Applying packet generator for secure network environment
Problem statement: Viruses and hacker attacks typically generate a recognizable pattern or "signature" of packets. Most of Network Traffic Analyzer can identify these packets and alert the administrator to their presence on the network via email or page. Approach: Most traffics analyzers l...
| Main Authors: | Abdul Wahid, Mohammed N., Ahmad Zulkarnain, Zuriati |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publications
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/22496/ http://psasir.upm.edu.my/id/eprint/22496/1/Applying%20packet%20generator%20for%20secure%20network%20environment.pdf |
Similar Items
Quantum packet for the next generation network/ISDN3
by: Lam, R., et al.
Published: (2008)
by: Lam, R., et al.
Published: (2008)
Network monitor with packet siffer
by: Mujahid, Jamaluddin
Published: (2010)
by: Mujahid, Jamaluddin
Published: (2010)
Performance comparisons of AODV, secure AODV and adaptive secure AODV routing protocols in free attack simulation environment.
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2009)
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2009)
Packet loss and packet delivery evaluation using network simulator for multicast enabled network nobility management
by: Mohd Aman, Hazana Afizah, et al.
Published: (2017)
by: Mohd Aman, Hazana Afizah, et al.
Published: (2017)
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
by: Abdul Wahid, Mohammed N.
Published: (2016)
by: Abdul Wahid, Mohammed N.
Published: (2016)
Analysis on the cause of packet loss in wireless networks.
by: Teh, Terry
Published: (2022)
by: Teh, Terry
Published: (2022)
Packet based echo cancellation for VoIP networks
by: Abdul Rashid, Hairul Azhar
Published: (2007)
by: Abdul Rashid, Hairul Azhar
Published: (2007)
Impact of packet size in adaptive cognitive radio sensor network
by: Al-Medhwahi, Mohammed Ahmed Ali, et al.
Published: (2018)
by: Al-Medhwahi, Mohammed Ahmed Ali, et al.
Published: (2018)
Increase throughput of CCM security mode using MKP
by: Ahmad Zulkarnain, Zuriati
Published: (2014)
by: Ahmad Zulkarnain, Zuriati
Published: (2014)
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
by: Waqar, Ali, et al.
Published: (2015)
by: Waqar, Ali, et al.
Published: (2015)
Attacks, vulnerabilities and security requirements in smart metering networks
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Layered Video Distribution Over Integrated Services Packet Network
by: Yew , Chang Ching
Published: (2001)
by: Yew , Chang Ching
Published: (2001)
Design And Performance Analysis Of A WDM Packet Switching Network
by: Mellah, Hakim
Published: (2008)
by: Mellah, Hakim
Published: (2008)
Adaptive routing in packet-switched networks using agents updating methods
by: Saleh, Mohammad, et al.
Published: (2003)
by: Saleh, Mohammad, et al.
Published: (2003)
Software Based Scalable Packet
Capture Mechanism To Reduce
Packet Loss
by: Alias, Syazwina
Published: (2019)
by: Alias, Syazwina
Published: (2019)
Analysis of packet reordering delay for bandwidth aggregation in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Software-based packet classification in network intrusion detection system using network processor
by: Salim, , Robin, et al.
Published: (2006)
by: Salim, , Robin, et al.
Published: (2006)
A numerical model to analyze handoff delay and packet loss in PNEMO environment
by: Islam, Shayla, et al.
Published: (2018)
by: Islam, Shayla, et al.
Published: (2018)
Corporate Social Responsibility for Packet One Networks: Study, Analysis and Framework
by: Karthikeyan Selvakumari, Dhinesh Raj
Published: (2008)
by: Karthikeyan Selvakumari, Dhinesh Raj
Published: (2008)
On Uplink and Downlink Packet Scheduling in Full-Duplex Wireless Mesh Networks
by: Wang, H., et al.
Published: (2015)
by: Wang, H., et al.
Published: (2015)
An efficient innovative method to decrease routing table size in packet switched networks
by: Baygi, Maassoumeh Javadi, et al.
Published: (2013)
by: Baygi, Maassoumeh Javadi, et al.
Published: (2013)
Personalized social networking: An applied scenario in a portable personality environment
by: Reymann, S., et al.
Published: (2008)
by: Reymann, S., et al.
Published: (2008)
Buffering management schemes for optical variable length packets under limited packet sorting
by: Tan, Choo Peng, et al.
Published: (2006)
by: Tan, Choo Peng, et al.
Published: (2006)
The VANET-Solution Approach for Data Packet Forwarding Improvement
by: Hammood, Omar A., et al.
Published: (2018)
by: Hammood, Omar A., et al.
Published: (2018)
Security threats of finger print biometric in network system environment
by: Taha, Imad, et al.
Published: (2011)
by: Taha, Imad, et al.
Published: (2011)
Evaluating signalling and packet delivery cost for NDN producer’s mobility in smart & sustainable environment
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2020)
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2020)
Meal packets to aid needy
by: The Star
Published: (2019)
by: The Star
Published: (2019)
Enhanced performance of IPv6 packet transmission over VoIP network
by: A.M., Said, et al.
Published: (2009)
by: A.M., Said, et al.
Published: (2009)
Finite Difference Approach on RBF Networks for On-line System Identification with Lost Packet
by: NAC, Andryani, et al.
Published: (2009)
by: NAC, Andryani, et al.
Published: (2009)
Performance comparison of packet transmission over IPv6 network on different platforms
by: Mohamed, S.S., et al.
Published: (2006)
by: Mohamed, S.S., et al.
Published: (2006)
An investigation of scheduling and packet reordering algorithms for bandwidth aggregation in heterogeneous wireless networks
by: Latif, Suhaimi A, et al.
Published: (2013)
by: Latif, Suhaimi A, et al.
Published: (2013)
Speaker Identification Using Wavelet Packet Transform and Feed Forward Neural Network
by: Almashrgy, Mohamed Ali
Published: (2005)
by: Almashrgy, Mohamed Ali
Published: (2005)
Ant-based contention resolution in slotted WDM optical packet switched networks
by: Tan, Saw Chin, et al.
Published: (2006)
by: Tan, Saw Chin, et al.
Published: (2006)
FuGeF: a resource bound secure forwarding protocol for wireless sensor networks
by: Umar, Idris Abubakar, et al.
Published: (2016)
by: Umar, Idris Abubakar, et al.
Published: (2016)
Packet contention resolution in slotted optical packet switch using ant-colony based algorithm
by: Tan, Shing Chiang, et al.
Published: (2007)
by: Tan, Shing Chiang, et al.
Published: (2007)
Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2011)
by: Malekzadeh, Mina, et al.
Published: (2011)
Novel packet scheduling algorithm based on cross component carrier in LTE-advanced network with carrier aggregation
by: Al-Shibly, Mohammed A. M., et al.
Published: (2014)
by: Al-Shibly, Mohammed A. M., et al.
Published: (2014)
Similar Items
-
Quantum packet for the next generation network/ISDN3
by: Lam, R., et al.
Published: (2008) -
Network monitor with packet siffer
by: Mujahid, Jamaluddin
Published: (2010) -
Performance comparisons of AODV, secure AODV and adaptive secure AODV routing protocols in free attack simulation environment.
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2009) -
Packet loss and packet delivery evaluation using network simulator for multicast enabled network nobility management
by: Mohd Aman, Hazana Afizah, et al.
Published: (2017) -
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
by: Abdul Wahid, Mohammed N.
Published: (2016)