AIRSE : an approach for attack intention recognition based on similarity of evidences
Sensitive information can be exposed to critical risks when communicated through computer networks. The ability of attackers in hiding their attacks' intention obstructs existing protection systems to early prevent their attacks and avoid any possible sabotage in network systems. In this paper,...
| Main Authors: | Ahmed, Abdulghani Ali, Noorul Ahlami, Kamarul Zaman |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
EAI
2017
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/27010/ http://umpir.ump.edu.my/id/eprint/27010/1/AIRSE%20-%20an%20approach%20for%20attack%20intention%20recognition%20based.pdf http://umpir.ump.edu.my/id/eprint/27010/7/AIRSE%20an%20approach%20for%20attack%20intention%20recognition%20based%20on%20similarity%20of%20evidences.pdf |
Similar Items
Attack Intention Recognition: A Review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Recognition based authentication method to prevent reconstruction attack
by: Koay, Chong Jen
Published: (2018)
by: Koay, Chong Jen
Published: (2018)
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024)
by: Baraka, Abdulrahman M. A.
Published: (2024)
MICIE: A model for identifying and collecting intrusion evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Locating and collecting cybercrime evidences on cloud storage: review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Comparison semantic similarity approach using biomedical domain dataset
by: Kasim, Shahreen, et al.
Published: (2017)
by: Kasim, Shahreen, et al.
Published: (2017)
Efficient Stock Control Management System
by: Noorul Ahlami, Kamarul Zaman
Published: (2013)
by: Noorul Ahlami, Kamarul Zaman
Published: (2013)
Shape feature representation in similarity measurement for content-based image retrieval
by: Chiew, Kang Leng
Published: (2003)
by: Chiew, Kang Leng
Published: (2003)
Back Propagation Algorithm-Based Intelligent Model for Botnet Detection
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
Collaborative Filtering Similarity Measures: Revisiting
by: Al-Bashiri, Hael, et al.
Published: (2017)
by: Al-Bashiri, Hael, et al.
Published: (2017)
Detection and avoidance technique of anomalous congestion at the network gateways
by: Ahmed, Abdulghani Ali
Published: (2018)
by: Ahmed, Abdulghani Ali
Published: (2018)
Data-Driven Similarity Measures for Matrimonial Application
by: Chia, Yong Fang
Published: (2020)
by: Chia, Yong Fang
Published: (2020)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Evaluating keyphrase extraction algorithms for finding similar news articles using lexical similarity calculation and semantic relatedness measurement by word embedding
by: Sarwar, Talha, et al.
Published: (2022)
by: Sarwar, Talha, et al.
Published: (2022)
Intelligent Mobile Maid Matching Using Similarity Search
by: Ong, Shu Xian
Published: (2020)
by: Ong, Shu Xian
Published: (2020)
Analysis of web worm attack on web application
by: Mohd. Ghazzali, Amalina
Published: (2008)
by: Mohd. Ghazzali, Amalina
Published: (2008)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
RED-Based Technique for Detecting and Avoiding Anomaly Network Congestion
by: Montaser, Mohamed Mostafa, et al.
Published: (2018)
by: Montaser, Mohamed Mostafa, et al.
Published: (2018)
Spatial query retrieval model by single measure similarity (SMSS)
by: Lau, Bee Theng
Published: (2006)
by: Lau, Bee Theng
Published: (2006)
Test cases reduction using similarity relation and conditional entropy
by: Md Nasir, Noor Fardzilawati
Published: (2017)
by: Md Nasir, Noor Fardzilawati
Published: (2017)
Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)
by: Lim, Kong Hua
Published: (2011)
The Design Trends of Keystream Generator for Stream Cipher for High Immunity Attacks
by: Mostafa, Saifuldun, et al.
Published: (2016)
by: Mostafa, Saifuldun, et al.
Published: (2016)
A proposed method for the semantic Similarity use WordNet to handle the ambiguity in Social Media text
by: Ali Muttaleb, Hasan, et al.
Published: (2019)
by: Ali Muttaleb, Hasan, et al.
Published: (2019)
Component Based Object Recognition System
by: Yan, Sze Hon
Published: (2007)
by: Yan, Sze Hon
Published: (2007)
A sequential handwriting recognition model based on a dynamically configurable CRNN
by: Al-Saffar, Ahmed, et al.
Published: (2021)
by: Al-Saffar, Ahmed, et al.
Published: (2021)
An enhanced model to increase awareness on phishing attacks for vocational students
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Investment decisions based on EEG emotion recognition
by: Mat Razi, Nurul Izzati, et al.
Published: (2017)
by: Mat Razi, Nurul Izzati, et al.
Published: (2017)
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
Comparison of document similarity algorithms in extracting document keywords from an academic paper
by: Miah, M. Saef Ullah, et al.
Published: (2021)
by: Miah, M. Saef Ullah, et al.
Published: (2021)
Slicing-based enhanced method for privacy-preserving in publishing big data
by: BinJubeir, Mohammed Ma., et al.
Published: (2022)
by: BinJubeir, Mohammed Ma., et al.
Published: (2022)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
Similar Items
-
Attack Intention Recognition: A Review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017) -
SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network
by: Ahmed, Abdulghani Ali, et al.
Published: (2018) -
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
Recognition based authentication method to prevent reconstruction attack
by: Koay, Chong Jen
Published: (2018)