Statistical-based SYN-flooding detection using programmable network processor
With the growing use of broadband Internet, the demand for hardware-based intrusion detection system (IDS) is exploding. Network processor is poised to be the future platform for hardware-based IDS and firewall due to its programmability and capability to process packets at wire speed. In this paper...
| Main Authors: | Lim, , BP, Uddin,, MS |
|---|---|
| Format: | Article |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2391/ |
Similar Items
Synmon architecture for source-based SYN-flooding defense on network processor
by: Lim,, BP, et al.
Published: (2005)
by: Lim,, BP, et al.
Published: (2005)
Mitigation Of Syn-Flooding Attack Using High Speed Programmable Network Processor
by: Lim, Boon Ping
Published: (2006)
by: Lim, Boon Ping
Published: (2006)
Flood Prediction Based On Deep Learning Networks With Variational Mode Decomposition
by: Ni, Chenmin
Published: (2024)
by: Ni, Chenmin
Published: (2024)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
An efficient VLSI implementation of lifting based forward discrete wavelet transform processor for JPEG200
by: Bhuyan, Mohammad Shaharia, et al.
Published: (2007)
by: Bhuyan, Mohammad Shaharia, et al.
Published: (2007)
Rule Learning and Extraction Using a Hybrid Neural Network: A Case Study on Fault Detection and Diagnosis
by: Tan, Shing Chiang, et al.
Published: (2005)
by: Tan, Shing Chiang, et al.
Published: (2005)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer.
by: Budiarto, Rahmat, et al.
Published: (2007)
by: Budiarto, Rahmat, et al.
Published: (2007)
Multi-fish Detection And Tracking Using Track-mask Region
Convolutional Neural Network
by: Alshdaifat, Nawaf Farhan Fankur
Published: (2023)
by: Alshdaifat, Nawaf Farhan Fankur
Published: (2023)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: Sallim, Jamaludin
Published: (2017)
by: Sallim, Jamaludin
Published: (2017)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: SALLIM, JAMALUDIN
Published: (2017)
by: SALLIM, JAMALUDIN
Published: (2017)
Efficient and fast multi layer statistical approach for colour based image retrieval
by: Odeh, , JQ, et al.
Published: (2003)
by: Odeh, , JQ, et al.
Published: (2003)
Disaster Relief and Preparedness: Enhancing Supply Chain Management system to support effective flood relief operation.
by: Husain, Wahidah
Published: (2016)
by: Husain, Wahidah
Published: (2016)
Statistical Analysis of Video Frame Size Distribution
Originating from Scalable Video Codec (SVC)
by: Ahmadpour, Sima, et al.
Published: (2017)
by: Ahmadpour, Sima, et al.
Published: (2017)
Enhanced Statistical Modelling For Variable Bit Rate Video Traffic Generated From Scalable Video Codec
by: Ahmadpour, Sima
Published: (2016)
by: Ahmadpour, Sima
Published: (2016)
English-Malay Cross-Lingual Emotion Detection In Tweets Using Word Embedding Alignment
by: Lim, Ying Hao
Published: (2023)
by: Lim, Ying Hao
Published: (2023)
Conceptual Vectors, A Complementary Tool To Lexical Networks.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
Energy efficient routing for wireless sensor networks with grid topology
by: Goh, Hock Guan, et al.
Published: (2006)
by: Goh, Hock Guan, et al.
Published: (2006)
Stabilization of sequential learning neural network in sonar target classification via a novel approach
by: Lim, , WS, et al.
Published: (2005)
by: Lim, , WS, et al.
Published: (2005)
A hybrid neural network model for rule generation and its application to process fault detection and diagnosis
by: TAN, S, et al.
Published: (2007)
by: TAN, S, et al.
Published: (2007)
A Feature Selection Approach for Network Intrusion Detection
by: Khor, Kok-Chin, et al.
Published: (2009)
by: Khor, Kok-Chin, et al.
Published: (2009)
Automated Fish Detection And Identification
by: Wong , Poh Lee
Published: (2015)
by: Wong , Poh Lee
Published: (2015)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
Statistical Fusion Approach on Keystroke Dynamics
by: Teh, Pin Shen, et al.
Published: (2007)
by: Teh, Pin Shen, et al.
Published: (2007)
Enhanced Network Connectivity And Node Lifetime Techniques In Wireless Sensor Networks
by: Al-Saidi, Ali Shanon Aiyal
Published: (2013)
by: Al-Saidi, Ali Shanon Aiyal
Published: (2013)
A hybrid neural network model for rule generation and its application to process fault detection and diagnosis
by: S. C., Tan, et al.
Published: (2007)
by: S. C., Tan, et al.
Published: (2007)
CST234 - Network Programming
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
Modelling, Detection And Exploitation Of Lexical Functions For Analysis.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
CCS501 – NEURAL NETWORKS AND GENETIC ALGORITHMS
CSC513 – ARTIFICIAL NEURAL NETWORKS - SEPT. 2001
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
A feature interaction conflicts detection engine for pervasive networked environment
by: Low, H. K., et al.
Published: (2007)
by: Low, H. K., et al.
Published: (2007)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Robust incremental growing multi-experts network
by: LOO, C, et al.
Published: (2006)
by: LOO, C, et al.
Published: (2006)
Multiresolution watershed segmentation on a Beowulf network
by: Ishar,, S, et al.
Published: (2003)
by: Ishar,, S, et al.
Published: (2003)
Stock Trend Prediction With Neural Network Techniques
by: Mohd Haris Lye Abdullah,
Published: (2003)
by: Mohd Haris Lye Abdullah,
Published: (2003)
Similar Items
-
Synmon architecture for source-based SYN-flooding defense on network processor
by: Lim,, BP, et al.
Published: (2005) -
Mitigation Of Syn-Flooding Attack Using High Speed Programmable Network Processor
by: Lim, Boon Ping
Published: (2006) -
Flood Prediction Based On Deep Learning Networks With Variational Mode Decomposition
by: Ni, Chenmin
Published: (2024) -
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013) -
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)