𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

✍ Scribed by Jin Tang, Yu Cheng (auth.)


Publisher
Springer-Verlag New York
Year
2013
Tongue
English
Leaves
96
Series
SpringerBriefs in Computer Science
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11β„’ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11β„’ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11β„’ or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.

✦ Table of Contents


Front Matter....Pages i-x
Introduction....Pages 1-10
Real-Time Misbehavior Detection in IEEE 802.11 TM : An Analytical Approach....Pages 11-34
Adaptive Misbehavior Detection in IEEE 802.11 TM Based on Markov Decision Process....Pages 35-51
SIP Flooding Attack Detection....Pages 53-70
SIP Stealthy Attack Detection and Resource-Drained Malformed Message Attack Detection....Pages 71-86

✦ Subjects


Computer Communication Networks; Systems and Data Security; Communications Engineering, Networks; Data Encryption


πŸ“œ SIMILAR VOLUMES


Intrusion Detection for IP-Based Multime
✍ Jin Tang, Yu Cheng πŸ“‚ Library πŸ“… 2013 πŸ› Springer 🌐 English

IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11β„’ based wirelessΒ networks, IP-based multimedia communications over wireless networks are also drawingΒ extensive attention in both academia and industry. Due to the open

Multimedia over IP and Wireless Networks
✍ Mihaela van der Schaar, Philip A Chou πŸ“‚ Library πŸ“… 2007 πŸ› Academic Press 🌐 English

This all-inclusive, expertly structured contributed volume will serve as an indispensable guide for professionals or researchers working in areas like networking, communications, data compression, multimedia processing, streaming architectures, and computer graphics. Beginning with a concise overvi

Multimedia over IP and Wireless Networks
✍ Mihaela van der Schaar, Philip A Chou πŸ“‚ Library πŸ“… 2007 πŸ› Academic Press 🌐 English

This all-inclusive, expertly structured contributed volume will serve as an indispensable guide for professionals or researchers working in areas like networking, communications, data compression, multimedia processing, streaming architectures, and computer graphics. Beginning with a concise overvie

Multimedia over IP and Wireless Networks
✍ Mihaela van der Schaar, Philip A Chou πŸ“‚ Library πŸ“… 2007 πŸ› Academic Press 🌐 English

Schaar and Chou have assembled an up to date collection of papers on current issues in doing multimedia over the Internet and also over a cellphone network. The papers or chapters vary considerably in their subjects. Some, like Chapter 7, takes us back to the basics of Shannon's theorems for the cap