A comprehensive study of distributed denial of service attack with the detection techniques
Today, net related net services are indivisible in our life. Therefore, for the success of certain types of organizations, some sustained simplification of services is essential. However, these service area units were usually hindered by the constant threat from numerous kinds of attacks. One such a...
| Main Author: | Ibrahim, Husam Hamid |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/7537/ http://eprints.uthm.edu.my/7537/2/24p%20HUSAM%20HAMID%20IBRAHIM.pdf http://eprints.uthm.edu.my/7537/1/HUSAM%20HAMID%20IBRAHIM%20COPYRIGHT%20DELARATION.pdf http://eprints.uthm.edu.my/7537/3/HUSAM%20HAMID%20IBRAHIM%20WATERMARK.pdf |
Similar Items
A comprehensive study of distributed denial of service attack with the detection techniques
by: Ibrahim, Husam Hamid
Published: (2018)
by: Ibrahim, Husam Hamid
Published: (2018)
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
Understanding the root of attack in android malware
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
Frequency hopping using CDMA to avoid malicious attack in han networks
by: Ridha, Hussein Ali
Published: (2020)
by: Ridha, Hussein Ali
Published: (2020)
Machine learning techniques to detect bleeding frame and area in wireless capsule endoscopy video
by: Vajravelua, Ashok, et al.
Published: (2023)
by: Vajravelua, Ashok, et al.
Published: (2023)
POWer adaptive random early detection for DiffServ assured forwarding service classes
by: Ng,, B. K, et al.
Published: (2006)
by: Ng,, B. K, et al.
Published: (2006)
Modulation techniques for GPR system radargram
by: Joret, Ariffuddin
Published: (2018)
by: Joret, Ariffuddin
Published: (2018)
A modified technique in RFID networking planning and optimization
by: Nawawi, Azli
Published: (2015)
by: Nawawi, Azli
Published: (2015)
Development of new all-optical signal regeneration technique
by: Das, Bhagwan, et al.
Published: (2017)
by: Das, Bhagwan, et al.
Published: (2017)
An efficient local search heuristics for asynchronous multiuser detection
by: Lim, Heng Siong, et al.
Published: (2003)
by: Lim, Heng Siong, et al.
Published: (2003)
Selfish Nodes Detection Mechanism In Wireless Mesh Networks
by: Kai, Chong Zan
Published: (2010)
by: Kai, Chong Zan
Published: (2010)
Improved Signal Coding Techniques For Broadband Power Line Communications
by: Shafieipour, Mohammad
Published: (2010)
by: Shafieipour, Mohammad
Published: (2010)
Error Control Techniques For Video Transmission Over Wireless Channels
by: Chang, Yoong Choon
Published: (2008)
by: Chang, Yoong Choon
Published: (2008)
Iterative Decoding And Detection For CDMA Systems On Non-Gaussian Channels
by: Ku, Ivan Chui Choon
Published: (2006)
by: Ku, Ivan Chui Choon
Published: (2006)
Multiuser detection for DS-CDMA systems using evolutionary programming
by: Lim, H.S., et al.
Published: (2003)
by: Lim, H.S., et al.
Published: (2003)
Radio Frequency Identification (RFID) based cable detection system
by: Hasan, Syahzani Arifah, et al.
Published: (2021)
by: Hasan, Syahzani Arifah, et al.
Published: (2021)
Salp swarm and gray wolf optimizer for improving the efficiency of power supply network in radial distribution systems
by: Ihsan Salman, Ihsan Salman, et al.
Published: (2023)
by: Ihsan Salman, Ihsan Salman, et al.
Published: (2023)
A heuristics approach for classroom scheduling using genetic algorithm technique
by: Ahmad, Izah R., et al.
Published: (2017)
by: Ahmad, Izah R., et al.
Published: (2017)
Enchancing RFID data quality and reliability using approximate filtering techniques
by: Kamaludin, Hazalila
Published: (2018)
by: Kamaludin, Hazalila
Published: (2018)
A hybrid approach to intrusion detection and prevention for business intelligence applications
by: Yee, , Chan Gaik, et al.
Published: (2006)
by: Yee, , Chan Gaik, et al.
Published: (2006)
Youtube spam detection framework using naïve bayes and logistic regression
by: Maulat Samsudin, Nur’Ain, et al.
Published: (2019)
by: Maulat Samsudin, Nur’Ain, et al.
Published: (2019)
Development of ultra wideband antenna array for human detection under debris
by: Ali, Jawad
Published: (2018)
by: Ali, Jawad
Published: (2018)
Low power 130 nm CMOS Johnson Counter with clock gating technique
by: Amran, Nur Syuhadah, et al.
Published: (2018)
by: Amran, Nur Syuhadah, et al.
Published: (2018)
Evaluation performance of OFDM system using the selected mapping technique for WIMAX technology
by: Khalifa, Mohamed Saleh
Published: (2015)
by: Khalifa, Mohamed Saleh
Published: (2015)
Semi-analytical BER performance of a direct detection soliton transmission system
by: Abbou, F. M., et al.
Published: (2006)
by: Abbou, F. M., et al.
Published: (2006)
Performance evaluation for different intrusion detection system algorithms using machine learning
by: Zarir, Mustafa Nadhim
Published: (2018)
by: Zarir, Mustafa Nadhim
Published: (2018)
A technique to improve optical time division multiplexing - wavelength division multiplexing performance
by: Hiew, C. C., et al.
Published: (2005)
by: Hiew, C. C., et al.
Published: (2005)
Multi slot amplitude coding technique for high speed optical fiber communication system
by: Talib, Rahmat
Published: (2015)
by: Talib, Rahmat
Published: (2015)
A new partitioning scheme for PTS technique to improve the PAPR performance in OFDM systems
by: Al-Jawhar, Yasir Amer, et al.
Published: (2018)
by: Al-Jawhar, Yasir Amer, et al.
Published: (2018)
Crosstalk suppression techniques for multi-channel regeneration based on fiber optic parametic amplifier
by: Ibrahim, Nor Zaidatun Nadrah
Published: (2015)
by: Ibrahim, Nor Zaidatun Nadrah
Published: (2015)
Active Queue Management Using Non-Linear Adaptive Random Early Detection Mechanism
by: Ng, Boon Kiong
Published: (2006)
by: Ng, Boon Kiong
Published: (2006)
A new approach for jpeg fragmentation point detection using sequential difference by segment (SDbS)
by: T Azmi, Tengku Norsuhaila
Published: (2019)
by: T Azmi, Tengku Norsuhaila
Published: (2019)
Propose a new Firefly-Fast Learning Network
model based Intrusion-Detection System
by: Badran, Mohammed Falih, et al.
Published: (2019)
by: Badran, Mohammed Falih, et al.
Published: (2019)
Development of computer aided design system based on artificial neural network for macular hole detection
by: Jayapalan, Mohana Phriya
Published: (2021)
by: Jayapalan, Mohana Phriya
Published: (2021)
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
by: Ayodele Nojeem, Lasisi
Published: (2018)
by: Ayodele Nojeem, Lasisi
Published: (2018)
High voltage gain DC-DC converter using interleaved switching technique with PWM for current stress
by: Abd Samat, Mohd Nasri
Published: (2019)
by: Abd Samat, Mohd Nasri
Published: (2019)
Study On Signature-Based Network Intrusion Detection System For High-Speed Network Using Network Processing Unit (NPU)
by: Salim, Robin
Published: (2007)
by: Salim, Robin
Published: (2007)
Electromagnetic radiation level detection and monitoring system for triple band GSM signal using calculable antenna factor method
by: Nor Rahim, Puteri Alifah Ilyana
Published: (2018)
by: Nor Rahim, Puteri Alifah Ilyana
Published: (2018)
Internet of things (IoT); security requirements, attacks and counter measures
by: Imdad, Maria, et al.
Published: (2020)
by: Imdad, Maria, et al.
Published: (2020)
Strategic Implications Of Multimedia Messaging Services (MMS) : Identifying The Opportunities
by: Wu, Chin Gang
Published: (2005)
by: Wu, Chin Gang
Published: (2005)
Similar Items
-
A comprehensive study of distributed denial of service attack with the detection techniques
by: Ibrahim, Husam Hamid
Published: (2018) -
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021) -
Understanding the root of attack in android malware
by: Romli, Rahiwan Nazar, et al.
Published: (2018) -
Frequency hopping using CDMA to avoid malicious attack in han networks
by: Ridha, Hussein Ali
Published: (2020) -
Machine learning techniques to detect bleeding frame and area in wireless capsule endoscopy video
by: Vajravelua, Ashok, et al.
Published: (2023)