Statistical Approach for Validating Static Threshold in Fast Attack Detection
Network has growth to a mammoth size and becoming more complex, thus exposing more services it offers towards multiple types of intrusion vulnerabilities. One method to overcome intrusion is by introducing intrusion detection system (IDS)for detecting the threat before it can damage the network re...
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Universiti Teknikal Malaysia Melaka
2010
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/192/ http://eprints.utem.edu.my/id/eprint/192/1/04_01_5%5B1%5D-JAMT_vol_4_no_1.pdf |
| _version_ | 1848886901530951680 |
|---|---|
| author | Abdollah, M. F. Mas'ud, M. Z. Yusof, R. Selamat, S. R. |
| author_facet | Abdollah, M. F. Mas'ud, M. Z. Yusof, R. Selamat, S. R. |
| author_sort | Abdollah, M. F. |
| building | UTeM Institutional Repository |
| collection | Online Access |
| description | Network has growth to a mammoth size and becoming more complex, thus exposing more services it offers towards multiple types of intrusion vulnerabilities. One method to overcome intrusion is by introducing intrusion detection system (IDS)for detecting the threat before it can damage the network resources. |
| first_indexed | 2025-11-15T19:45:51Z |
| format | Article |
| id | utem-192 |
| institution | Universiti Teknikal Malaysia Melaka |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T19:45:51Z |
| publishDate | 2010 |
| publisher | Universiti Teknikal Malaysia Melaka |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | utem-1922021-09-29T00:27:31Z http://eprints.utem.edu.my/id/eprint/192/ Statistical Approach for Validating Static Threshold in Fast Attack Detection Abdollah, M. F. Mas'ud, M. Z. Yusof, R. Selamat, S. R. Q Science (General) Network has growth to a mammoth size and becoming more complex, thus exposing more services it offers towards multiple types of intrusion vulnerabilities. One method to overcome intrusion is by introducing intrusion detection system (IDS)for detecting the threat before it can damage the network resources. Universiti Teknikal Malaysia Melaka 2010-01 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/192/1/04_01_5%5B1%5D-JAMT_vol_4_no_1.pdf Abdollah, M. F. and Mas'ud, M. Z. and Yusof, R. and Selamat, S. R. (2010) Statistical Approach for Validating Static Threshold in Fast Attack Detection. Journal of Advanced Manufacturing Technology, 4 (1). pp. 53-71. ISSN 1985-3157 Jan-June 2010 |
| spellingShingle | Q Science (General) Abdollah, M. F. Mas'ud, M. Z. Yusof, R. Selamat, S. R. Statistical Approach for Validating Static Threshold in Fast Attack Detection |
| title | Statistical Approach for Validating Static Threshold in Fast Attack Detection |
| title_full | Statistical Approach for Validating Static Threshold in Fast Attack Detection |
| title_fullStr | Statistical Approach for Validating Static Threshold in Fast Attack Detection |
| title_full_unstemmed | Statistical Approach for Validating Static Threshold in Fast Attack Detection |
| title_short | Statistical Approach for Validating Static Threshold in Fast Attack Detection |
| title_sort | statistical approach for validating static threshold in fast attack detection |
| topic | Q Science (General) |
| url | http://eprints.utem.edu.my/id/eprint/192/ http://eprints.utem.edu.my/id/eprint/192/1/04_01_5%5B1%5D-JAMT_vol_4_no_1.pdf |