Applying packet generator for secure network environment
Problem statement: Viruses and hacker attacks typically generate a recognizable pattern or "signature" of packets. Most of Network Traffic Analyzer can identify these packets and alert the administrator to their presence on the network via email or page. Approach: Most traffics analyzers l...
| Main Authors: | Abdul Wahid, Mohammed N., Ahmad Zulkarnain, Zuriati |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publications
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/22496/ http://psasir.upm.edu.my/id/eprint/22496/1/Applying%20packet%20generator%20for%20secure%20network%20environment.pdf |
Similar Items
Quantum packet for the next generation network/ISDN3
by: Lam, R., et al.
Published: (2008)
by: Lam, R., et al.
Published: (2008)
Performance comparisons of AODV, secure AODV and adaptive secure AODV routing protocols in free attack simulation environment.
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2009)
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2009)
Network monitor with packet siffer
by: Mujahid, Jamaluddin
Published: (2010)
by: Mujahid, Jamaluddin
Published: (2010)
Packet loss and packet delivery evaluation using network simulator for multicast enabled network nobility management
by: Mohd Aman, Hazana Afizah, et al.
Published: (2017)
by: Mohd Aman, Hazana Afizah, et al.
Published: (2017)
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
by: Abdul Wahid, Mohammed N.
Published: (2016)
by: Abdul Wahid, Mohammed N.
Published: (2016)
Analysis on the cause of packet loss in wireless networks.
by: Teh, Terry
Published: (2022)
by: Teh, Terry
Published: (2022)
Packet based echo cancellation for VoIP networks
by: Abdul Rashid, Hairul Azhar
Published: (2007)
by: Abdul Rashid, Hairul Azhar
Published: (2007)
Increase throughput of CCM security mode using MKP
by: Ahmad Zulkarnain, Zuriati
Published: (2014)
by: Ahmad Zulkarnain, Zuriati
Published: (2014)
Impact of packet size in adaptive cognitive radio sensor network
by: Al-Medhwahi, Mohammed Ahmed Ali, et al.
Published: (2018)
by: Al-Medhwahi, Mohammed Ahmed Ali, et al.
Published: (2018)
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
by: Waqar, Ali, et al.
Published: (2015)
by: Waqar, Ali, et al.
Published: (2015)
Attacks, vulnerabilities and security requirements in smart metering networks
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Layered Video Distribution Over Integrated Services Packet Network
by: Yew , Chang Ching
Published: (2001)
by: Yew , Chang Ching
Published: (2001)
Design And Performance Analysis Of A WDM Packet Switching Network
by: Mellah, Hakim
Published: (2008)
by: Mellah, Hakim
Published: (2008)
Adaptive routing in packet-switched networks using agents updating methods
by: Saleh, Mohammad, et al.
Published: (2003)
by: Saleh, Mohammad, et al.
Published: (2003)
Software Based Scalable Packet
Capture Mechanism To Reduce
Packet Loss
by: Alias, Syazwina
Published: (2019)
by: Alias, Syazwina
Published: (2019)
Analysis of packet reordering delay for bandwidth aggregation in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Software-based packet classification in network intrusion detection system using network processor
by: Salim, , Robin, et al.
Published: (2006)
by: Salim, , Robin, et al.
Published: (2006)
A numerical model to analyze handoff delay and packet loss in PNEMO environment
by: Islam, Shayla, et al.
Published: (2018)
by: Islam, Shayla, et al.
Published: (2018)
Corporate Social Responsibility for Packet One Networks: Study, Analysis and Framework
by: Karthikeyan Selvakumari, Dhinesh Raj
Published: (2008)
by: Karthikeyan Selvakumari, Dhinesh Raj
Published: (2008)
On Uplink and Downlink Packet Scheduling in Full-Duplex Wireless Mesh Networks
by: Wang, H., et al.
Published: (2015)
by: Wang, H., et al.
Published: (2015)
An efficient innovative method to decrease routing table size in packet switched networks
by: Baygi, Maassoumeh Javadi, et al.
Published: (2013)
by: Baygi, Maassoumeh Javadi, et al.
Published: (2013)
Personalized social networking: An applied scenario in a portable personality environment
by: Reymann, S., et al.
Published: (2008)
by: Reymann, S., et al.
Published: (2008)
The VANET-Solution Approach for Data Packet Forwarding Improvement
by: Hammood, Omar A., et al.
Published: (2018)
by: Hammood, Omar A., et al.
Published: (2018)
Buffering management schemes for optical variable length packets under limited packet sorting
by: Tan, Choo Peng, et al.
Published: (2006)
by: Tan, Choo Peng, et al.
Published: (2006)
Security threats of finger print biometric in network system environment
by: Taha, Imad, et al.
Published: (2011)
by: Taha, Imad, et al.
Published: (2011)
Evaluating signalling and packet delivery cost for NDN producer’s mobility in smart & sustainable environment
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2020)
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2020)
Meal packets to aid needy
by: The Star
Published: (2019)
by: The Star
Published: (2019)
FuGeF: a resource bound secure forwarding protocol for wireless sensor networks
by: Umar, Idris Abubakar, et al.
Published: (2016)
by: Umar, Idris Abubakar, et al.
Published: (2016)
Enhanced performance of IPv6 packet transmission over VoIP network
by: A.M., Said, et al.
Published: (2009)
by: A.M., Said, et al.
Published: (2009)
Finite Difference Approach on RBF Networks for On-line System Identification with Lost Packet
by: NAC, Andryani, et al.
Published: (2009)
by: NAC, Andryani, et al.
Published: (2009)
Performance comparison of packet transmission over IPv6 network on different platforms
by: Mohamed, S.S., et al.
Published: (2006)
by: Mohamed, S.S., et al.
Published: (2006)
An investigation of scheduling and packet reordering algorithms for bandwidth aggregation in heterogeneous wireless networks
by: Latif, Suhaimi A, et al.
Published: (2013)
by: Latif, Suhaimi A, et al.
Published: (2013)
Speaker Identification Using Wavelet Packet Transform and Feed Forward Neural Network
by: Almashrgy, Mohamed Ali
Published: (2005)
by: Almashrgy, Mohamed Ali
Published: (2005)
Ant-based contention resolution in slotted WDM optical packet switched networks
by: Tan, Saw Chin, et al.
Published: (2006)
by: Tan, Saw Chin, et al.
Published: (2006)
Packet contention resolution in slotted optical packet switch using ant-colony based algorithm
by: Tan, Shing Chiang, et al.
Published: (2007)
by: Tan, Shing Chiang, et al.
Published: (2007)
Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2011)
by: Malekzadeh, Mina, et al.
Published: (2011)
Novel packet scheduling algorithm based on cross component carrier in LTE-advanced network with carrier aggregation
by: Al-Shibly, Mohammed A. M., et al.
Published: (2014)
by: Al-Shibly, Mohammed A. M., et al.
Published: (2014)
Vehicular ad hoc networks and security issues: survey
by: Abdulkader, Zaid A., et al.
Published: (2017)
by: Abdulkader, Zaid A., et al.
Published: (2017)
Highly Efficient Multi-Gigabit Commandstatus Packet Tunneling Technique In Inter-Fpga Packet Streaming Architecture
by: Loh, Mui Soon
Published: (2016)
by: Loh, Mui Soon
Published: (2016)
Similar Items
-
Quantum packet for the next generation network/ISDN3
by: Lam, R., et al.
Published: (2008) -
Performance comparisons of AODV, secure AODV and adaptive secure AODV routing protocols in free attack simulation environment.
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2009) -
Network monitor with packet siffer
by: Mujahid, Jamaluddin
Published: (2010) -
Packet loss and packet delivery evaluation using network simulator for multicast enabled network nobility management
by: Mohd Aman, Hazana Afizah, et al.
Published: (2017) -
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
by: Abdul Wahid, Mohammed N.
Published: (2016)