Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Many of the present network visitors’ analysis have the capability to capture extraordinary forms of traffics. The main method is related to processing and filtering data packets using different types of packet filtering on network system and, more specifically, capturing and filtering data packe...
| Main Author: | Abdul Wahid, Mohammed N. |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/69343/ http://psasir.upm.edu.my/id/eprint/69343/7/FSKTM%202016%2012%20IR%20edit.pdf |
Similar Items
Fairness Of the TCP-based new AIMD congestion control algorithm.
by: Jasem, Hayder Natiq, et al.
Published: (2009)
by: Jasem, Hayder Natiq, et al.
Published: (2009)
A hybrid algorithm for finding shortest path in network routing.
by: Soltan Aghaei, Mohammad Reza, et al.
Published: (2009)
by: Soltan Aghaei, Mohammad Reza, et al.
Published: (2009)
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
by: Ahmad, Noor Azlan
Published: (2008)
by: Ahmad, Noor Azlan
Published: (2008)
Traffic Adaptive Schedule-Based Mac Protocol For Wireless sensor Networks
by: Vahabi, Maryam
Published: (2008)
by: Vahabi, Maryam
Published: (2008)
Mammogram breast cancer classification using Support Vector Machines (SVM) / Nur Syafiqah Sahrudin
by: Sahrudin, Nur Syafiqah
Published: (2020)
by: Sahrudin, Nur Syafiqah
Published: (2020)
Development of neural network based traffic flow predictors using pre-processed data
by: Chan, Kit Yan, et al.
Published: (2014)
by: Chan, Kit Yan, et al.
Published: (2014)
Development of a complex network-based integrated multi-layer urban growth and optimisation model for efficient urban traffic network
by: Rui, Ding
Published: (2018)
by: Rui, Ding
Published: (2018)
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
by: Lee, Soon
Published: (2011)
by: Lee, Soon
Published: (2011)
Multi-channel support for data-gathering trees in wireless sensor networks
by: Alfraihat, Wasan Ahmad Sulieman
Published: (2010)
by: Alfraihat, Wasan Ahmad Sulieman
Published: (2010)
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
by: Al-Kharasani, Ameen Mohammed Abdulkarem
Published: (2019)
by: Al-Kharasani, Ameen Mohammed Abdulkarem
Published: (2019)
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
by: Zazali, Azyyati Adiah
Published: (2024)
by: Zazali, Azyyati Adiah
Published: (2024)
Comparative Evaluation Of Three Methods For Predicting Traffic Volume
by: Zaman, Seyed Ali
Published: (2008)
by: Zaman, Seyed Ali
Published: (2008)
A new fair marker algorithm for DiffServ networks
by: Elshaikh, M.A., et al.
Published: (2008)
by: Elshaikh, M.A., et al.
Published: (2008)
Development of mobile road traffic infraction registration system
by: Rad, Habibollah Arasteh
Published: (2010)
by: Rad, Habibollah Arasteh
Published: (2010)
Adaptive dual threshold multi-class scheduling for packet switch.
by: Abdul Rahman, Abdul Aziz, et al.
Published: (2010)
by: Abdul Rahman, Abdul Aziz, et al.
Published: (2010)
A Study of Security Limitations in Virtual Local Area Network Implementation
by: Balasundaram, Arumugam
Published: (2003)
by: Balasundaram, Arumugam
Published: (2003)
The application of automated mine survey systems to mine surveying practice
by: Ketteman, Mark Robert
Published: (1985)
by: Ketteman, Mark Robert
Published: (1985)
Anomaly detection in large-scale data stream networks
by: Pham, DucSon, et al.
Published: (2014)
by: Pham, DucSon, et al.
Published: (2014)
An intelligent system to enhance traffic safety analysis
by: Gregoriades, A., et al.
Published: (2011)
by: Gregoriades, A., et al.
Published: (2011)
Anomaly-Based Detection Approach To Detect The Flash Crowd Attack During The Flash Event
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
Selection of Significant On-Road Sensor Data for Short-Term Traffic Flow Forecasting Using the Taguchi Method
by: Chan, Kit, et al.
Published: (2012)
by: Chan, Kit, et al.
Published: (2012)
An improvement algoithm for Iris classification by using Linear Support Vector Machine (LSVM), k-Nearest Neighbours (k-NN) and Random Nearest Neighbous (RNN) / Ahmad Haadzal Kamarulzalis and Mohd Asrul Affendi Abdullah
by: Kamarulzalis, Ahmad Haadzal, et al.
Published: (2019)
by: Kamarulzalis, Ahmad Haadzal, et al.
Published: (2019)
Efficient and secured compression and steganography technique in wireless sensor network
by: Tuama, Ammar Yaseen
Published: (2016)
by: Tuama, Ammar Yaseen
Published: (2016)
A comparative on performance of voip using power line and wired (UTP CAT5) / Khainorizan Khalid
by: Khalid, Khainorizan
Published: (2006)
by: Khalid, Khainorizan
Published: (2006)
Intruder Detection System (IDS) evasion / Solahuddin Yusuf Fadhlullah, Mohamad Adha Mohamad Idin and Mohd Halim Mohd Noor
by: Fadhlullah, Solahuddin Yusuf, et al.
Published: (2011)
by: Fadhlullah, Solahuddin Yusuf, et al.
Published: (2011)
Static and self-scalable filter range selection algorithms for peer-to-peer networks
by: Kweh, Yeah Lun
Published: (2011)
by: Kweh, Yeah Lun
Published: (2011)
Performance analysis of network monitoring software in wireless network / Mohd Firdaus Mohd Mahdzir
by: Mohd Mahdzir, Mohd Firdaus
Published: (2019)
by: Mohd Mahdzir, Mohd Firdaus
Published: (2019)
Identifying factors that affecting the status of road accident in Malaysia: multinomial logistic regression approach / Ainul Hasanah Na’imuddin
by: Na’imuddin, Ainul Hasanah
Published: (2015)
by: Na’imuddin, Ainul Hasanah
Published: (2015)
Optimization of neural network configurations for short-term traffic flow forecasting using orthogonal design
by: Chan, Kit Yan, et al.
Published: (2012)
by: Chan, Kit Yan, et al.
Published: (2012)
A conceptual study of connectivity elements towards successful green network / Nor Hamizah Abdul Hamid, Muhamad Ezran Zainal Abdullah and Nik Hanita Nik Mohamad
by: Nor Hamizah, Abdul Hamid, et al.
Published: (2015)
by: Nor Hamizah, Abdul Hamid, et al.
Published: (2015)
Development of river water level estimation from surveillance cameras for flood monitoring system using deep learning techniques
by: Muhadi, Nur 'Atirah
Published: (2022)
by: Muhadi, Nur 'Atirah
Published: (2022)
Distance vector-hop range-free location algorithm for wireless sensor network
by: Zazali, Azyyati Adiah
Published: (2015)
by: Zazali, Azyyati Adiah
Published: (2015)
Analysis of road accident cases in Petaling Jaya using : geographical information system [GIS] application between year 2014 and 2015 / Nik Lailawati Che Lah
by: Che Lah, Nik Lailawati
Published: (2018)
by: Che Lah, Nik Lailawati
Published: (2018)
An analysis of TCP Port 0 traffic and net BIOS SMB spam advertisement incidents within a set of honeypots / Emran Mohd Tamil and Abdul Hamid Othman
by: Mohd Tamil, Emran, et al.
Published: (2006)
by: Mohd Tamil, Emran, et al.
Published: (2006)
Speaker Identification Using Wavelet Packet Transform and Feed Forward Neural Network
by: Almashrgy, Mohamed Ali
Published: (2005)
by: Almashrgy, Mohamed Ali
Published: (2005)
Traffic flow forecasting neural networks based on exponential smoothing method
by: Chan, Kit Yan, et al.
Published: (2011)
by: Chan, Kit Yan, et al.
Published: (2011)
Investigation of spatial temporal analysis on accident based on traffic congestion pattern / Fatin Hazwani Mohd Fadzil
by: Mohd Fadzil, Fatin Hazwani
Published: (2018)
by: Mohd Fadzil, Fatin Hazwani
Published: (2018)
Identification of vessel anomaly behavior using support vector machines and Bayesian networks
by: Dwi Handayani, Dini Oktarina, et al.
Published: (2014)
by: Dwi Handayani, Dini Oktarina, et al.
Published: (2014)
Fast zerox algorithm for routing in optical multistage interconnection networks.
by: T.D. , Shahida, et al.
Published: (2010)
by: T.D. , Shahida, et al.
Published: (2010)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
Similar Items
-
Fairness Of the TCP-based new AIMD congestion control algorithm.
by: Jasem, Hayder Natiq, et al.
Published: (2009) -
A hybrid algorithm for finding shortest path in network routing.
by: Soltan Aghaei, Mohammad Reza, et al.
Published: (2009) -
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
by: Ahmad, Noor Azlan
Published: (2008) -
Traffic Adaptive Schedule-Based Mac Protocol For Wireless sensor Networks
by: Vahabi, Maryam
Published: (2008) -
Mammogram breast cancer classification using Support Vector Machines (SVM) / Nur Syafiqah Sahrudin
by: Sahrudin, Nur Syafiqah
Published: (2020)