IEEE 802:11TM Based on Markov Decision Process --
SIP Flooding Attack Detection --
SIP stealthy attack detection and resource-drained malformed message attack detection.
叢書名: SpringerBriefs in computer science
責任: Jin Tang, Yu Cheng.
更多資訊:

摘要:

IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11 standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11 or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.

評論

讀者提供的評論
正在擷取GoodReads評論...
正在擷取DOGObooks的評論

標籤

成爲第一個
確認申請

你可能已經申請過這份資料。若還是想申請,請選確認。

連結資料


<http://www.worldcat.org/oclc/860981228>
library:oclcnum"860981228"
library:placeOfPublication
rdf:typeschema:MediaObject
rdf:typeschema:Book
rdf:valueUnknown value: dct
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/1176222>
rdf:typeschema:Intangible
schema:name"Wireless communication systems--Security measures."@en
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:creator
schema:datePublished"2013"
schema:description"IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11 based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11 standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11 or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1409431493>
schema:genre"Electronic books"@en
schema:inLanguage"en"
schema:isPartOf
schema:name"Intrusion detection for IP-based multimedia communications over wireless networks"@en
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=645055>
schema:url<http://lib.myilibrary.com?id=547740>
schema:url
schema:workExample
schema:workExample
schema:workExample
wdrs:describedby

Content-negotiable representations

關閉視窗

請登入WorldCat 

没有帳號嗎?你可很容易的 建立免費的帳號.