An intelligence based model for the prevention of advanced cyber-attacks
The trend and motive of Cyber-attacks have gone beyond traditional damages and challenges to information stealing for political and economic gain. With the recent APT (Advance Persistent Threat), which comprises of Zero-day malware, Polymorphic malware, and Blended threat, the task of protecting vit...
| Main Authors: | Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English English English |
| Published: |
IEEE
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/49245/ http://irep.iium.edu.my/49245/1/Intelligent_based_model-preven-cyberattacks-ICT4M-Kuching.pdf http://irep.iium.edu.my/49245/3/07020681.pdf http://irep.iium.edu.my/49245/4/07020579.pdf http://irep.iium.edu.my/49245/8/49245_An%20intelligence%20based%20model_scopus.pdf |
Similar Items
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2015)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2015)
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Improved Malware detection model with Apriori Association rule and particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2019)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2019)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
On the prevention of Cross-VM cache-based side channel attacks / Zakira Inayat
by: Zakira, Inayat
Published: (2017)
by: Zakira, Inayat
Published: (2017)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
Intelligent responses through network-based answer discovery with advanced reasoning
by: Wong, Wilson, et al.
Published: (2005)
by: Wong, Wilson, et al.
Published: (2005)
Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning
by: Thrupthi, C.P., et al.
Published: (2024)
by: Thrupthi, C.P., et al.
Published: (2024)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
by: Azad, Saiful, et al.
Published: (2024)
by: Azad, Saiful, et al.
Published: (2024)
Cyber physical systems for collaborative indoor localization and mapping
by: Ang, Jacqueline Lee Fang
Published: (2018)
by: Ang, Jacqueline Lee Fang
Published: (2018)
Development of intelligent 3D solid modeler based on artificial intelligent technique
by: Mohd. Zain, Azlan, et al.
Published: (2008)
by: Mohd. Zain, Azlan, et al.
Published: (2008)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
by: Shamshirband, Shahaboddin
Published: (2014)
by: Shamshirband, Shahaboddin
Published: (2014)
An efficient detection model of selective forwarding attacks in wireless mesh networks
by: Khanam, Shapla, et al.
Published: (2012)
by: Khanam, Shapla, et al.
Published: (2012)
Sistem kafe siber (Cyber cafe’ system) / Norhashimah Hashim
by: Norhashimah , Hashim
Published: (2003)
by: Norhashimah , Hashim
Published: (2003)
Traceback Model for Identifying Sources of Distributed
Attacks in Real Time
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
Joux multicollisions attack in sponge construction
by: AlAhmad, Mohammad A., et al.
Published: (2013)
by: AlAhmad, Mohammad A., et al.
Published: (2013)
Semantic model for artificial intelligence based on molecular computing
by: Tsuboi, Yusei, et al.
Published: (2004)
by: Tsuboi, Yusei, et al.
Published: (2004)
C++ Programming tutoring simulation "CyberCPP" / Muhammad Nor Mahat
by: Muhammad Nor, Mahat
Published: (2005)
by: Muhammad Nor, Mahat
Published: (2005)
An Action Arcade Web Based Game-Slime Attack Plus (Slime Invader)
by: Ong, Hui Huang
Published: (2017)
by: Ong, Hui Huang
Published: (2017)
Protect data and be alert to online cyber threats
by: Irman, Khalil, et al.
Published: (2021)
by: Irman, Khalil, et al.
Published: (2021)
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
Evaluating Cyber Security Awareness Levels For Employees In DRB-Hicom Auto Solutions
by: Mohd Fadli Kasim,
Published: (2021)
by: Mohd Fadli Kasim,
Published: (2021)
The Application of Mixed Method in Developing a Cyber
Terrorism Framework
by: Ahmad, Rabiah, et al.
Published: (2012)
by: Ahmad, Rabiah, et al.
Published: (2012)
Simulation System To Educate People On Phivisp Attack
by: Salman, Khairul Anuar
Published: (2023)
by: Salman, Khairul Anuar
Published: (2023)
An Action Arcade Web-Based Game – Slime Attack Plus (Stack-O-Slime)
by: Chan, Hoong Wai
Published: (2017)
by: Chan, Hoong Wai
Published: (2017)
Expert System of Heart Attack Prediction
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
Image manipulations analysis and detection methods for reflection-based attacks / Nor Bakiah Abd. Warif
by: Nor Bakiah, Abd. Warif
Published: (2018)
by: Nor Bakiah, Abd. Warif
Published: (2018)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Applying Neural Network to U2R Attacks
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
Similar Items
-
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2015) -
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014) -
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014) -
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015) -
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)