Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks (Record no. 57668)

000 -LEADER
fixed length control field 03170nam a22005295i 4500
001 - CONTROL NUMBER
control field 978-1-4614-8996-2
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112226.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130927s2013 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781461489962
-- 978-1-4614-8996-2
082 04 - CLASSIFICATION NUMBER
Call Number 004.6
100 1# - AUTHOR NAME
Author Tang, Jin.
245 10 - TITLE STATEMENT
Title Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
300 ## - PHYSICAL DESCRIPTION
Number of Pages X, 86 p. 31 illus.
490 1# - SERIES STATEMENT
Series statement SpringerBriefs in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Real-Time Misbehavior Detection in IEEE 802:11TM: An Analytical Approach -- Adaptive Misbehavior Detection in IEEE 802:11TM Based on Markov Decision Process -- SIP Flooding Attack Detection.
520 ## - SUMMARY, ETC.
Summary, etc IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11™ or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.
700 1# - AUTHOR 2
Author 2 Cheng, Yu.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4614-8996-2
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- New York, NY :
-- Springer New York :
-- Imprint: Springer,
-- 2013.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer communication systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electrical engineering.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Encryption.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2191-5768
912 ## -
-- ZDB-2-SCS

No items available.