Skip to main content

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 702 Accesses

Abstract

IP-based multimedia communications have become prevailing in recent years, with a wide range of benefits such as cost-efficient deployment, plenty of features, and convenience for service integration. At the same time, the deployment of IEEE 802.11TM based wireless networks has been dramatically increasing over years due to their high-speed access, easy-to-use feature, and economical advantages. The convergence of such two trends, IP-based multimedia communications over 802.11TM based wireless networks, leads to a promising all-IP platform to provision economic high-quality multimedia services to mobile users anytime and anywhere, which has drawn extensive attentions from both academia and industry.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. T. Anderson and D. Darling, “Asymptotic Theory of Certain “Goodness-of-Fit” Criteria Based on Stochastic Processes,” Annals of Mathematical Statistics, 1952.

    Google Scholar 

  2. J. Bellardo, and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” in Proc. USENIX Security Symposium, 2003.

    Google Scholar 

  3. G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordination Function,” IEEE Journal on Selected Areas of Communication, vol. 18, no. 3, pp. 535–547, Mar. 2000.

    Google Scholar 

  4. L. Buttyan and J. Hubaux, “Report on a Working Session on Security in Wireless Ad hoc Networks,” in Mobile Computing and Communications Review, vol. 6, no. 4, 2002.

    Google Scholar 

  5. M. Cagalj, S. Ganeriwal, I. Aad and J. Hubaux, “On Selfish Behavior in CSMA/CA Networks,” in Proc. IEEE INFOCOM, 2005.

    Google Scholar 

  6. C. Callegari, R. Garroppo, S. Giordano, M. Pegano and F. russo “A Novel Method for Detecting Attacks Towards the SIP Protocol,” in Proc. IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2009, pp. 268–273.

    Google Scholar 

  7. A. Cardenas, S. Radosavac and J. Baras, “Detection and Prevention of MAC Layer Misbehavior in Ad Hoc Networks,” in Pro. ACM 2nd Workshop on Security of ad hoc and Sensor Networks, 2004, pp. 17–22.

    Google Scholar 

  8. A. Cardenas, S. Radosavac and J. Baras, “Evaluation of Detection Algorithm for MAC Layer Misbehavior: Theory and Evaluation,” IEEE Trans. Networking, vol. 17, no. 2, pp. 605–617, Apr. 2009.

    Article  Google Scholar 

  9. E. Chen, “Detecting DoS Attacks on SIP Systems,” in Proc. 1st IEEE Workshop on VoIP Management and Security, 2006, pp. 53–58.

    Google Scholar 

  10. Y. Cheng, X. Ling, W. Song, L. Cai, W. Zhuang, and X. Shen, “A Cross-layer Approach for WLAN Voice Capacity Planning,” IEEE Journal on Selected Areas of Communications, vol. 25, no. 4, pp. 678–688, May 2007.

    Article  Google Scholar 

  11. Y. Ding and G. Su, “Intrusion Detection System for Signal Based SIP Attacks Through Timed HPCN,” in Proc. 2nd International Conference on Availability, Reliability and Security, 2007, pp. 190–197.

    Google Scholar 

  12. S. Donovan, and J. Rosenberg, “Session Timers in the Session Initiation Protocol (SIP),” IETF RFC 4028, Apr. 2005.

    Google Scholar 

  13. S. Elhert, C. Wang, T. Magedanz and D. Sisalem, “Specification-Based Denial-of-Service Detection for SIP Voice-over-IP Networks,” in Proc. 3rd IEEE International Conference on Internet Monitoring and Protection, 2008, pp. 59–66.

    Google Scholar 

  14. C. Foh and M. Zukerman, “Performance Analysis of the IEEE 802.11 MAC Protocol,” in Proc. Europe Wireless, 2002, pp. 184–190.

    Google Scholar 

  15. D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis and S. Gritzalis, “A Framework for Detecting Malformed Messages in SIP Networks,” in Proc. 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005.

    Google Scholar 

  16. D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis and S. Gritzalis, “SIP Security Mechanism: A State-of-the-Art Review,” in Proc. 5th International Network Conference, 2005, pp. 147–155.

    Google Scholar 

  17. D. Geneiatakis, G. Kambourakis, C. Lambrinoudakis, T. Dagiuklas and S. Gritzalis, “SIP Message Tampering: THE SQL code INJECTION attack,” in Proc. IEEE 13th International Conference on Software, Telecommunications and Computer, 2005.

    Google Scholar 

  18. D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, K. S. Ehlert and D. Sisalem, “Survey of Security Vulnerabiliteis in Session Initiation Protocol,” IEEE Communication Surveys & Tutorials, vol. 8, no. 3, pp. 68–81, 2006.

    Article  Google Scholar 

  19. L. Giarre, G. Neglia and I. Tinnirello “Medium Access in WiFi Networks: Strategies of Selfish Nodes,” in IEEE Signal Processing Magazine, pp. 124–128, Sept. 2006.

    Google Scholar 

  20. A. Gilbert, S. Guha, P. Indyk, S. Muthukrishnan and M. Strauss, “Quicksand: Quick Summary and Analysis of Network Data,” DIMACS Technical Report 2001–43, 2001.

    Google Scholar 

  21. L. Guang, C. Assi and A. Benslimane, “Enhancing IEEE 802.11 Random Backoff in Selfish Environment,” in IEEE Trans. Vehicular Technology, vol. 57, no. 3, pp. 1806–1822, May 2008.

    Google Scholar 

  22. V. Gupta, S. Krishnamurthy and M. Faloutsos, “Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Network,” in Proc. IEEE MILCOM, 2002.

    Google Scholar 

  23. F. Gustafson and M. Lindahl, “Evaluation of statistical distributions for VoIP traffic modelling,” University Essay from University West, Department of Economics and IT, 2009.

    Google Scholar 

  24. Y. He, Y. Wen and H. Zhao “SPIT Detection and Prevention Method in VoIP Environment,” in Proc. IEEE 3rd International Conference on Availability, Reliability and Security, 2008, pp. 473–478.

    Google Scholar 

  25. M. Heusse, F. Rousseau, G. Berger-Sabbatel and A. Duda, “Performance Anomaly of 802.11b,” in Proc. IEEE INFOCOM, 2003.

    Google Scholar 

  26. Y. Jin and G. Kesidis “Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs,” in EEE Journal on Selected Areas in Communication, vol. 25, no. 6, pp. 1113–1123, Aug. 2007.

    Google Scholar 

  27. J. Konorski, “Solvability of a Markovian Model of an IEEE 802.11 LAN under a Backoff Attack,” in Proc. 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 2005, pp. 491–498.

    Google Scholar 

  28. B. Krishnamurthy, S. Sen, Y. Zhang and Y. Chen, “Sketch-based Change Detection: Methods, Evaluation, and Applications,” in Proc. ACM SIGCOMM IMS, 2003.

    Google Scholar 

  29. P. Kyasanur and N. Vaidya, “Detection and Handling of MAC Layer Misbehavior in Wireless Networks,” in Proc. IEEE DSN, 2003, pp. 173–182.

    Google Scholar 

  30. P. Kyasanur and N. Vaidya, “Selfish MAC Layer Misbehavior in Wireless Networks,” in IEEE Trans. Mobile Comput., vol. 4, no. 5, pp. 502–516, 2005.

    Google Scholar 

  31. M. Luo, T. Peng and C. Leckie “CPU-Based DoS Attacks Agaisnt SIP Servers,” in Proc. IEEE Network Operations and Management Symposium, 2008, pp. 41–48.

    Google Scholar 

  32. S. Niccolini, R. Garroppo, S. Giordano, G. Risi and S. Ventura, “SIP Intrusion Detection and Prevention: Recommendations and Prototype Implementation,” in Proc. 1st IEEE Workshop on VoIP Management and Security, 2006, pp. 47–52.

    Google Scholar 

  33. P. Nuggehalli, M. Sarkar and R. Rao, “QoS and Selfish Users: A MAC Layer Perspective,” in Proc. IEEE GLOBECOM, 2007, pp. 4719–4723.

    Google Scholar 

  34. K. Pelechrinis, G. Yan, S. Eidenbenz and V. Krishnamurthy, “Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks,” in Proc. IEEE INFOCOM, 2009, pp. 657–665.

    Google Scholar 

  35. S. Radosavac, J. S. Baras and I. Koutsopoulos, “A Framework for MAC Protocol Misbehavior Detection in Wireless Networks,” in Proc. ACM Workshop on Wireless Security, 2005, pp. 33–42.

    Google Scholar 

  36. S. Radosavac, G. Moustakides, J. Baras and I. Koutsopoulos, “An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks,” in ACM Trans. Information and Systems Security, vol. 11, no. 4, article no. 19, Jul. 2008.

    Google Scholar 

  37. M. Raya, J. Hubaux and I. Aad, “DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots,” in Proc. ACM MobiSys, 2004.

    Google Scholar 

  38. Y. Rong, S. Lee and H. Choi, “Detecting Stations Cheating on Backoff Rules in 802.11 Networks using Sequential Analysis,” in Proc. IEEE INFOCOM, 2006, pp. 1–13.

    Google Scholar 

  39. J. Rosenberg, H. Schulzrinne and G. Camarillo, “SIP: Session Initiation Protocol,” IETF RFC 3261, Jun. 2002.

    Google Scholar 

  40. S. Sawda and P. Urien “SIP Security Attacks and Solutions: A State-of-the-Art Review,” in Proc. IEEE 2nd Information and Communication Technologies, 2006, pp. 3187–3191.

    Google Scholar 

  41. R. Schweller, Z. Li, Y. Chen, Y. Gao, A. Gupta, Y. Zhang, P. Dinda, M. Kao and G. Memik “Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications” in Proc. IEEE INFOCOM, 2006.

    Google Scholar 

  42. H. Sengar, H. Wang, D. Wijesekera and S. Jajodia, “Fast Detection of Denial-of-Service Attacks on IP Telephony,” in Proc. 14th IEEE International Workshop on Quality of Service, 2006, pp. 199–208.

    Google Scholar 

  43. H. Sengar, D. Wijesekera, H. Wang and S. Jajodia, “VoIP Intrusion Detection Through Interacting Protocol State Machines,” in Proc. IEEE International Conference on Dependable Systems and Networks, 2006.

    Google Scholar 

  44. H. Sengar, H. Wang, D. Wijesekera and S. Jajodia, “Detecting VoIP Floods Using the Hellinger Distance,” IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 6, pp. 794–805, Jun. 2008.

    Article  Google Scholar 

  45. D. Sisalem, J. Kuthan and S. Ehlert, “Denial of Service Attacks Targeting a SIP VoIP Infrastructure: Attack Scenarios and Prevention Mechanisms,” IEEE Network, vol. 20, no. 5, pp. 26–31, 2006.

    Article  Google Scholar 

  46. M. Stephens, “EDF Statistics for Goodness of Fit and Some Comparisons,” Journal of the American Statistical Association, vol. 69, pp. 730–737, 1974.

    Article  Google Scholar 

  47. The MAdWiFi Driver, [Online.] Available: http://madwifi-project.org/.

  48. A. Toledo and X. Wang, “A Robust Kolmogorov-Smirnov Detector for Misbehavior IEEE 802.11 DCF,” in Proc. IEEE ICC, 2007, pp. 1564–1569.

    Google Scholar 

  49. A. Toledo and X. Wang, “Robust Detection of Selfish Misbehavior in Wireless Networks,” in IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1124–1134, Aug. 2007.

    Google Scholar 

  50. A. Toledo and X. Wang, “Detecting MAC Layer Collision Abnormalities in CSMA/CA Wireless Networks,” in Proc. IEEE ICC, 2008, pp. 1598–1604.

    Google Scholar 

  51. A. Toledo and X. Wang, “Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks,” in IEEE Trans. Information Forensics and Security, vol. 3, no. 3, pp. 347–358, Sept. 2008.

    Google Scholar 

  52. VoIPSA, “VoIP Security and Privacy Threat Taxonomy,” Public Release 1.0, 2005.

    Google Scholar 

  53. S. Vuong and Y. Bai, “A Survey of VoIP Intrusion and Intrusion Detection System,” in Proc. IEEE 6th International Conference on Advanced Communication Technology, 2004, pp. 317–322.

    Google Scholar 

  54. G. Yang and L. Le Cam, Asymptotics in Statistics: Some Basic Concepts, second edition, Wiley, Mar. 2006.

    Google Scholar 

  55. H. Zhai, X. Chen and Y. Fang, “How Well Can the IEEE 802.11 Wireless LAN Support Quality of Service?” in IEEE Trans. Wireless Communications, vol. 4, no. 6, pp. 3084–3094, Nov. 2005.

    Google Scholar 

  56. “IEEE Standard for Wireless LAN-Medium Access Control and Physical Layer Specification,” P802.11, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Tang, J., Cheng, Y. (2013). Introduction. In: Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8996-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-8996-2_1

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-8995-5

  • Online ISBN: 978-1-4614-8996-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics