Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the prools involved, such as the session initiation prool (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal prool behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11™ or the SIP prools. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) prool analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.
1116351572
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the prools involved, such as the session initiation prool (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal prool behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11™ or the SIP prools. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) prool analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.
54.99 In Stock
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

by Jin Tang, Yu Cheng
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

by Jin Tang, Yu Cheng

Paperback(2013)

$54.99 
  • SHIP THIS ITEM
    In stock. Ships in 6-10 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the prools involved, such as the session initiation prool (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal prool behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11™ or the SIP prools. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) prool analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.

Product Details

ISBN-13: 9781461489955
Publisher: Springer New York
Publication date: 09/28/2013
Series: SpringerBriefs in Computer Science
Edition description: 2013
Pages: 86
Product dimensions: 6.10(w) x 9.25(h) x 0.01(d)

Table of Contents

Introduction.- Real-Time Misbehavior Detection in IEEE 802:11TM: An Analytical Approach.- Adaptive Misbehavior Detection in IEEE 802:11TM Based on Markov Decision Process.- SIP Flooding Attack Detection.

From the B&N Reads Blog

Customer Reviews