Detecting malware attack in mobile phone using Intrusion Detection and Prevention System (IDPS)
This project centers on cybersecurity, with a specific focus on detecting and preventing adware through the use of Intrusion Detection and Prevention Systems (IDPS) on Android mobile devices. The project integrates both Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) to stre...
| Main Author: | Leow, Yu Hong |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2024
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/6907/ http://eprints.utar.edu.my/6907/1/fyp_CN_2024_LYH.pdf |
Similar Items
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023)
by: Chai, Tze Uei
Published: (2023)
Spear-phishing attack detection using artificial intelligence
by: Rajkumaradevan, Sanglidevan
Published: (2024)
by: Rajkumaradevan, Sanglidevan
Published: (2024)
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024)
by: Tung, Tean Thong
Published: (2024)
Assessment of awareness in mobile phone waste recycling program among consumers in Kuala Lumpur / Nur Syazwina Kamardzaman
by: Nur Syazwina, Kamardzaman
Published: (2019)
by: Nur Syazwina, Kamardzaman
Published: (2019)
Vehicle Detection in Deep Learning
by: Teoh, Per Nian
Published: (2019)
by: Teoh, Per Nian
Published: (2019)
Detection of microplastic in tap water, Kampar, Perak
by: Fong, Rui Qian
Published: (2022)
by: Fong, Rui Qian
Published: (2022)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Rogue access point detection and tracking in UTAR campus
by: Lee, Chiew Min
Published: (2024)
by: Lee, Chiew Min
Published: (2024)
Metaldehyde: a brief on biodegradation and detection methods / Azlina Mat Saad
by: Mat Saad, Azlina, et al.
Published: (2018)
by: Mat Saad, Azlina, et al.
Published: (2018)
Human presence detection system
by: Tai, Xi Yang
Published: (2024)
by: Tai, Xi Yang
Published: (2024)
Underwater species-constrained fish detection using multi-frame image information
by: Ling, Yi Jun
Published: (2023)
by: Ling, Yi Jun
Published: (2023)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Occupational accident prevention strategies based on Behaviour Based Safety (BBS) in a selected manufacturing industry / Thurga Devi Uthaya Sooriyan
by: Thurga Devi, Uthaya Sooriyan
Published: (2022)
by: Thurga Devi, Uthaya Sooriyan
Published: (2022)
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
Carpooling mobile application
by: Loh, Xin Yi
Published: (2024)
by: Loh, Xin Yi
Published: (2024)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Challenges in high accuracy of malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Android mobile malware detection system using fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Strategies for preventing fire in high-rise residential buildings / Andrea Valerie Law
by: Andrea, Valerie Law
Published: (2018)
by: Andrea, Valerie Law
Published: (2018)
Operation of mobile sensors for monitoring municipal drinking water distribution systems
by: Rasekh, Amin, et al.
Published: (2014)
by: Rasekh, Amin, et al.
Published: (2014)
FSTI researchers developed mobile and environment-friendly water treatment system
by: Wan Faizal, Wan Ishak, et al.
Published: (2016)
by: Wan Faizal, Wan Ishak, et al.
Published: (2016)
Old age home mobile application
by: Tan, Teck Wei
Published: (2024)
by: Tan, Teck Wei
Published: (2024)
Nanocrystal TiO2 Engulfed SiO2-Barium Hexaferrite for Enhanced Electrons Mobility and Solar Harvesting Potential
by: Azrina, Abd Aziz, et al.
Published: (2015)
by: Azrina, Abd Aziz, et al.
Published: (2015)
An auto sorting waste detection service system for green society
by: Ahda, Sabrina Washiatul, et al.
Published: (2017)
by: Ahda, Sabrina Washiatul, et al.
Published: (2017)
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
IOT threats detection using few shots learning
by: Chua, Cheng Han
Published: (2024)
by: Chua, Cheng Han
Published: (2024)
Zero-day detection on IOT networks
by: Oh, Jia Sheng
Published: (2024)
by: Oh, Jia Sheng
Published: (2024)
Development of automotive e-services mobile apps for Kampar area
by: Lee, Zhong Cheng
Published: (2024)
by: Lee, Zhong Cheng
Published: (2024)
ShopRecog: Mobile application for shop recognition with text to speech
by: Khoo, Zi Yi
Published: (2024)
by: Khoo, Zi Yi
Published: (2024)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Estream: A mobile live streaming platform for esports
by: Lim, Yu Qi
Published: (2024)
by: Lim, Yu Qi
Published: (2024)
Development and evaluation of a banknote reader for visually impaired people using deep learning-based object detection
by: Chan, Hong Wai
Published: (2023)
by: Chan, Hong Wai
Published: (2023)
Catalytic Wet Air Oxidation of Wastewater Containing Acetic Acid
by: Tan Yang, Hong
Published: (2013)
by: Tan Yang, Hong
Published: (2013)
Nitrogen removal efficiency in slaughterhouse wastewater by using upflow microaerobic sludge reactor
by: Foo, Voon Hong
Published: (2019)
by: Foo, Voon Hong
Published: (2019)
A study on waste generation in commercial area at Indera Mahkota 5, Kuantan, Pahang
by: Kew Hong, Soo
Published: (2013)
by: Kew Hong, Soo
Published: (2013)
Treatment oOf Palm Oil Mill Effluent using Combination of Microbial Fuel Cell and Anaerobic Membrane Bioreactor
by: Kong, Hong Feng
Published: (2017)
by: Kong, Hong Feng
Published: (2017)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
Similar Items
-
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023) -
Spear-phishing attack detection using artificial intelligence
by: Rajkumaradevan, Sanglidevan
Published: (2024) -
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024) -
Assessment of awareness in mobile phone waste recycling program among consumers in Kuala Lumpur / Nur Syazwina Kamardzaman
by: Nur Syazwina, Kamardzaman
Published: (2019) -
Vehicle Detection in Deep Learning
by: Teoh, Per Nian
Published: (2019)