Statistical Approach for Validating Static Threshold in Fast Attack Detection
Network has growth to a mammoth size and becoming more complex, thus exposing more services it offers towards multiple types of intrusion vulnerabilities. One method to overcome intrusion is by introducing intrusion detection system (IDS)for detecting the threat before it can damage the network re...
| Main Authors: | Abdollah, M. F., Mas'ud, M. Z., Yusof, R., Selamat, S. R. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Universiti Teknikal Malaysia Melaka
2010
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/192/ http://eprints.utem.edu.my/id/eprint/192/1/04_01_5%5B1%5D-JAMT_vol_4_no_1.pdf |
Similar Items
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Threshold verification using statistical approach for fast attack detection
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Generic Taxonomy of Social Engineering Attack
by: Mohd Foozy, F, et al.
Published: (2011)
by: Mohd Foozy, F, et al.
Published: (2011)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023)
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023)
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
Statistical voice activity detection using low-variance spectrum estimation and an adaptive threshold
by: Davis, A., et al.
Published: (2006)
by: Davis, A., et al.
Published: (2006)
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
Efficient and fast multi layer statistical approach for colour based image retrieval
by: Odeh, , JQ, et al.
Published: (2003)
by: Odeh, , JQ, et al.
Published: (2003)
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
A meta-requirement approach to validate user requirement specification : Threshold definition
by: Muhamad Idaham, Umar Ong, et al.
Published: (2023)
by: Muhamad Idaham, Umar Ong, et al.
Published: (2023)
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
Validation test on thresholds for wheelchair power-assist system activation using population data
by: M. H., Muhammad Sidik, et al.
Published: (2020)
by: M. H., Muhammad Sidik, et al.
Published: (2020)
A Static Approach towards Mobile Botnet Detection
by: Shahid, Anwar, et al.
Published: (2016)
by: Shahid, Anwar, et al.
Published: (2016)
Effects of petroleum fiscal regimes and tax instruments on the investment climate of marginal oil fields in Malaysia
by: Mas'ud, Abdulsalam
Published: (2016)
by: Mas'ud, Abdulsalam
Published: (2016)
Enhanced intrusion detection capabilities via weighted chi-square, discretization and SVM
by: Mohamed Yassin, Warusia, et al.
Published: (2018)
by: Mohamed Yassin, Warusia, et al.
Published: (2018)
Improvement in fast particle track reconstruction with robust statistics
by: Aartsen, M., et al.
Published: (2014)
by: Aartsen, M., et al.
Published: (2014)
Anomaly-Based Detection Approach To Detect The Flash Crowd Attack During The Flash Event
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Very fast blind source separation by signal to noise ratio based stopping threshold for the SHIBBS/SJAD algorithm
by: Liu, Xianhua, et al.
Published: (2010)
by: Liu, Xianhua, et al.
Published: (2010)
Statistical and QC tools for validation
by: Ahamed, Muhsin, et al.
Published: (2015)
by: Ahamed, Muhsin, et al.
Published: (2015)
A simple approach to determine the best threshold value for automatic image thresholding
by: Ismail, Abdul Halim, et al.
Published: (2009)
by: Ismail, Abdul Halim, et al.
Published: (2009)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Skin Colour Detection Based On An Adaptive Multi-Thresholding Technique
by: Mharib, Ahmed M.
Published: (2007)
by: Mharib, Ahmed M.
Published: (2007)
Similar Items
-
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009) -
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011) -
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010) -
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009) -
Threshold verification using statistical approach for fast attack detection
by: Abdollah, Mohd Faizal, et al.
Published: (2009)