Detecting and analyzing network attacks using virtual honeynet / Nur Atiqah Hasan
The security concern is the most important things about a networking environment and computer. To know how secure our computer and network, we must doing a study on how it can be work and defense it from any malicious attack. A virtual honeynet is a technology is designed to capture and give informa...
| Main Author: | Hasan, Nur Atiqah |
|---|---|
| Format: | Student Project |
| Language: | English |
| Published: |
Faculty of Information Technology and Quantitative Sciences
2006
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/692/ |
Similar Items
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Honeynet as a service deployment approach in enabling virtual crime scene investigation
by: Hasheminejad, Hamidreza
Published: (2015)
by: Hasheminejad, Hamidreza
Published: (2015)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Remote to Local Attack Detection Using Supervised Neural Network
by: Iftikhar, Ahmad, et al.
Published: (2010)
by: Iftikhar, Ahmad, et al.
Published: (2010)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
An efficient detection model of selective forwarding attacks in wireless mesh networks
by: Khanam, Shapla, et al.
Published: (2012)
by: Khanam, Shapla, et al.
Published: (2012)
Comparative performance of machine learning methods for classification on phishing attack detection
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Static hand gesture recognition using artificial neural network / Haitham Sabah Hasan
by: Hasan, Haitham Sabah
Published: (2014)
by: Hasan, Haitham Sabah
Published: (2014)
Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali
by: Azali, Muhamad Rizal
Published: (2005)
by: Azali, Muhamad Rizal
Published: (2005)
Exploring manet security aspects: analysis of attacks and node misbehaviour issues
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
Deep learning-based classification model for botnet attack detection
by: Ahmed, Abdulghani Ali, et al.
Published: (2020)
by: Ahmed, Abdulghani Ali, et al.
Published: (2020)
Applying Neural Network to U2R Attacks
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
by: Ooi, Hui Ni, et al.
Published: (2021)
by: Ooi, Hui Ni, et al.
Published: (2021)
Effectiveness of structured query language injection attacks detection mechanisms
by: Mohamad, Nurul Zawiyah
Published: (2008)
by: Mohamad, Nurul Zawiyah
Published: (2008)
Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning
by: Thrupthi, C.P., et al.
Published: (2024)
by: Thrupthi, C.P., et al.
Published: (2024)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Membrane inserted thermo-electrochemical generator for enhanced power generation / Syed Waqar Hasan
by: Syed Waqar , Hasan
Published: (2017)
by: Syed Waqar , Hasan
Published: (2017)
Efficient vehicle routing optimization for autistic users / Abdulrahman Hasan Mohammed Shabalah
by: Abdulrahman Hasan , Mohammed Shabalah
Published: (2020)
by: Abdulrahman Hasan , Mohammed Shabalah
Published: (2020)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
by: Mubarak, Sinil, et al.
Published: (2019)
by: Mubarak, Sinil, et al.
Published: (2019)
Distributed denial of service attack Detection in IoT networks using deep learning and feature fusion : A review
by: Nuhu Ahmad, Abdul hafiz, et al.
Published: (2024)
by: Nuhu Ahmad, Abdul hafiz, et al.
Published: (2024)
A review current routing attacks in mobile ad-hoc networks
by: Khokhar, Rasheed Hafeez, et al.
Published: (2008)
by: Khokhar, Rasheed Hafeez, et al.
Published: (2008)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
Detection of arcing fault in underground distribution cable using artificial neural network
by: Chan, Wei Kian
Published: (2004)
by: Chan, Wei Kian
Published: (2004)
Comparative study based on DOS ATTACK at network layer in wired and wireless network / Norfarina Nordin
by: Nordin, Norfarina
Published: (2020)
by: Nordin, Norfarina
Published: (2020)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
A soft computing methodology to analyze sustainable risks in surgical cotton manufacturing companies
by: Bhalaji, R. K. A., et al.
Published: (2020)
by: Bhalaji, R. K. A., et al.
Published: (2020)
Verification of quartz crystal microbalance array using vector network analyzer and openQCM
by: Zainuddin, Ahmad Anwar, et al.
Published: (2018)
by: Zainuddin, Ahmad Anwar, et al.
Published: (2018)
Soft-switching active-clamp flyback microinverter for pv applications / Rasedul Hasan
by: Rasedul, Hasan
Published: (2017)
by: Rasedul, Hasan
Published: (2017)
Analyzing the resilience of convolutional neural networks implemented on GPUs: Alexnet as a case study
by: Khalid Adam, Ismail Hammad, et al.
Published: (2021)
by: Khalid Adam, Ismail Hammad, et al.
Published: (2021)
Similar Items
-
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014) -
Honeynet as a service deployment approach in enabling virtual crime scene investigation
by: Hasheminejad, Hamidreza
Published: (2015) -
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013) -
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010) -
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)