An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Demand for cyberspace-enabled services has expanded dramatically in recent years, in lockstep with the global Internet user population expansion. This rising demand for these services has increased the number of cyber threats launched by attackers, as well as the diversity and sophistication of the...
| Main Author: | Al Ogaili, Riyadh Rahef Nuiaa |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/61328/ http://eprints.usm.my/61328/1/24%20Pages%20from%20RIYADH%20RAHEF%20NUIAA%20AL%20OGAILI.pdf |
Similar Items
Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
by: Hasan, Dana, et al.
Published: (2017)
by: Hasan, Dana, et al.
Published: (2017)
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
Distributed defense scheme for managing DNS reflection attack in network communication systems
by: Ahmed, Dana Hasan, et al.
Published: (2016)
by: Ahmed, Dana Hasan, et al.
Published: (2016)
Protecting DNS from reflection amplification attacks using distributed defense scheme
by: Ahmed, Dana Hasan
Published: (2017)
by: Ahmed, Dana Hasan
Published: (2017)
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
Skin Colour Detection Based On An Adaptive Multi-Thresholding Technique
by: Mharib, Ahmed M.
Published: (2007)
by: Mharib, Ahmed M.
Published: (2007)
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Behavioral analysis and visualization of Fast-Flux DNS
by: A. Kadir, Andi Fitria, et al.
Published: (2012)
by: A. Kadir, Andi Fitria, et al.
Published: (2012)
Passive Rule-Based Approach To Detect Sinkhole Attack In 6lowpan Rpl Based Internet Of Things Networks
by: Subh, Al Sarawi Shadi Mustafa
Published: (2024)
by: Subh, Al Sarawi Shadi Mustafa
Published: (2024)
Direct numerical simulation (DNS) and large eddy simulation (LES)
by: Hoda, Asif
Published: (2011)
by: Hoda, Asif
Published: (2011)
An Improved Secure Router Discovery Mechanism To Prevent Fake Ra Attack In Link Local Ipv6 Network
by: C. Arjuman, Navaneethan
Published: (2021)
by: C. Arjuman, Navaneethan
Published: (2021)
Efficient DNS based Load Balancing for Bursty Web Application Traffic
by: Chin, Mei Lu, et al.
Published: (2012)
by: Chin, Mei Lu, et al.
Published: (2012)
Effects Of Pineapple Consumptions On Sensory Perceptions, Somatosensation And Taste Threshold
by: Romli, Siti Rashima
Published: (2023)
by: Romli, Siti Rashima
Published: (2023)
A site selection method of DNS using the particle swarm optimization algorithm
by: Liao, Y., et al.
Published: (2017)
by: Liao, Y., et al.
Published: (2017)
Secure-Rpl: Approach To Prevent Resource-Based Attacks In Wireless Sensor Networks Using Balanced Clustering
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Defect detection in thermal image using thresholding technique
by: Heriansyah, Rudi, et al.
Published: (2007)
by: Heriansyah, Rudi, et al.
Published: (2007)
An accuracy of attack detection using attack recognition technique in multi-factor authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
An improved image compression technique using large adaptive DCT psychovisual thresholds
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
Detection of cracked digitized paintings and manuscripts
based on threshold techniques
by: abdulwahab, Nawafil, et al.
Published: (2019)
by: abdulwahab, Nawafil, et al.
Published: (2019)
Statistical voice activity detection using low-variance spectrum estimation and an adaptive threshold
by: Davis, A., et al.
Published: (2006)
by: Davis, A., et al.
Published: (2006)
Effectiveness of structured query language injection attacks detection mechanisms
by: Mohamad, Nurul Zawiyah
Published: (2008)
by: Mohamad, Nurul Zawiyah
Published: (2008)
Image enhancement background for high damage Malay manuscripts using adaptive threshold binarization
by: Yahya, Sitti Rachmawati, et al.
Published: (2018)
by: Yahya, Sitti Rachmawati, et al.
Published: (2018)
Evaluation of metal artefact reduction using dual-step adaptive thresholding technique in computed tomography
by: Hassan, Mohd Norsyafi
Published: (2018)
by: Hassan, Mohd Norsyafi
Published: (2018)
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
by: Hameed, Husamuldeen Khalid, et al.
Published: (2020)
by: Hameed, Husamuldeen Khalid, et al.
Published: (2020)
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
by: Hameed, Husamuldeen Khalid, et al.
Published: (2020)
by: Hameed, Husamuldeen Khalid, et al.
Published: (2020)
The rise of ransomware: a review of attacks, detection techniques, and future challenges
by: Kamil, Samar, et al.
Published: (2022)
by: Kamil, Samar, et al.
Published: (2022)
Data mining techniques for effective detection of distributed denial-of-service attacks
by: Lee, Yuen Hui
Published: (2024)
by: Lee, Yuen Hui
Published: (2024)
A comprehensive study of distributed denial of service attack with the detection techniques
by: Ibrahim, Husam Hamid
Published: (2018)
by: Ibrahim, Husam Hamid
Published: (2018)
A comprehensive study of distributed denial of service attack with the detection techniques
by: Ibrahim, Husam Hamid
Published: (2018)
by: Ibrahim, Husam Hamid
Published: (2018)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
An adaptive large DCT psychovisual threshold in image compression
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
The Use Of Hybrid Technique: Thresholding And Edge Detection For Identifying River From Aerial Photo
by: Mohd Rahim, Mohd Shafry, et al.
Published: (2004)
by: Mohd Rahim, Mohd Shafry, et al.
Published: (2004)
Application of Contrast Enhancement Bilateral Closing Tophat Otsu Thresholding Technique on Crack Images
by: K. S., Sim, et al.
Published: (2008)
by: K. S., Sim, et al.
Published: (2008)
Regional contrast enhancement and four-directional thresholding techniques for pulmonary nodule extraction and discrimination
by: Heidari, Saleheh
Published: (2015)
by: Heidari, Saleheh
Published: (2015)
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
Similar Items
-
Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
by: Hasan, Dana, et al.
Published: (2017) -
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021) -
Distributed defense scheme for managing DNS reflection attack in network communication systems
by: Ahmed, Dana Hasan, et al.
Published: (2016) -
Protecting DNS from reflection amplification attacks using distributed defense scheme
by: Ahmed, Dana Hasan
Published: (2017) -
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)