Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the open...

Full description

Main Authors: Tang, Jin. (Author, http://id.loc.gov/vocabulary/relators/aut), Cheng, Yu. (http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Language:English
Published: New York, NY : Springer New York : Imprint: Springer, 2013.
Edition:1st ed. 2013.
Series:SpringerBriefs in Computer Science,
Subjects:
Online Access:https://doi.org/10.1007/978-1-4614-8996-2
LEADER 03651nam a22005415i 4500
001 978-1-4614-8996-2
003 DE-He213
005 20200630012642.0
007 cr nn 008mamaa
008 130927s2013 xxu| s |||| 0|eng d
020 |a 9781461489962  |9 978-1-4614-8996-2 
024 7 |a 10.1007/978-1-4614-8996-2  |2 doi 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
072 7 |a UKN  |2 thema 
082 0 4 |a 004.6  |2 23 
100 1 |a Tang, Jin.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks  |h [electronic resource] /  |c by Jin Tang, Yu Cheng. 
250 |a 1st ed. 2013. 
264 1 |a New York, NY :  |b Springer New York :  |b Imprint: Springer,  |c 2013. 
300 |a X, 86 p. 31 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a SpringerBriefs in Computer Science,  |x 2191-5768 
505 0 |a Introduction -- Real-Time Misbehavior Detection in IEEE 802:11TM: An Analytical Approach -- Adaptive Misbehavior Detection in IEEE 802:11TM Based on Markov Decision Process -- SIP Flooding Attack Detection. 
520 |a IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11™ or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Electrical engineering. 
650 0 |a Data encryption (Computer science). 
650 1 4 |a Computer Communication Networks.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022 
650 2 4 |a Systems and Data Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060 
650 2 4 |a Communications Engineering, Networks.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/T24035 
650 2 4 |a Cryptology.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020 
700 1 |a Cheng, Yu.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781461489955 
776 0 8 |i Printed edition:  |z 9781461489979 
830 0 |a SpringerBriefs in Computer Science,  |x 2191-5768 
856 4 0 |u https://doi.org/10.1007/978-1-4614-8996-2 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)