Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
SpringerBriefs in Computer Science

Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

    • £35.99
    • £35.99

Publisher Description

IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11™ or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.

GENRE
Computing & Internet
RELEASED
2013
27 September
LANGUAGE
EN
English
LENGTH
96
Pages
PUBLISHER
Springer New York
SIZE
1.8
MB
Wireless Algorithms, Systems, and Applications Wireless Algorithms, Systems, and Applications
2021
Wireless Algorithms, Systems, and Applications Wireless Algorithms, Systems, and Applications
2016
Wireless Algorithms, Systems, and Applications Wireless Algorithms, Systems, and Applications
2021
Wireless Algorithms, Systems, and Applications Wireless Algorithms, Systems, and Applications
2015
Distributed Computing in Sensor Systems Distributed Computing in Sensor Systems
2010
Wireless Sensor Networks Wireless Sensor Networks
2011
The Amazing Journey of Reason The Amazing Journey of Reason
2019
Agile Risk Management Agile Risk Management
2014
Introduction to Ethical Software Development Introduction to Ethical Software Development
2025
Machine Learning in Sports Machine Learning in Sports
2025
Objective Information Theory Objective Information Theory
2023
IoT Supply Chain Security Risk Analysis and Mitigation IoT Supply Chain Security Risk Analysis and Mitigation
2022