Feature Selection for Detecting Fast Attack in Network Intrusion Detection

Over the last decade, networks have grown in both size and importance especially in exchange data and carry out transactions. They have also become the main mean to attack host. The popularity of intrusion tools and attack scripts are the main contributors of the attacks inside the network.These inf...

Full description

Bibliographic Details
Main Authors: Abdollah, M. F., Sahib, S., Yaacub, A. H., Othman, M. F. I., Yusof, R.
Format: Article
Language:English
Published: Universiti Teknikal Malaysia Melaka 2008
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/186/
http://eprints.utem.edu.my/id/eprint/186/1/02_02_4%5B1%5D-JAMT_vol_2_no_2.pdf
_version_ 1848886899852181504
author Abdollah, M. F.
Sahib, S.
Yaacub, A. H.
Othman, M. F. I.
Yusof, R.
author_facet Abdollah, M. F.
Sahib, S.
Yaacub, A. H.
Othman, M. F. I.
Yusof, R.
author_sort Abdollah, M. F.
building UTeM Institutional Repository
collection Online Access
description Over the last decade, networks have grown in both size and importance especially in exchange data and carry out transactions. They have also become the main mean to attack host. The popularity of intrusion tools and attack scripts are the main contributors of the attacks inside the network.These information gathering techniques can be divided into two categories which are fast attack and slow attack.
first_indexed 2025-11-15T19:45:50Z
format Article
id utem-186
institution Universiti Teknikal Malaysia Melaka
institution_category Local University
language English
last_indexed 2025-11-15T19:45:50Z
publishDate 2008
publisher Universiti Teknikal Malaysia Melaka
recordtype eprints
repository_type Digital Repository
spelling utem-1862021-09-29T00:20:48Z http://eprints.utem.edu.my/id/eprint/186/ Feature Selection for Detecting Fast Attack in Network Intrusion Detection Abdollah, M. F. Sahib, S. Yaacub, A. H. Othman, M. F. I. Yusof, R. Q Science (General) Over the last decade, networks have grown in both size and importance especially in exchange data and carry out transactions. They have also become the main mean to attack host. The popularity of intrusion tools and attack scripts are the main contributors of the attacks inside the network.These information gathering techniques can be divided into two categories which are fast attack and slow attack. Universiti Teknikal Malaysia Melaka 2008-07 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/186/1/02_02_4%5B1%5D-JAMT_vol_2_no_2.pdf Abdollah, M. F. and Sahib, S. and Yaacub, A. H. and Othman, M. F. I. and Yusof, R. (2008) Feature Selection for Detecting Fast Attack in Network Intrusion Detection. Journal of Advanced Manufacturing Technology, 2 (2). pp. 39-56. ISSN 1985-3157 July-December 2008
spellingShingle Q Science (General)
Abdollah, M. F.
Sahib, S.
Yaacub, A. H.
Othman, M. F. I.
Yusof, R.
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
title Feature Selection for Detecting Fast Attack in Network Intrusion Detection
title_full Feature Selection for Detecting Fast Attack in Network Intrusion Detection
title_fullStr Feature Selection for Detecting Fast Attack in Network Intrusion Detection
title_full_unstemmed Feature Selection for Detecting Fast Attack in Network Intrusion Detection
title_short Feature Selection for Detecting Fast Attack in Network Intrusion Detection
title_sort feature selection for detecting fast attack in network intrusion detection
topic Q Science (General)
url http://eprints.utem.edu.my/id/eprint/186/
http://eprints.utem.edu.my/id/eprint/186/1/02_02_4%5B1%5D-JAMT_vol_2_no_2.pdf