Introduction

  • Jin Tang
  • Yu Cheng
Chapter
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

IP-based multimedia communications have become prevailing in recent years, with a wide range of benefits such as cost-efficient deployment, plenty of features, and convenience for service integration. At the same time, the deployment of IEEE 802.11TM based wireless networks has been dramatically increasing over years due to their high-speed access, easy-to-use feature, and economical advantages. The convergence of such two trends, IP-based multimedia communications over 802.11TM based wireless networks, leads to a promising all-IP platform to provision economic high-quality multimedia services to mobile users anytime and anywhere, which has drawn extensive attentions from both academia and industry.

Keywords

Expense 

References

  1. 1.
    T. Anderson and D. Darling, “Asymptotic Theory of Certain “Goodness-of-Fit” Criteria Based on Stochastic Processes,” Annals of Mathematical Statistics, 1952.Google Scholar
  2. 2.
    J. Bellardo, and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” in Proc. USENIX Security Symposium, 2003.Google Scholar
  3. 3.
    G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordination Function,” IEEE Journal on Selected Areas of Communication, vol. 18, no. 3, pp. 535–547, Mar. 2000.Google Scholar
  4. 4.
    L. Buttyan and J. Hubaux, “Report on a Working Session on Security in Wireless Ad hoc Networks,” in Mobile Computing and Communications Review, vol. 6, no. 4, 2002.Google Scholar
  5. 5.
    M. Cagalj, S. Ganeriwal, I. Aad and J. Hubaux, “On Selfish Behavior in CSMA/CA Networks,” in Proc. IEEE INFOCOM, 2005.Google Scholar
  6. 6.
    C. Callegari, R. Garroppo, S. Giordano, M. Pegano and F. russo “A Novel Method for Detecting Attacks Towards the SIP Protocol,” in Proc. IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2009, pp. 268–273.Google Scholar
  7. 7.
    A. Cardenas, S. Radosavac and J. Baras, “Detection and Prevention of MAC Layer Misbehavior in Ad Hoc Networks,” in Pro. ACM 2nd Workshop on Security of ad hoc and Sensor Networks, 2004, pp. 17–22.Google Scholar
  8. 8.
    A. Cardenas, S. Radosavac and J. Baras, “Evaluation of Detection Algorithm for MAC Layer Misbehavior: Theory and Evaluation,” IEEE Trans. Networking, vol. 17, no. 2, pp. 605–617, Apr. 2009.CrossRefGoogle Scholar
  9. 9.
    E. Chen, “Detecting DoS Attacks on SIP Systems,” in Proc. 1st IEEE Workshop on VoIP Management and Security, 2006, pp. 53–58.Google Scholar
  10. 10.
    Y. Cheng, X. Ling, W. Song, L. Cai, W. Zhuang, and X. Shen, “A Cross-layer Approach for WLAN Voice Capacity Planning,” IEEE Journal on Selected Areas of Communications, vol. 25, no. 4, pp. 678–688, May 2007.CrossRefGoogle Scholar
  11. 11.
    Y. Ding and G. Su, “Intrusion Detection System for Signal Based SIP Attacks Through Timed HPCN,” in Proc. 2nd International Conference on Availability, Reliability and Security, 2007, pp. 190–197.Google Scholar
  12. 12.
    S. Donovan, and J. Rosenberg, “Session Timers in the Session Initiation Protocol (SIP),” IETF RFC 4028, Apr. 2005.Google Scholar
  13. 13.
    S. Elhert, C. Wang, T. Magedanz and D. Sisalem, “Specification-Based Denial-of-Service Detection for SIP Voice-over-IP Networks,” in Proc. 3rd IEEE International Conference on Internet Monitoring and Protection, 2008, pp. 59–66.Google Scholar
  14. 14.
    C. Foh and M. Zukerman, “Performance Analysis of the IEEE 802.11 MAC Protocol,” in Proc. Europe Wireless, 2002, pp. 184–190.Google Scholar
  15. 15.
    D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis and S. Gritzalis, “A Framework for Detecting Malformed Messages in SIP Networks,” in Proc. 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005.Google Scholar
  16. 16.
    D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis and S. Gritzalis, “SIP Security Mechanism: A State-of-the-Art Review,” in Proc. 5th International Network Conference, 2005, pp. 147–155.Google Scholar
  17. 17.
    D. Geneiatakis, G. Kambourakis, C. Lambrinoudakis, T. Dagiuklas and S. Gritzalis, “SIP Message Tampering: THE SQL code INJECTION attack,” in Proc. IEEE 13th International Conference on Software, Telecommunications and Computer, 2005.Google Scholar
  18. 18.
    D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, K. S. Ehlert and D. Sisalem, “Survey of Security Vulnerabiliteis in Session Initiation Protocol,” IEEE Communication Surveys & Tutorials, vol. 8, no. 3, pp. 68–81, 2006.CrossRefGoogle Scholar
  19. 19.
    L. Giarre, G. Neglia and I. Tinnirello “Medium Access in WiFi Networks: Strategies of Selfish Nodes,” in IEEE Signal Processing Magazine, pp. 124–128, Sept. 2006.Google Scholar
  20. 20.
    A. Gilbert, S. Guha, P. Indyk, S. Muthukrishnan and M. Strauss, “Quicksand: Quick Summary and Analysis of Network Data,” DIMACS Technical Report 2001–43, 2001.Google Scholar
  21. 21.
    L. Guang, C. Assi and A. Benslimane, “Enhancing IEEE 802.11 Random Backoff in Selfish Environment,” in IEEE Trans. Vehicular Technology, vol. 57, no. 3, pp. 1806–1822, May 2008.Google Scholar
  22. 22.
    V. Gupta, S. Krishnamurthy and M. Faloutsos, “Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Network,” in Proc. IEEE MILCOM, 2002.Google Scholar
  23. 23.
    F. Gustafson and M. Lindahl, “Evaluation of statistical distributions for VoIP traffic modelling,” University Essay from University West, Department of Economics and IT, 2009.Google Scholar
  24. 24.
    Y. He, Y. Wen and H. Zhao “SPIT Detection and Prevention Method in VoIP Environment,” in Proc. IEEE 3rd International Conference on Availability, Reliability and Security, 2008, pp. 473–478.Google Scholar
  25. 25.
    M. Heusse, F. Rousseau, G. Berger-Sabbatel and A. Duda, “Performance Anomaly of 802.11b,” in Proc. IEEE INFOCOM, 2003.Google Scholar
  26. 26.
    Y. Jin and G. Kesidis “Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs,” in EEE Journal on Selected Areas in Communication, vol. 25, no. 6, pp. 1113–1123, Aug. 2007.Google Scholar
  27. 27.
    J. Konorski, “Solvability of a Markovian Model of an IEEE 802.11 LAN under a Backoff Attack,” in Proc. 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 2005, pp. 491–498.Google Scholar
  28. 28.
    B. Krishnamurthy, S. Sen, Y. Zhang and Y. Chen, “Sketch-based Change Detection: Methods, Evaluation, and Applications,” in Proc. ACM SIGCOMM IMS, 2003.Google Scholar
  29. 29.
    P. Kyasanur and N. Vaidya, “Detection and Handling of MAC Layer Misbehavior in Wireless Networks,” in Proc. IEEE DSN, 2003, pp. 173–182.Google Scholar
  30. 30.
    P. Kyasanur and N. Vaidya, “Selfish MAC Layer Misbehavior in Wireless Networks,” in IEEE Trans. Mobile Comput., vol. 4, no. 5, pp. 502–516, 2005.Google Scholar
  31. 31.
    M. Luo, T. Peng and C. Leckie “CPU-Based DoS Attacks Agaisnt SIP Servers,” in Proc. IEEE Network Operations and Management Symposium, 2008, pp. 41–48.Google Scholar
  32. 32.
    S. Niccolini, R. Garroppo, S. Giordano, G. Risi and S. Ventura, “SIP Intrusion Detection and Prevention: Recommendations and Prototype Implementation,” in Proc. 1st IEEE Workshop on VoIP Management and Security, 2006, pp. 47–52.Google Scholar
  33. 33.
    P. Nuggehalli, M. Sarkar and R. Rao, “QoS and Selfish Users: A MAC Layer Perspective,” in Proc. IEEE GLOBECOM, 2007, pp. 4719–4723.Google Scholar
  34. 34.
    K. Pelechrinis, G. Yan, S. Eidenbenz and V. Krishnamurthy, “Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks,” in Proc. IEEE INFOCOM, 2009, pp. 657–665.Google Scholar
  35. 35.
    S. Radosavac, J. S. Baras and I. Koutsopoulos, “A Framework for MAC Protocol Misbehavior Detection in Wireless Networks,” in Proc. ACM Workshop on Wireless Security, 2005, pp. 33–42.Google Scholar
  36. 36.
    S. Radosavac, G. Moustakides, J. Baras and I. Koutsopoulos, “An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks,” in ACM Trans. Information and Systems Security, vol. 11, no. 4, article no. 19, Jul. 2008.Google Scholar
  37. 37.
    M. Raya, J. Hubaux and I. Aad, “DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots,” in Proc. ACM MobiSys, 2004.Google Scholar
  38. 38.
    Y. Rong, S. Lee and H. Choi, “Detecting Stations Cheating on Backoff Rules in 802.11 Networks using Sequential Analysis,” in Proc. IEEE INFOCOM, 2006, pp. 1–13.Google Scholar
  39. 39.
    J. Rosenberg, H. Schulzrinne and G. Camarillo, “SIP: Session Initiation Protocol,” IETF RFC 3261, Jun. 2002.Google Scholar
  40. 40.
    S. Sawda and P. Urien “SIP Security Attacks and Solutions: A State-of-the-Art Review,” in Proc. IEEE 2nd Information and Communication Technologies, 2006, pp. 3187–3191.Google Scholar
  41. 41.
    R. Schweller, Z. Li, Y. Chen, Y. Gao, A. Gupta, Y. Zhang, P. Dinda, M. Kao and G. Memik “Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications” in Proc. IEEE INFOCOM, 2006.Google Scholar
  42. 42.
    H. Sengar, H. Wang, D. Wijesekera and S. Jajodia, “Fast Detection of Denial-of-Service Attacks on IP Telephony,” in Proc. 14th IEEE International Workshop on Quality of Service, 2006, pp. 199–208.Google Scholar
  43. 43.
    H. Sengar, D. Wijesekera, H. Wang and S. Jajodia, “VoIP Intrusion Detection Through Interacting Protocol State Machines,” in Proc. IEEE International Conference on Dependable Systems and Networks, 2006.Google Scholar
  44. 44.
    H. Sengar, H. Wang, D. Wijesekera and S. Jajodia, “Detecting VoIP Floods Using the Hellinger Distance,” IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 6, pp. 794–805, Jun. 2008.CrossRefGoogle Scholar
  45. 45.
    D. Sisalem, J. Kuthan and S. Ehlert, “Denial of Service Attacks Targeting a SIP VoIP Infrastructure: Attack Scenarios and Prevention Mechanisms,” IEEE Network, vol. 20, no. 5, pp. 26–31, 2006.CrossRefGoogle Scholar
  46. 46.
    M. Stephens, “EDF Statistics for Goodness of Fit and Some Comparisons,” Journal of the American Statistical Association, vol. 69, pp. 730–737, 1974.CrossRefGoogle Scholar
  47. 47.
    The MAdWiFi Driver, [Online.] Available: http://madwifi-project.org/.
  48. 48.
    A. Toledo and X. Wang, “A Robust Kolmogorov-Smirnov Detector for Misbehavior IEEE 802.11 DCF,” in Proc. IEEE ICC, 2007, pp. 1564–1569.Google Scholar
  49. 49.
    A. Toledo and X. Wang, “Robust Detection of Selfish Misbehavior in Wireless Networks,” in IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1124–1134, Aug. 2007.Google Scholar
  50. 50.
    A. Toledo and X. Wang, “Detecting MAC Layer Collision Abnormalities in CSMA/CA Wireless Networks,” in Proc. IEEE ICC, 2008, pp. 1598–1604.Google Scholar
  51. 51.
    A. Toledo and X. Wang, “Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks,” in IEEE Trans. Information Forensics and Security, vol. 3, no. 3, pp. 347–358, Sept. 2008.Google Scholar
  52. 52.
    VoIPSA, “VoIP Security and Privacy Threat Taxonomy,” Public Release 1.0, 2005.Google Scholar
  53. 53.
    S. Vuong and Y. Bai, “A Survey of VoIP Intrusion and Intrusion Detection System,” in Proc. IEEE 6th International Conference on Advanced Communication Technology, 2004, pp. 317–322.Google Scholar
  54. 54.
    G. Yang and L. Le Cam, Asymptotics in Statistics: Some Basic Concepts, second edition, Wiley, Mar. 2006.Google Scholar
  55. 55.
    H. Zhai, X. Chen and Y. Fang, “How Well Can the IEEE 802.11 Wireless LAN Support Quality of Service?” in IEEE Trans. Wireless Communications, vol. 4, no. 6, pp. 3084–3094, Nov. 2005.Google Scholar
  56. 56.
    “IEEE Standard for Wireless LAN-Medium Access Control and Physical Layer Specification,” P802.11, 1999.Google Scholar

Copyright information

© The Author(s) 2013

Authors and Affiliations

  • Jin Tang
    • 1
  • Yu Cheng
    • 2
  1. 1.AT&T LabsWarrenvilleUSA
  2. 2.Department of Electrical and Computer EngineeringIllinois Institute of TechnologyChicagoUSA

Personalised recommendations