Signature-Based & Anomaly-Based Network & Intrusion Detection System (SBNIDS & ABNIDS)
The poster was submitted as part of the UNIMAS R&D Expo 2015. The project won Bronze Medal from the Expo for the ICT Cluster category.
| Main Authors: | Rene, Chiadighikaobi Ikenna, Johari, Abdullah |
|---|---|
| Format: | Magazine and Newsletter |
| Language: | English |
| Published: |
Faculty of Computer Science and Information Technology
2015
|
| Subjects: | |
| Online Access: | http://ir.unimas.my/id/eprint/8001/ http://ir.unimas.my/id/eprint/8001/1/Signature-Based%20%20%26%20Anomaly-Based%20Network%20%20and%20Intrusion%20Detection%20System%20%28SBNIDS%20%26%20ABNIDS%29.pdf |
Similar Items
Anomaly Detection Framework for PingER Data
by: Danny Wilson, Mandai, et al.
Published: (2015)
by: Danny Wilson, Mandai, et al.
Published: (2015)
Anomalous event detection for pinger data
by: Batumalai, Kayathiri, et al.
Published: (2015)
by: Batumalai, Kayathiri, et al.
Published: (2015)
Fast Auto Black Box Analysis With Infection Vector
Identification
by: Chanderan, Navien, et al.
Published: (2015)
by: Chanderan, Navien, et al.
Published: (2015)
UNIMAS E-Balik Management System
by: Sivavikkraman, Puvanamala, et al.
Published: (2015)
by: Sivavikkraman, Puvanamala, et al.
Published: (2015)
Mobile Web Application for Grocery Budget Planning
by: Qurratul-Ain, Abdullah, et al.
Published: (2015)
by: Qurratul-Ain, Abdullah, et al.
Published: (2015)
UNIMAS Bus Schedule and Tracking Information System
by: Shamugam, Shankara Viknesh, et al.
Published: (2015)
by: Shamugam, Shankara Viknesh, et al.
Published: (2015)
SCS-ESP: Self-Value Excellence Programme on 26th-28th August 2016 at Damai Beach Resort Kuching
by: Amalia, Madihie
Published: (2016)
by: Amalia, Madihie
Published: (2016)
Konvensyen KIK IPTA ke-10, 10 April 2014
by: Universiti Malaysia Sarawak, UNIMAS GLOBAL
Published: (2014)
by: Universiti Malaysia Sarawak, UNIMAS GLOBAL
Published: (2014)
Balanced Scorecard approach for benchmarking Rural ICT Projects
by: K.M., Nazri, et al.
Published: (2013)
by: K.M., Nazri, et al.
Published: (2013)
Mount Santubong incident source of inspiration for creative team
by: The Star, Sarawak
Published: (2012)
by: The Star, Sarawak
Published: (2012)
Damper to new inventions
by: The Star, Sarawak
Published: (2012)
by: The Star, Sarawak
Published: (2012)
ToT Programme: Self-Value Excellence Programme by the Sarawak Chief's Minister Office
by: Amalia, Madihie
Published: (2016)
by: Amalia, Madihie
Published: (2016)
Varsity bags 11 gold medals, five special awards at BIS
by: The Star, Sarawak
Published: (2012)
by: The Star, Sarawak
Published: (2012)
UNIMAS menang 16 anugerah reka cipta, 7 November 2012
by: Utusan, Malaysia
Published: (2012)
by: Utusan, Malaysia
Published: (2012)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
by: Chiadighikaobi, Ikenna Rene
Published: (2024)
by: Chiadighikaobi, Ikenna Rene
Published: (2024)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
An overview of neural networks use in anomaly intrusion detection systems
by: Sani, Yusuf, et al.
Published: (2009)
by: Sani, Yusuf, et al.
Published: (2009)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
by: Udzir, Nur Izura, et al.
Published: (2019)
by: Udzir, Nur Izura, et al.
Published: (2019)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Study On Signature-Based Network Intrusion Detection System For High-Speed Network Using Network Processing Unit (NPU)
by: Salim, Robin
Published: (2007)
by: Salim, Robin
Published: (2007)
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
by: Sarvari, Samira, et al.
Published: (2020)
by: Sarvari, Samira, et al.
Published: (2020)
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
by: Zulaiha Ali Othman,, et al.
Published: (2011)
by: Zulaiha Ali Othman,, et al.
Published: (2011)
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
by: Sarvari, Samira, et al.
Published: (2020)
by: Sarvari, Samira, et al.
Published: (2020)
Building a Community-based Homestay Project - A Case Study of a Small Scale Tourism Development in Long Lamai Village
by: Phoa, J.
Published: (2011)
by: Phoa, J.
Published: (2011)
Land Based Transport System: Related Issues and Intprovement Strategies
by: Wan Hashim, Wan Ibrahim
Published: (2009)
by: Wan Hashim, Wan Ibrahim
Published: (2009)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Agreement for representation is made this 7th day of September 2004 between Universiti Malaysia and Zen Hexa Network Sdn Bhd.
by: Universiti Malaysia Sarawak, Centre for Technology Transfer and Consultacy (CTTC)
Published: (2004)
by: Universiti Malaysia Sarawak, Centre for Technology Transfer and Consultacy (CTTC)
Published: (2004)
CSK301 - SISTEM PANGKALAN DATA - OKT-NOVEMBER 1991.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1991)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1991)
CSK301 - SISTEM PANGKALAN DATA - OKT-NOVEMBER 1991.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1991)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1991)
CSK301 - SISTEM PANGKALAN DATA - OKTOBER 1988.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1988)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1988)
CAM101/CMM101 - Organisasi & Reka Bentuk Pangkalan Data Februari 1999
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
Classification Of Microarray Datasets Using
Random Forest
by: Ng, Ee Ling
Published: (2009)
by: Ng, Ee Ling
Published: (2009)
Similar Items
-
Anomaly Detection Framework for PingER Data
by: Danny Wilson, Mandai, et al.
Published: (2015) -
Anomalous event detection for pinger data
by: Batumalai, Kayathiri, et al.
Published: (2015) -
Fast Auto Black Box Analysis With Infection Vector
Identification
by: Chanderan, Navien, et al.
Published: (2015) -
UNIMAS E-Balik Management System
by: Sivavikkraman, Puvanamala, et al.
Published: (2015) -
Mobile Web Application for Grocery Budget Planning
by: Qurratul-Ain, Abdullah, et al.
Published: (2015)