Feature Selection for Detecting Fast Attack in Network Intrusion Detection
Over the last decade, networks have grown in both size and importance especially in exchange data and carry out transactions. They have also become the main mean to attack host. The popularity of intrusion tools and attack scripts are the main contributors of the attacks inside the network.These inf...
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Universiti Teknikal Malaysia Melaka
2008
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/186/ http://eprints.utem.edu.my/id/eprint/186/1/02_02_4%5B1%5D-JAMT_vol_2_no_2.pdf |
| _version_ | 1848886899852181504 |
|---|---|
| author | Abdollah, M. F. Sahib, S. Yaacub, A. H. Othman, M. F. I. Yusof, R. |
| author_facet | Abdollah, M. F. Sahib, S. Yaacub, A. H. Othman, M. F. I. Yusof, R. |
| author_sort | Abdollah, M. F. |
| building | UTeM Institutional Repository |
| collection | Online Access |
| description | Over the last decade, networks have grown in both size and importance especially in exchange data and carry out transactions. They have also become the main mean to attack host. The popularity of intrusion tools and attack scripts are the main contributors of the attacks inside the network.These information gathering techniques can be divided into two categories which are fast attack and slow attack. |
| first_indexed | 2025-11-15T19:45:50Z |
| format | Article |
| id | utem-186 |
| institution | Universiti Teknikal Malaysia Melaka |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T19:45:50Z |
| publishDate | 2008 |
| publisher | Universiti Teknikal Malaysia Melaka |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | utem-1862021-09-29T00:20:48Z http://eprints.utem.edu.my/id/eprint/186/ Feature Selection for Detecting Fast Attack in Network Intrusion Detection Abdollah, M. F. Sahib, S. Yaacub, A. H. Othman, M. F. I. Yusof, R. Q Science (General) Over the last decade, networks have grown in both size and importance especially in exchange data and carry out transactions. They have also become the main mean to attack host. The popularity of intrusion tools and attack scripts are the main contributors of the attacks inside the network.These information gathering techniques can be divided into two categories which are fast attack and slow attack. Universiti Teknikal Malaysia Melaka 2008-07 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/186/1/02_02_4%5B1%5D-JAMT_vol_2_no_2.pdf Abdollah, M. F. and Sahib, S. and Yaacub, A. H. and Othman, M. F. I. and Yusof, R. (2008) Feature Selection for Detecting Fast Attack in Network Intrusion Detection. Journal of Advanced Manufacturing Technology, 2 (2). pp. 39-56. ISSN 1985-3157 July-December 2008 |
| spellingShingle | Q Science (General) Abdollah, M. F. Sahib, S. Yaacub, A. H. Othman, M. F. I. Yusof, R. Feature Selection for Detecting Fast Attack in Network Intrusion Detection |
| title | Feature Selection for Detecting Fast Attack in Network Intrusion Detection |
| title_full | Feature Selection for Detecting Fast Attack in Network Intrusion Detection |
| title_fullStr | Feature Selection for Detecting Fast Attack in Network Intrusion Detection |
| title_full_unstemmed | Feature Selection for Detecting Fast Attack in Network Intrusion Detection |
| title_short | Feature Selection for Detecting Fast Attack in Network Intrusion Detection |
| title_sort | feature selection for detecting fast attack in network intrusion detection |
| topic | Q Science (General) |
| url | http://eprints.utem.edu.my/id/eprint/186/ http://eprints.utem.edu.my/id/eprint/186/1/02_02_4%5B1%5D-JAMT_vol_2_no_2.pdf |