Detection and avoidance technique of anomalous congestion at the network gateways
Active queue management (AQM) techniques are used to maintain congestion at network routers. Random Early Detection (RED) is the most used technique among the existing AQMs, as it can avoid network congestion at the early stage. The RED technique avoids congestion by prompting users to reduce their...
| Main Author: | Ahmed, Abdulghani Ali |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/23292/ http://umpir.ump.edu.my/id/eprint/23292/1/Detection%20and%20avoidance%20technique%20of%20anomalous%20congestion%20at%20the%20network%20gateways.pdf |
Similar Items
RED-Based Technique for Detecting and Avoiding Anomaly Network Congestion
by: Montaser, Mohamed Mostafa, et al.
Published: (2018)
by: Montaser, Mohamed Mostafa, et al.
Published: (2018)
Developing Science Gateways for Drug Discovery in a Grid Environment
by: Pérez‑Sánchez, Horacio, et al.
Published: (2016)
by: Pérez‑Sánchez, Horacio, et al.
Published: (2016)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
Epilepsy detection from EEG signals using artificial neural network
by: Sallam, Amer A., et al.
Published: (2019)
by: Sallam, Amer A., et al.
Published: (2019)
Reducing network congestion by separating nets of single-row networks into layers
by: Noraziah, Ahmad, et al.
Published: (2011)
by: Noraziah, Ahmad, et al.
Published: (2011)
Back Propagation Algorithm-Based Intelligent Model for Botnet Detection
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
Evaluating oversampling techniques for network intrusion detection data
by: Chan, Jia Lin
Published: (2022)
by: Chan, Jia Lin
Published: (2022)
Epilepsy detection using EEG signals
by: Amer, Salam, et al.
Published: (2018)
by: Amer, Salam, et al.
Published: (2018)
Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic
by: Monowar, Muhammad Mostafa, et al.
Published: (2008)
by: Monowar, Muhammad Mostafa, et al.
Published: (2008)
Optimising traffic control for a congested intersectton
by: Rahmat, Riza Atiq, et al.
Published: (2002)
by: Rahmat, Riza Atiq, et al.
Published: (2002)
The Simulation on Vehicular Traffic Congestion Using Discrete Event Simulation (DES): A Case Study
by: Noor Akma, Abu Bakar, et al.
Published: (2018)
by: Noor Akma, Abu Bakar, et al.
Published: (2018)
Performance enhancement of AIMD algorithm for congestion avoidance and control
by: Jasem, Hayder Natiq
Published: (2011)
by: Jasem, Hayder Natiq
Published: (2011)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
MICIE: A model for identifying and collecting intrusion evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Locating and collecting cybercrime evidences on cloud storage: review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Fault detection using neural network
by: Dinie, Muhammad
Published: (2008)
by: Dinie, Muhammad
Published: (2008)
Attack Intention Recognition: A Review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
AIRSE : an approach for attack intention recognition based on similarity of evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Die defect detection for integrated circuit using deep learning object detection techniques
by: Wong, Tack Hwa
Published: (2023)
by: Wong, Tack Hwa
Published: (2023)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
Investigation model for locating data remnants on cloud storage
by: Khalid, Abdulrahman, et al.
Published: (2019)
by: Khalid, Abdulrahman, et al.
Published: (2019)
Real time detection of phishing websites
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
A fast learning network with improved particle swarm optimization for intrusion detection system
by: Ali, Mohammed Hasan
Published: (2019)
by: Ali, Mohammed Hasan
Published: (2019)
An analysis of ambiguity detection techniques for Software Requirements Specification (SRS)
by: Oo, Khin Hayman, et al.
Published: (2018)
by: Oo, Khin Hayman, et al.
Published: (2018)
A review : Static analysis of android malware and detection technique
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
by: Sabira, Khatun, et al.
Published: (2012)
by: Sabira, Khatun, et al.
Published: (2012)
Energy conservation strategies in named data networking based MANET using congestion control: A review
by: Farkhana, Muchtar, et al.
Published: (2020)
by: Farkhana, Muchtar, et al.
Published: (2020)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
An intermediate significant bit (ISB) watermarking technique using neural networks
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Design a Technique for Minimizing Unnecessary Handoff
in Mobile Wireless Networks
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
Anomaly Detection in Time Series Data Using Spiking Neural Network
by: Bariah, Yusob, et al.
Published: (2018)
by: Bariah, Yusob, et al.
Published: (2018)
Similar Items
-
RED-Based Technique for Detecting and Avoiding Anomaly Network Congestion
by: Montaser, Mohamed Mostafa, et al.
Published: (2018) -
Developing Science Gateways for Drug Discovery in a Grid Environment
by: Pérez‑Sánchez, Horacio, et al.
Published: (2016) -
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)