Threshold verification using Statistical Approach for Fast Attack Detection
Network has grows to a mammoth size and becoming more complex, thus exposing the services it offers towards multiple types of intrusion vulnerabilities. One method to overcome intrusion is by introducing Intrusion Detection System (IDS) for detecting the threat before it can damage the network resou...
| Main Authors: | Abdollah, M. F., Mas'ud, M. Z., Sahib, S., Yusof, R., Selamat, S. R. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/188/ http://eprints.utem.edu.my/id/eprint/188/1/ICOCI09.doc |
Similar Items
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Threshold verification using statistical approach for fast attack detection
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Generic Taxonomy of Social Engineering Attack
by: Mohd Foozy, F, et al.
Published: (2011)
by: Mohd Foozy, F, et al.
Published: (2011)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023)
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023)
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
Efficient and fast multi layer statistical approach for colour based image retrieval
by: Odeh, , JQ, et al.
Published: (2003)
by: Odeh, , JQ, et al.
Published: (2003)
Statistical voice activity detection using low-variance spectrum estimation and an adaptive threshold
by: Davis, A., et al.
Published: (2006)
by: Davis, A., et al.
Published: (2006)
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
Network Administration & Management
by: Yusof, R., et al.
Published: (2007)
by: Yusof, R., et al.
Published: (2007)
Dynamic Handwritten Signature Verification Based on Statistical Quantization Mechanism
by: Ong, Thian Song, et al.
Published: (2009)
by: Ong, Thian Song, et al.
Published: (2009)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Effects of petroleum fiscal regimes and tax instruments on the investment climate of marginal oil fields in Malaysia
by: Mas'ud, Abdulsalam
Published: (2016)
by: Mas'ud, Abdulsalam
Published: (2016)
Enhanced intrusion detection capabilities via weighted chi-square, discretization and SVM
by: Mohamed Yassin, Warusia, et al.
Published: (2018)
by: Mohamed Yassin, Warusia, et al.
Published: (2018)
Performance verification on UWB antennas for breast cancer detection
by: V., Vijayasarveswari, et al.
Published: (2017)
by: V., Vijayasarveswari, et al.
Published: (2017)
Improvement in fast particle track reconstruction with robust statistics
by: Aartsen, M., et al.
Published: (2014)
by: Aartsen, M., et al.
Published: (2014)
Off-line signature verification and forgery detection using fuzzy modeling
by: Hanmandlu, , M, et al.
Published: (2005)
by: Hanmandlu, , M, et al.
Published: (2005)
Virtual Machine based Autonomous Web Server
by: Mas’ud, M. Z., et al.
Published: (2011)
by: Mas’ud, M. Z., et al.
Published: (2011)
Anomaly-Based Detection Approach To Detect The Flash Crowd Attack During The Flash Event
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Similar Items
-
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010) -
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009) -
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011) -
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010) -
Threshold verification using statistical approach for fast attack detection
by: Abdollah, Mohd Faizal, et al.
Published: (2009)