000 03200nam a22005297a 4500
001 sulb-eb0022971
003 BD-SySUS
005 20160413122329.0
007 cr nn 008mamaa
008 130927s2013 xxu| s |||| 0|eng d
020 _a9781461489962
_9978-1-4614-8996-2
024 7 _a10.1007/978-1-4614-8996-2
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
100 1 _aTang, Jin.
_eauthor.
245 1 0 _aIntrusion Detection for IP-Based Multimedia Communications over Wireless Networks
_h[electronic resource] /
_cby Jin Tang, Yu Cheng.
264 1 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2013.
300 _aX, 86 p. 31 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Computer Science,
_x2191-5768
505 0 _aIntroduction -- Real-Time Misbehavior Detection in IEEE 802:11TM: An Analytical Approach -- Adaptive Misbehavior Detection in IEEE 802:11TM Based on Markov Decision Process -- SIP Flooding Attack Detection.
520 _aIP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11™ or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 0 _aElectrical engineering.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aSystems and Data Security.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aData Encryption.
700 1 _aCheng, Yu.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781461489955
830 0 _aSpringerBriefs in Computer Science,
_x2191-5768
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4614-8996-2
912 _aZDB-2-SCS
942 _2Dewey Decimal Classification
_ceBooks
999 _c45063
_d45063