Utilizing first hop redundancy protocol to mitigate the effects of denial-of-service attack
| Main Author: | Khong, Johnson |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/2915/ http://eprints.utar.edu.my/2915/1/CN%2D2018%2DKJ%2D1403535.pdf |
Similar Items
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)
by: Lim, Kong Hua
Published: (2011)
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Data mining techniques for effective detection of distributed denial-of-service attacks
by: Lee, Yuen Hui
Published: (2024)
by: Lee, Yuen Hui
Published: (2024)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
Distributed denial of service attack Detection in IoT networks using deep learning and feature fusion : A review
by: Nuhu Ahmad, Abdul hafiz, et al.
Published: (2024)
by: Nuhu Ahmad, Abdul hafiz, et al.
Published: (2024)
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
Finding a suitable hop-to-hop busty traffic transmission approach for underwater acoustic networks: handshake-based vs. handshake-free MAC protocols
by: Azad, Saiful, et al.
Published: (2018)
by: Azad, Saiful, et al.
Published: (2018)
Simulated Annealing Based Strategy for Test Redundancy Reduction
by: Kamal Z., Zamli, et al.
Published: (2014)
by: Kamal Z., Zamli, et al.
Published: (2014)
An adaptive flower pollination algorithm for minimizing software testing redundancy
by: M. N., Kabir, et al.
Published: (2017)
by: M. N., Kabir, et al.
Published: (2017)
Utilizing Electronic Institution For Protocol Specification In Agent-Based E-Learning System
by: Latif, N.A., et al.
Published: (2009)
by: Latif, N.A., et al.
Published: (2009)
Tamper localization for medical images using cyclic redundancy check (CRC)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013)
A blind watermarking using redundant wavelet transform for copyright protection
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Late Acceptance Hill Climbing Based Strategy for Test Redundancy Reduction and Prioritization
by: Rohani, Abu Bakar, et al.
Published: (2015)
by: Rohani, Abu Bakar, et al.
Published: (2015)
A blind watermarking technique using redundant wavelet transform for copyright protection
by: Ernawan, F., et al.
Published: (2018)
by: Ernawan, F., et al.
Published: (2018)
Improving targeting feedback for users with low visibility using visual redundant feedback
by: Sim, Dennis Chee Chow
Published: (2005)
by: Sim, Dennis Chee Chow
Published: (2005)
Hop-by-Hop Dynamic Addressing Based (H2-DAB) Routing Protocol for Underwater Wireless Sensor Networks
by: Muhammad , Ayaz, et al.
Published: (2009)
by: Muhammad , Ayaz, et al.
Published: (2009)
Authorized Redundant Check Support in a Hybrid Cloud Environment
by: Durgadevi, ., et al.
Published: (2024)
by: Durgadevi, ., et al.
Published: (2024)
Expert System of Heart Attack Prediction
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
An Efficient Distributed Slotted Multi-Hop Wireless Mac Protocol For Internet Of Things
by: Sarvghadi, Mohammad Ali
Published: (2021)
by: Sarvghadi, Mohammad Ali
Published: (2021)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Intrusion detection and prevention of web service attacks for software as a service:Fuzzy association rules vs fuzzy associative patterns
by: Chan, Gaik Yee, et al.
Published: (2016)
by: Chan, Gaik Yee, et al.
Published: (2016)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Attack Intention Recognition: A Review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Forensic investigation of link fabrication attack in software defined networks / Suleman Khan
by: Suleman , Khan
Published: (2017)
by: Suleman , Khan
Published: (2017)
Analysis of web worm attack on web application
by: Mohd. Ghazzali, Amalina
Published: (2008)
by: Mohd. Ghazzali, Amalina
Published: (2008)
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
by: Por, Lip Yee
Published: (2012)
by: Por, Lip Yee
Published: (2012)
Development of Al-Mu’awwidhah computing for personal data
protection against abnormal attacks
by: Shamsudin, Ahmad Faizul, et al.
Published: (2013)
by: Shamsudin, Ahmad Faizul, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
A comparative analysis of data redundancy and execution time between relational and object oriented schema table
by: Alakari, Salim Tahir
Published: (2014)
by: Alakari, Salim Tahir
Published: (2014)
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
by: Akanji, Oluwatobi Shadrach, et al.
Published: (2021)
by: Akanji, Oluwatobi Shadrach, et al.
Published: (2021)
Similar Items
-
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016) -
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018) -
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011) -
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication
by: Rahman, Md. Arafatur, et al.
Published: (2015) -
Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)