Get Intrusion Detection for IP-Based Multimedia Communications PDF

By Jin Tang, Yu Cheng

IP-based multimedia communications became more and more renowned in recent times. With the expanding assurance of the IEEE 802:11™ dependent wireless networks, IP-based multimedia communications over instant networks also are drawing extensive realization in either academia and undefined. as a result of the openness and dispensed nature of the protocols concerned, comparable to the consultation initiation protocol (SIP) and the IEEE 802:11™ commonplace, it turns into effortless for malicious clients in the community to accomplish their very own achieve or disrupt the provider via deviating from the normal protocol behaviors. This SpringerBrief provides real-time intrusion detection ideas which could fast tune the malicious behaviors which manage the vulnerabilities from both the 802.11™ or the SIP protocols. extra particularly, this publication offers interdisciplinary strategies to accomplish a good real-time intrusion detection process, which interweaves medium entry regulate (MAC) protocol research, cumulative sum (CUSUM) established detector layout, a unique Markovian version for CUSUM detectors, sketch-based site visitors modeling, and wavelet established sign processing recommendations.

Show description

Read or Download Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks PDF

Similar network security books

Download e-book for kindle: Juniper Networks Secure Access SSL VPN Configuration Guide by Kevin Fletcher

Juniper Networks safe entry SSL VPN home equipment offer an entire variety of distant entry home equipment for the smallest businesses as much as the biggest carrier companies. As a procedure administrator or safeguard specialist, this accomplished configuration advisor will let you configure those home equipment to permit distant and cellular entry for staff.

Android Application Security: A Semantics and Context-Aware by Mu Zhang, Heng Yin PDF

This SpringerBrief explains the rising cyber threats that undermine Android software safeguard. It additional explores the chance to leverage the state-of-the-art semantics and context–aware thoughts to shield opposed to such threats, together with zero-day Android malware, deep software program vulnerabilities, privateness breach and inadequate protection warnings in app descriptions.

Practical Information Security Management: A Complete Guide by Tony Campbell PDF

Create acceptable, security-focused company propositions that think about the stability among price, probability, and usefulness, whereas beginning your trip to turn into a data safety supervisor. protecting a wealth of data that explains precisely how the works this present day, this booklet makes a speciality of how one can arrange a good info protection perform, lease the proper humans, and strike the easiest stability among defense controls, expenditures, and hazards.

Extra resources for Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

Sample text

17) i=0 h ∑ π j = 1. 18). 18) based on such transition probabilities, we will obtain the steady state probability P{Xn = i|CWmin = Wv }, which is the distribution of the detector state given that the tagged node takes a CWmin of Wv . Then as the tagged node may chooses its CWmin uniformly from W when it is misbehaving, we can calculate P{Xn = i|M} as P{Xn = i, M} P{M} 1 P{Xn = i|CWmin = Wv }. 7). , how to choose the action at a certain state, to achieve the maximum benefit based on the reward function developed above.

A larger CWmin ), the detection delays increase more obviously with the number of nodes, because a larger threshold h is required for a larger N to meet the false positive requirement. However, the delay increase is not dramatic. Even for CWmin = 25 and N = 40, it only takes about 120 successful transmissions over the whole network to detect the misbehavior. 7 Comparison with the Original CUSUM Detector In order to show how we have improved in real-time misbehavior detection, we compare the FS detector to the detector developed in our preliminary work [5], referred to as the “original CUSUM detector” for convenience.

The reason is that, when a misbehaving node grabs the channel, very likely it will consecutively send a certain number of packets, driving the detector to hit the threshold. For a smaller value of N, it may just take a couple of more samples for the detector to hit the threshold (note that each transmission from the tagged node increases the detector state by N − 1), which only slightly increases the detection delay. With less intense misbehavior (16 < CWmin ≤ 25), we do observe obviously larger detection delays for a small N.

Download PDF sample

Rated 4.88 of 5 – based on 12 votes