Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

Nonfiction, Computers, Networking & Communications, Hardware, Computer Security, General Computing
Cover of the book Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks by Jin Tang, Yu Cheng, Springer New York
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jin Tang, Yu Cheng ISBN: 9781461489962
Publisher: Springer New York Publication: September 27, 2013
Imprint: Springer Language: English
Author: Jin Tang, Yu Cheng
ISBN: 9781461489962
Publisher: Springer New York
Publication: September 27, 2013
Imprint: Springer
Language: English

IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11™ or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11™ or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.

More books from Springer New York

Cover of the book The Origins of Action by Jin Tang, Yu Cheng
Cover of the book Amputation, Prosthesis Use, and Phantom Limb Pain by Jin Tang, Yu Cheng
Cover of the book Topics from the 8th Annual UNCG Regional Mathematics and Statistics Conference by Jin Tang, Yu Cheng
Cover of the book Residue Reviews by Jin Tang, Yu Cheng
Cover of the book Atlas of Ultrasound-Guided Procedures in Interventional Pain Management by Jin Tang, Yu Cheng
Cover of the book Fundamentals of Nanoscaled Field Effect Transistors by Jin Tang, Yu Cheng
Cover of the book Alcohol Use Disorders and the Lung by Jin Tang, Yu Cheng
Cover of the book Critical Issues for the Development of Sustainable E-health Solutions by Jin Tang, Yu Cheng
Cover of the book Sparse Representations and Compressive Sensing for Imaging and Vision by Jin Tang, Yu Cheng
Cover of the book Computational Biology by Jin Tang, Yu Cheng
Cover of the book Thermodynamics of Crystalline States by Jin Tang, Yu Cheng
Cover of the book Principles of Microbiological Troubleshooting in the Industrial Food Processing Environment by Jin Tang, Yu Cheng
Cover of the book The Brain-Dead Organ Donor by Jin Tang, Yu Cheng
Cover of the book Derivative Securities and Difference Methods by Jin Tang, Yu Cheng
Cover of the book Residue Reviews by Jin Tang, Yu Cheng
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy