IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11™ standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11™ or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques.
"synopsis" may belong to another edition of this title.
Intrusion Detection for IP-Based Multimedia Communications Over Wireless Networks IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11(t) based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11(t) standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can qui...
"About this title" may belong to another edition of this title.
FREE shipping within United Kingdom
Destination, rates & speeds£ 2.35 shipping from Italy to United Kingdom
Destination, rates & speedsSeller: Brook Bookstore On Demand, Napoli, NA, Italy
Condition: new. Questo è un articolo print on demand. Seller Inventory # 849ae69227f69262ccecb657c68478f7
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 20155338-n
Quantity: Over 20 available
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New. Seller Inventory # 6666-IUK-9781461489955
Quantity: 10 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9781461489955_new
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 20155338
Quantity: Over 20 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 189. Seller Inventory # C9781461489955
Quantity: Over 20 available
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11(TM) based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11(TM) standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11(TM) or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques. 96 pp. Englisch. Seller Inventory # 9781461489955
Quantity: 2 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 20155338-n
Quantity: Over 20 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11(TM) based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11(TM) standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This SpringerBrief presents real-time intrusion detection techniques that can quickly track the malicious behaviors which manipulate the vulnerabilities from either the 802.11(TM) or the SIP protocols. More specifically, this book presents interdisciplinary techniques to achieve an effective real-time intrusion detection system, which interweaves medium access control (MAC) protocol analysis, cumulative sum (CUSUM) based detector design, a novel Markovian model for CUSUM detectors, sketch-based traffic modeling, and wavelet based signal processing techniques. Seller Inventory # 9781461489955
Quantity: 1 available
Seller: moluna, Greven, Germany
Kartoniert / Broschiert. Condition: New. Seller Inventory # 4199858
Quantity: Over 20 available