Intrusion Detection for IP-Based Multimedia Communications - download pdf or read online

By Jin Tang, Yu Cheng

IP-based multimedia communications became more and more renowned lately. With the expanding insurance of the IEEE 802:11™ dependent wireless networks, IP-based multimedia communications over instant networks also are drawing extensive cognizance in either academia and undefined. a result of openness and disbursed nature of the protocols concerned, resembling the consultation initiation protocol (SIP) and the IEEE 802:11™ normal, it turns into effortless for malicious clients in the community to accomplish their very own achieve or disrupt the carrier via deviating from the normal protocol behaviors. This SpringerBrief provides real-time intrusion detection options that may quick tune the malicious behaviors which manage the vulnerabilities from both the 802.11™ or the SIP protocols. extra particularly, this publication provides interdisciplinary innovations to accomplish a good real-time intrusion detection procedure, which interweaves medium entry regulate (MAC) protocol research, cumulative sum (CUSUM) dependent detector layout, a singular Markovian version for CUSUM detectors, sketch-based site visitors modeling, and wavelet established sign processing concepts.

Show description

Read Online or Download Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks PDF

Best network security books

Erik Pace Birkholz's Buffer Overflow Attacks: Detect, Exploit, Prevent PDF

The SANS Institute keeps an inventory of the "Top 10 software program Vulnerabilities. on the present time, over 1/2 those vulnerabilities are exploitable by way of Buffer Overflow assaults, making this type of assault essentially the most universal and most threatening weapon utilized by malicious attackers. this can be the 1st publication particularly aimed toward detecting, exploiting, and combating the commonest and hazardous assaults.

Éric Filiol's Computer Viruses PDF

This ebook offers with computing device viruses envisaged from 3 assorted issues of view, specifically the theoretical basics of machine virology, algorithmic and sensible elements of viruses and their power purposes to varied components. The theoretical formalization by way of Turing machines, self-reproducing automata and recursive features let an actual and exhaustive description of the different sorts of malware.

Read e-book online Internet and the Law: Technology, Society, and Compromises PDF

Utilizing key occasions to demonstrate significant concerns, web and the legislation: know-how, Society, and Compromises explores such major felony battles as A&M documents v. Napster and Apple desktop v. Franklin machine, permitting readers a glance into tales of exchange secrets and techniques, song robbery, and commercial espionage.

New PDF release: Understanding Social Engineering Based Scams

This booklet describes developments in e-mail scams and provides instruments and techniquesto determine such traits. It additionally describes computerized countermeasuresbased on an realizing of the kind of persuasive equipment used byscammers. It experiences either consumer-facing scams and company scams,describing in-depth case reports on the subject of Craigslist scams and BusinessEmail Compromise Scams.

Additional resources for Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

Sample text

11TM network, a node that has just accomplished a successful transmission will have advantages in grabbing the channel for next transmission in a short period [3]. 11TM backoff mechanism. Such an issue implies correlations among the channel accesses, which impact the accuracy of the transition probability calculation based on the assumption of independent channel access. The system configuration based on an inaccurate model can lead to inaccurate detection results. In this section, we study how the short-term unfairness affects the performance of our detector.

We first examine the impact of short-term unfairness on the distribution of the detector Xn under the normal traffic condition. In Fig. 9, we present the simulation results of the cumulative distribution function (CDF) of Xn , compared with the analytical CDF. 1), the two curves are still close to each other. We then examine the average false positive rate Pf p versus h, comparing the analytical results with the simulation results in Fig. 10. Again, despite a bigger gap when h is smaller, the Pf p curve obtained from simulations still largely resembles the analytical one.

J. Tang and Y. 2 Markov Decision Process Based Modeling Consider the sequence of the adaptive detector value {Xn } as a discrete random process, which takes values from a finite set A = {0, 1, 2, . , h}. The process is said to be in state i at time n if Xn = i. 1) have the Markov property, that is, given the current state Xn , the next state Xn+1 is independent of previous states. We have applied Markov chain analysis to study the FS detector in Chap. 2. We here apply the Markov decision process to study the adaptive detector.

Download PDF sample

Rated 4.42 of 5 – based on 47 votes