ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
Pertumbuhan pesat Internet dalam beberapa tahun kebelakangan ini telah mendedahkan had ruang alamat dalam protokol Internet semasa (IP), iaitu, IPv4. Permintaan yang semakin meningkat dalam penggunaan alamat IP telah mengakibatkan kehabisan alamat IPv4 seperti yang dijangkakan. Untuk menangani k...
| Main Author: | Mohammed Ahmed Saad, Redhwan |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/31820/ http://eprints.usm.my/31820/1/REDHWAN_MOHAMMED_AHMED_SAAD_24%28NN%29.pdf |
Similar Items
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Synchronization Controller To Solve
The Mismatched Sampling Rates For
Acoustic Echo Cancellation
by: Naeem, Adel Nadhem
Published: (2015)
by: Naeem, Adel Nadhem
Published: (2015)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Packet based echo cancellation for VoIP networks
by: Abdul Rashid, Hairul Azhar
Published: (2007)
by: Abdul Rashid, Hairul Azhar
Published: (2007)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
Ipv6 Migration Framework For Government Agencies In
Malaysia
by: Mohinder Singh, A Winder Kaur
Published: (2009)
by: Mohinder Singh, A Winder Kaur
Published: (2009)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Effects of Communication Range, Noise and Help Request Signal on Particle Swarm Optimization with Area Extension (AEPSO)
by: Atyabi, Adham, et al.
Published: (2007)
by: Atyabi, Adham, et al.
Published: (2007)
An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
by: Wan Ali, Wan Nor Ashiqin
Published: (2015)
by: Wan Ali, Wan Nor Ashiqin
Published: (2015)
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
An optimized framework for header suppression of real time IPV6 traffic in multiprotocol label switching (MPLS) networks.
by: Mohammed, Imad Jasim
Published: (2011)
by: Mohammed, Imad Jasim
Published: (2011)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009)
by: Budiarto, Rahmat
Published: (2009)
CCS501 – NEURAL NETWORKS AND GENETIC ALGORITHMS
CSC513 – ARTIFICIAL NEURAL NETWORKS - SEPT. 2001
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
Multi-fish Detection And Tracking Using Track-mask Region
Convolutional Neural Network
by: Alshdaifat, Nawaf Farhan Fankur
Published: (2023)
by: Alshdaifat, Nawaf Farhan Fankur
Published: (2023)
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008)
by: TING, G, et al.
Published: (2008)
CCS501 – RANGKAIAN NEURAL DAN ALGORITMA GENETIK
CSC513 – RANGKAIAN NEURAL BUATAN - SEPT. 2001
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
Stock Trend Prediction With Neural Network Techniques
by: Mohd Haris Lye Abdullah,
Published: (2003)
by: Mohd Haris Lye Abdullah,
Published: (2003)
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
by: Ling, Huo-Chong, et al.
Published: (2007)
by: Ling, Huo-Chong, et al.
Published: (2007)
Robust routing table design for IPv6 lookup
by: Yong, S. M., et al.
Published: (2005)
by: Yong, S. M., et al.
Published: (2005)
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Layered Botnet Detection Framework Based On Signal
Processing And Discrete Time Analysis
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
Dynamic tunneling based regularization in feedforward neural networks
by: Singh, Y.P., et al.
Published: (2001)
by: Singh, Y.P., et al.
Published: (2001)
Pengelasan Tahap Kesukaran Soalan Menggunakan Rangkaian Neural,
by: Sulaiman, Sarina, et al.
Published: (2007)
by: Sulaiman, Sarina, et al.
Published: (2007)
CSC513 – ARTIFICIAL NEURAL NETWORKS - OKT. 2000
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2000)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2000)
CSC513- ARTIFICIAL NEURAL NETWOKS SEP 99.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
Rule Learning and Extraction Using a Hybrid Neural Network: A Case Study on Fault Detection and Diagnosis
by: Tan, Shing Chiang, et al.
Published: (2005)
by: Tan, Shing Chiang, et al.
Published: (2005)
QoS Mechanism With Probability For IPv6-Based IPTV Network.
by: H.S, Primantara, et al.
Published: (2009)
by: H.S, Primantara, et al.
Published: (2009)
Similar Items
-
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018) -
Synchronization Controller To Solve
The Mismatched Sampling Rates For
Acoustic Echo Cancellation
by: Naeem, Adel Nadhem
Published: (2015) -
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020) -
Packet based echo cancellation for VoIP networks
by: Abdul Rashid, Hairul Azhar
Published: (2007) -
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)