Abstract
IP-based multimedia communications have become prevailing in recent years, with a wide range of benefits such as cost-efficient deployment, plenty of features, and convenience for service integration. At the same time, the deployment of IEEE 802.11TM based wireless networks has been dramatically increasing over years due to their high-speed access, easy-to-use feature, and economical advantages. The convergence of such two trends, IP-based multimedia communications over 802.11TM based wireless networks, leads to a promising all-IP platform to provision economic high-quality multimedia services to mobile users anytime and anywhere, which has drawn extensive attentions from both academia and industry.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
T. Anderson and D. Darling, “Asymptotic Theory of Certain “Goodness-of-Fit” Criteria Based on Stochastic Processes,” Annals of Mathematical Statistics, 1952.
J. Bellardo, and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” in Proc. USENIX Security Symposium, 2003.
G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordination Function,” IEEE Journal on Selected Areas of Communication, vol. 18, no. 3, pp. 535–547, Mar. 2000.
L. Buttyan and J. Hubaux, “Report on a Working Session on Security in Wireless Ad hoc Networks,” in Mobile Computing and Communications Review, vol. 6, no. 4, 2002.
M. Cagalj, S. Ganeriwal, I. Aad and J. Hubaux, “On Selfish Behavior in CSMA/CA Networks,” in Proc. IEEE INFOCOM, 2005.
C. Callegari, R. Garroppo, S. Giordano, M. Pegano and F. russo “A Novel Method for Detecting Attacks Towards the SIP Protocol,” in Proc. IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2009, pp. 268–273.
A. Cardenas, S. Radosavac and J. Baras, “Detection and Prevention of MAC Layer Misbehavior in Ad Hoc Networks,” in Pro. ACM 2nd Workshop on Security of ad hoc and Sensor Networks, 2004, pp. 17–22.
A. Cardenas, S. Radosavac and J. Baras, “Evaluation of Detection Algorithm for MAC Layer Misbehavior: Theory and Evaluation,” IEEE Trans. Networking, vol. 17, no. 2, pp. 605–617, Apr. 2009.
E. Chen, “Detecting DoS Attacks on SIP Systems,” in Proc. 1st IEEE Workshop on VoIP Management and Security, 2006, pp. 53–58.
Y. Cheng, X. Ling, W. Song, L. Cai, W. Zhuang, and X. Shen, “A Cross-layer Approach for WLAN Voice Capacity Planning,” IEEE Journal on Selected Areas of Communications, vol. 25, no. 4, pp. 678–688, May 2007.
Y. Ding and G. Su, “Intrusion Detection System for Signal Based SIP Attacks Through Timed HPCN,” in Proc. 2nd International Conference on Availability, Reliability and Security, 2007, pp. 190–197.
S. Donovan, and J. Rosenberg, “Session Timers in the Session Initiation Protocol (SIP),” IETF RFC 4028, Apr. 2005.
S. Elhert, C. Wang, T. Magedanz and D. Sisalem, “Specification-Based Denial-of-Service Detection for SIP Voice-over-IP Networks,” in Proc. 3rd IEEE International Conference on Internet Monitoring and Protection, 2008, pp. 59–66.
C. Foh and M. Zukerman, “Performance Analysis of the IEEE 802.11 MAC Protocol,” in Proc. Europe Wireless, 2002, pp. 184–190.
D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis and S. Gritzalis, “A Framework for Detecting Malformed Messages in SIP Networks,” in Proc. 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005.
D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis and S. Gritzalis, “SIP Security Mechanism: A State-of-the-Art Review,” in Proc. 5th International Network Conference, 2005, pp. 147–155.
D. Geneiatakis, G. Kambourakis, C. Lambrinoudakis, T. Dagiuklas and S. Gritzalis, “SIP Message Tampering: THE SQL code INJECTION attack,” in Proc. IEEE 13th International Conference on Software, Telecommunications and Computer, 2005.
D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, K. S. Ehlert and D. Sisalem, “Survey of Security Vulnerabiliteis in Session Initiation Protocol,” IEEE Communication Surveys & Tutorials, vol. 8, no. 3, pp. 68–81, 2006.
L. Giarre, G. Neglia and I. Tinnirello “Medium Access in WiFi Networks: Strategies of Selfish Nodes,” in IEEE Signal Processing Magazine, pp. 124–128, Sept. 2006.
A. Gilbert, S. Guha, P. Indyk, S. Muthukrishnan and M. Strauss, “Quicksand: Quick Summary and Analysis of Network Data,” DIMACS Technical Report 2001–43, 2001.
L. Guang, C. Assi and A. Benslimane, “Enhancing IEEE 802.11 Random Backoff in Selfish Environment,” in IEEE Trans. Vehicular Technology, vol. 57, no. 3, pp. 1806–1822, May 2008.
V. Gupta, S. Krishnamurthy and M. Faloutsos, “Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Network,” in Proc. IEEE MILCOM, 2002.
F. Gustafson and M. Lindahl, “Evaluation of statistical distributions for VoIP traffic modelling,” University Essay from University West, Department of Economics and IT, 2009.
Y. He, Y. Wen and H. Zhao “SPIT Detection and Prevention Method in VoIP Environment,” in Proc. IEEE 3rd International Conference on Availability, Reliability and Security, 2008, pp. 473–478.
M. Heusse, F. Rousseau, G. Berger-Sabbatel and A. Duda, “Performance Anomaly of 802.11b,” in Proc. IEEE INFOCOM, 2003.
Y. Jin and G. Kesidis “Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs,” in EEE Journal on Selected Areas in Communication, vol. 25, no. 6, pp. 1113–1123, Aug. 2007.
J. Konorski, “Solvability of a Markovian Model of an IEEE 802.11 LAN under a Backoff Attack,” in Proc. 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 2005, pp. 491–498.
B. Krishnamurthy, S. Sen, Y. Zhang and Y. Chen, “Sketch-based Change Detection: Methods, Evaluation, and Applications,” in Proc. ACM SIGCOMM IMS, 2003.
P. Kyasanur and N. Vaidya, “Detection and Handling of MAC Layer Misbehavior in Wireless Networks,” in Proc. IEEE DSN, 2003, pp. 173–182.
P. Kyasanur and N. Vaidya, “Selfish MAC Layer Misbehavior in Wireless Networks,” in IEEE Trans. Mobile Comput., vol. 4, no. 5, pp. 502–516, 2005.
M. Luo, T. Peng and C. Leckie “CPU-Based DoS Attacks Agaisnt SIP Servers,” in Proc. IEEE Network Operations and Management Symposium, 2008, pp. 41–48.
S. Niccolini, R. Garroppo, S. Giordano, G. Risi and S. Ventura, “SIP Intrusion Detection and Prevention: Recommendations and Prototype Implementation,” in Proc. 1st IEEE Workshop on VoIP Management and Security, 2006, pp. 47–52.
P. Nuggehalli, M. Sarkar and R. Rao, “QoS and Selfish Users: A MAC Layer Perspective,” in Proc. IEEE GLOBECOM, 2007, pp. 4719–4723.
K. Pelechrinis, G. Yan, S. Eidenbenz and V. Krishnamurthy, “Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks,” in Proc. IEEE INFOCOM, 2009, pp. 657–665.
S. Radosavac, J. S. Baras and I. Koutsopoulos, “A Framework for MAC Protocol Misbehavior Detection in Wireless Networks,” in Proc. ACM Workshop on Wireless Security, 2005, pp. 33–42.
S. Radosavac, G. Moustakides, J. Baras and I. Koutsopoulos, “An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks,” in ACM Trans. Information and Systems Security, vol. 11, no. 4, article no. 19, Jul. 2008.
M. Raya, J. Hubaux and I. Aad, “DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots,” in Proc. ACM MobiSys, 2004.
Y. Rong, S. Lee and H. Choi, “Detecting Stations Cheating on Backoff Rules in 802.11 Networks using Sequential Analysis,” in Proc. IEEE INFOCOM, 2006, pp. 1–13.
J. Rosenberg, H. Schulzrinne and G. Camarillo, “SIP: Session Initiation Protocol,” IETF RFC 3261, Jun. 2002.
S. Sawda and P. Urien “SIP Security Attacks and Solutions: A State-of-the-Art Review,” in Proc. IEEE 2nd Information and Communication Technologies, 2006, pp. 3187–3191.
R. Schweller, Z. Li, Y. Chen, Y. Gao, A. Gupta, Y. Zhang, P. Dinda, M. Kao and G. Memik “Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications” in Proc. IEEE INFOCOM, 2006.
H. Sengar, H. Wang, D. Wijesekera and S. Jajodia, “Fast Detection of Denial-of-Service Attacks on IP Telephony,” in Proc. 14th IEEE International Workshop on Quality of Service, 2006, pp. 199–208.
H. Sengar, D. Wijesekera, H. Wang and S. Jajodia, “VoIP Intrusion Detection Through Interacting Protocol State Machines,” in Proc. IEEE International Conference on Dependable Systems and Networks, 2006.
H. Sengar, H. Wang, D. Wijesekera and S. Jajodia, “Detecting VoIP Floods Using the Hellinger Distance,” IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 6, pp. 794–805, Jun. 2008.
D. Sisalem, J. Kuthan and S. Ehlert, “Denial of Service Attacks Targeting a SIP VoIP Infrastructure: Attack Scenarios and Prevention Mechanisms,” IEEE Network, vol. 20, no. 5, pp. 26–31, 2006.
M. Stephens, “EDF Statistics for Goodness of Fit and Some Comparisons,” Journal of the American Statistical Association, vol. 69, pp. 730–737, 1974.
The MAdWiFi Driver, [Online.] Available: http://madwifi-project.org/.
A. Toledo and X. Wang, “A Robust Kolmogorov-Smirnov Detector for Misbehavior IEEE 802.11 DCF,” in Proc. IEEE ICC, 2007, pp. 1564–1569.
A. Toledo and X. Wang, “Robust Detection of Selfish Misbehavior in Wireless Networks,” in IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1124–1134, Aug. 2007.
A. Toledo and X. Wang, “Detecting MAC Layer Collision Abnormalities in CSMA/CA Wireless Networks,” in Proc. IEEE ICC, 2008, pp. 1598–1604.
A. Toledo and X. Wang, “Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks,” in IEEE Trans. Information Forensics and Security, vol. 3, no. 3, pp. 347–358, Sept. 2008.
VoIPSA, “VoIP Security and Privacy Threat Taxonomy,” Public Release 1.0, 2005.
S. Vuong and Y. Bai, “A Survey of VoIP Intrusion and Intrusion Detection System,” in Proc. IEEE 6th International Conference on Advanced Communication Technology, 2004, pp. 317–322.
G. Yang and L. Le Cam, Asymptotics in Statistics: Some Basic Concepts, second edition, Wiley, Mar. 2006.
H. Zhai, X. Chen and Y. Fang, “How Well Can the IEEE 802.11 Wireless LAN Support Quality of Service?” in IEEE Trans. Wireless Communications, vol. 4, no. 6, pp. 3084–3094, Nov. 2005.
“IEEE Standard for Wireless LAN-Medium Access Control and Physical Layer Specification,” P802.11, 1999.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 The Author(s)
About this chapter
Cite this chapter
Tang, J., Cheng, Y. (2013). Introduction. In: Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8996-2_1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8996-2_1
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8995-5
Online ISBN: 978-1-4614-8996-2
eBook Packages: Computer ScienceComputer Science (R0)