Approach for solving active perturbation attack problem in stepping stone detection.

Batu loncatan merupakan salah satu daripada teknik menyembunyikan jejak yang digunakan oleh penceroboh untuk menyembunyikan jejaknya. Untuk lebih daripada satu dekad, para penyelidik menumpukan usaha mereka untuk mempertingkatkan pendekatan Pengesanan Batu Loncatan (PBL) untuk mengidentifikasi seca...

Full description

Bibliographic Details
Main Author: Omar, Mohd Nizam
Format: Thesis
Language:English
Published: 2011
Subjects:
Online Access:http://eprints.usm.my/43113/
http://eprints.usm.my/43113/1/Pages_from_APPROACH_FOR_SOLVING_ACTIVE_PERTURBATION.pdf
_version_ 1848879741159866368
author Omar, Mohd Nizam
author_facet Omar, Mohd Nizam
author_sort Omar, Mohd Nizam
building USM Institutional Repository
collection Online Access
description Batu loncatan merupakan salah satu daripada teknik menyembunyikan jejak yang digunakan oleh penceroboh untuk menyembunyikan jejaknya. Untuk lebih daripada satu dekad, para penyelidik menumpukan usaha mereka untuk mempertingkatkan pendekatan Pengesanan Batu Loncatan (PBL) untuk mengidentifikasi secara tepatnya hos yang dipergunakan untuk melakukan serangan batu loncatan. Tambahan pula, Serangan Penembusan Aktif (SPA) seperti lengah, jatuhan paket dan chaf mengancam pendekatan PBL. Hari ini, di antara pelbagai jenis SPA, chaf, lengah dan jatuhan paket adalah sangat penting. Stepping stone is one of the hidden tracking techniques used by an intruder to hide its tracks. For more than a decade, researchers have focused themselves in enhancing the Stepping Stone Detection (SSD) approaches in order to identify accurately a compromised host using stepping stones to attack. In addition, Active Perturbation Attacks (APA) such as delays, dropped packets and chaffs threaten the SSD approaches. Today, among the types of APAs, chaffs, delays and packet drops are very significant.
first_indexed 2025-11-15T17:52:03Z
format Thesis
id usm-43113
institution Universiti Sains Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T17:52:03Z
publishDate 2011
recordtype eprints
repository_type Digital Repository
spelling usm-431132018-12-07T08:02:39Z http://eprints.usm.my/43113/ Approach for solving active perturbation attack problem in stepping stone detection. Omar, Mohd Nizam QA75.5-76.95 Electronic computers. Computer science Batu loncatan merupakan salah satu daripada teknik menyembunyikan jejak yang digunakan oleh penceroboh untuk menyembunyikan jejaknya. Untuk lebih daripada satu dekad, para penyelidik menumpukan usaha mereka untuk mempertingkatkan pendekatan Pengesanan Batu Loncatan (PBL) untuk mengidentifikasi secara tepatnya hos yang dipergunakan untuk melakukan serangan batu loncatan. Tambahan pula, Serangan Penembusan Aktif (SPA) seperti lengah, jatuhan paket dan chaf mengancam pendekatan PBL. Hari ini, di antara pelbagai jenis SPA, chaf, lengah dan jatuhan paket adalah sangat penting. Stepping stone is one of the hidden tracking techniques used by an intruder to hide its tracks. For more than a decade, researchers have focused themselves in enhancing the Stepping Stone Detection (SSD) approaches in order to identify accurately a compromised host using stepping stones to attack. In addition, Active Perturbation Attacks (APA) such as delays, dropped packets and chaffs threaten the SSD approaches. Today, among the types of APAs, chaffs, delays and packet drops are very significant. 2011-08 Thesis NonPeerReviewed application/pdf en http://eprints.usm.my/43113/1/Pages_from_APPROACH_FOR_SOLVING_ACTIVE_PERTURBATION.pdf Omar, Mohd Nizam (2011) Approach for solving active perturbation attack problem in stepping stone detection. PhD thesis, Universiti Sains Malaysia.
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Omar, Mohd Nizam
Approach for solving active perturbation attack problem in stepping stone detection.
title Approach for solving active perturbation attack problem in stepping stone detection.
title_full Approach for solving active perturbation attack problem in stepping stone detection.
title_fullStr Approach for solving active perturbation attack problem in stepping stone detection.
title_full_unstemmed Approach for solving active perturbation attack problem in stepping stone detection.
title_short Approach for solving active perturbation attack problem in stepping stone detection.
title_sort approach for solving active perturbation attack problem in stepping stone detection.
topic QA75.5-76.95 Electronic computers. Computer science
url http://eprints.usm.my/43113/
http://eprints.usm.my/43113/1/Pages_from_APPROACH_FOR_SOLVING_ACTIVE_PERTURBATION.pdf