An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
The news about distributed denial of service (DDoS) attacks is rapidly increased around the world. Many services of companies and/or governments are victims of the attack. The main purpose of DDoS attacks is to overload the service for a long time, rather than to steal money or data from the targets...
| Main Author: | Ahmed Marwan, Idrees Aleesa |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/1771/ http://eprints.uthm.edu.my/1771/2/AHMED%20MARWAN%20IDREES%20ALEESA%20-%20declaration.pdf http://eprints.uthm.edu.my/1771/1/AHMED%20MARWAN%20IDREES%20ALEESA%20-%2024p.pdf http://eprints.uthm.edu.my/1771/3/AHMED%20MARWAN%20IDREES%20ALEESA%20-%20fulltext.pdf |
Similar Items
Evaluation Of Internet Protocal Version 6 (IPV6) Implementations And Comparative Performance Analysis On Different Platforms
by: Syed Mohamed, Sulaiman
Published: (2005)
by: Syed Mohamed, Sulaiman
Published: (2005)
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
by: A. M., Aleesa, et al.
Published: (2020)
by: A. M., Aleesa, et al.
Published: (2020)
Understanding the root of attack in android malware
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
Flood monitoring system
by: Wan Mustaffa, Wan Nurazlin
Published: (2004)
by: Wan Mustaffa, Wan Nurazlin
Published: (2004)
A hybrid approach to intrusion detection and prevention for business intelligence applications
by: Yee, , Chan Gaik, et al.
Published: (2006)
by: Yee, , Chan Gaik, et al.
Published: (2006)
Performance evaluation for different intrusion detection system algorithms using machine learning
by: Zarir, Mustafa Nadhim
Published: (2018)
by: Zarir, Mustafa Nadhim
Published: (2018)
Frequency hopping using CDMA to avoid malicious attack in han networks
by: Ridha, Hussein Ali
Published: (2020)
by: Ridha, Hussein Ali
Published: (2020)
A comprehensive study of distributed denial of service attack with the detection techniques
by: Ibrahim, Husam Hamid
Published: (2018)
by: Ibrahim, Husam Hamid
Published: (2018)
Propose a new Firefly-Fast Learning Network
model based Intrusion-Detection System
by: Badran, Mohammed Falih, et al.
Published: (2019)
by: Badran, Mohammed Falih, et al.
Published: (2019)
The performance of directional flooding routing protocol for underwater sensor networks
by: Idrus, Nur Asfarina
Published: (2015)
by: Idrus, Nur Asfarina
Published: (2015)
Study On Signature-Based Network Intrusion Detection System For High-Speed Network Using Network Processing Unit (NPU)
by: Salim, Robin
Published: (2007)
by: Salim, Robin
Published: (2007)
Synmon architecture for source-based SYN-flooding defense on network processor
by: Lim,, BP, et al.
Published: (2005)
by: Lim,, BP, et al.
Published: (2005)
Modeling middleware platform for supporting communication between IoT devices
by: Fakhri, Marwan Najm
Published: (2019)
by: Fakhri, Marwan Najm
Published: (2019)
Speech enhancement using deep neural network based on mask estimation and harmonic regeneration noise reduction for single channel microphone
by: Md Jamal, Norezmi
Published: (2022)
by: Md Jamal, Norezmi
Published: (2022)
Optimal forwarding routing protocol in ipv6-based wireless sensor network
by: Jamil, Ansar
Published: (2009)
by: Jamil, Ansar
Published: (2009)
Internet of things (IoT); security requirements, attacks and counter measures
by: Imdad, Maria, et al.
Published: (2020)
by: Imdad, Maria, et al.
Published: (2020)
Pembangunan aplikasi android subjek Teknologi Maklumat Dan Komunikasi Tahun Enam (6) bagi topik Penghasilan Dan Pengujian Atur Cara
by: Hamzah, Norhasyimah, et al.
Published: (2021)
by: Hamzah, Norhasyimah, et al.
Published: (2021)
Propose a new firefly-fast learning network model based intrusion-detection system
by: Badran, Mohammed Falih, et al.
Published: (2019)
by: Badran, Mohammed Falih, et al.
Published: (2019)
A grouping scheme for secure multicasting in mobile IPv6
by: AI-Talib, Sahar, et al.
Published: (2003)
by: AI-Talib, Sahar, et al.
Published: (2003)
Design of robust protocol to enhance QoS in mobile IPV6 environment
by: Hussien, Loay F., et al.
Published: (2010)
by: Hussien, Loay F., et al.
Published: (2010)
Macro/micro-mobility fast handover in hierarchical mobile IPv6
by: Habaebi, Mohamed Hadi
Published: (2006)
by: Habaebi, Mohamed Hadi
Published: (2006)
Service recovery of multicast hierarchical mobile IPV6 with context transfer
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
by: Ooi, Hui Ni, et al.
Published: (2021)
by: Ooi, Hui Ni, et al.
Published: (2021)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
A new multicast-based architecture to support host mobility in IPv6
by: M. Ali, Borhanuddin, et al.
Published: (2003)
by: M. Ali, Borhanuddin, et al.
Published: (2003)
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
by: Vivaldi, Indra, et al.
Published: (2003)
by: Vivaldi, Indra, et al.
Published: (2003)
Routing scheme for macro mobility handover in hierarchical
mobile IPv6 network
by: Vivaldi, Indra, et al.
Published: (2003)
by: Vivaldi, Indra, et al.
Published: (2003)
Adaptive MIMO-OFDM combining space-time block codes and spatial multiplexing in correlated frequency-selective channels
by: Halmi, Mohd Hairi
Published: (2005)
by: Halmi, Mohd Hairi
Published: (2005)
Providing Quality Of Service In IEEE 802.11 Wireless Local Area Network (WLAN)
by: Ng, Bryan Cheng Kuan
Published: (2005)
by: Ng, Bryan Cheng Kuan
Published: (2005)
A Case Study Of Redtone International Berhad
by: Mustafa, Muhamad Sabri
Published: (2005)
by: Mustafa, Muhamad Sabri
Published: (2005)
Wavelength Converters Placement In All Optical Networks Using Particle Swarm Optimization
by: Teo , Choon Fang
Published: (2005)
by: Teo , Choon Fang
Published: (2005)
A Case Study Of SOHU
by: Kui, Zhang Wen
Published: (2005)
by: Kui, Zhang Wen
Published: (2005)
Analysis Of Deflection Routing Multihop Lightwave Networks With Limited Number Of Wavelength Converters
by: Koa , Chong Gee
Published: (2005)
by: Koa , Chong Gee
Published: (2005)
Strategic Implications Of Multimedia Messaging Services (MMS) : Identifying The Opportunities
by: Wu, Chin Gang
Published: (2005)
by: Wu, Chin Gang
Published: (2005)
Usability Study Of Websites From The Perspective Of Student Internet Users
by: Jeyakuma, Robert
Published: (2005)
by: Jeyakuma, Robert
Published: (2005)
Analysis And Design Of Active Grating-Embedded Optical Filters
by: Lim , Kian Yong
Published: (2005)
by: Lim , Kian Yong
Published: (2005)
Design Of A Multiwavelength Optical Light Source Using Optical Frequency Comb Generator (OFCG)
by: Thum , Ann
Published: (2005)
by: Thum , Ann
Published: (2005)
A Study On Service Convergence Within A Wireless Metropolitan Area Network (MAN) In Malaysia
by: Tan, Roy Yew Hoong
Published: (2005)
by: Tan, Roy Yew Hoong
Published: (2005)
The Preferences Of Mobile Contents Reguired By Consumers And Factory Influencing The Choice Of Mobile Contents By Different Types Of Consumers
by: Xin, Lim Ke
Published: (2004)
by: Xin, Lim Ke
Published: (2004)
Similar Items
-
Evaluation Of Internet Protocal Version 6 (IPV6) Implementations And Comparative Performance Analysis On Different Platforms
by: Syed Mohamed, Sulaiman
Published: (2005) -
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
by: A. M., Aleesa, et al.
Published: (2020) -
Understanding the root of attack in android malware
by: Romli, Rahiwan Nazar, et al.
Published: (2018) -
Flood monitoring system
by: Wan Mustaffa, Wan Nurazlin
Published: (2004) -
A hybrid approach to intrusion detection and prevention for business intelligence applications
by: Yee, , Chan Gaik, et al.
Published: (2006)