An architectural design for a hybrid intrusion detection system for database
In today's business world, information is the most valuable asset of organizations and thus requires appropriate management and protection. Amongst all types of data repositories, database is said to play the role of the heart in the body of IT infrastructure. On the other hand, nowadays, a gro...
| Main Author: | Haratian, Mohammad Hossein |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/10053/ http://eprints.utm.my/10053/1/MohammadHosseinHaratianMFSKSM2009.pdf |
Similar Items
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
Intrusion detection systems using K-means clustering system
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
Intrusion Response Systems: Foundations, Design, and Challenges
by: Zakira, Inayat, et al.
Published: (2016)
by: Zakira, Inayat, et al.
Published: (2016)
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Improved intrusion detection algorithm based on TLBO and GA algorithms
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
by: Zakira, Inayat, et al.
Published: (2017)
by: Zakira, Inayat, et al.
Published: (2017)
A fast learning network with improved particle swarm optimization for intrusion detection system
by: Ali, Mohammed Hasan
Published: (2019)
by: Ali, Mohammed Hasan
Published: (2019)
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Evaluating oversampling techniques for network intrusion detection data
by: Chan, Jia Lin
Published: (2022)
by: Chan, Jia Lin
Published: (2022)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Intrusion detection using artificial neural network / Gan Sze Kai
by: Gan , Sze Kai
Published: (2002)
by: Gan , Sze Kai
Published: (2002)
A study of database connection pool in microservice architecture
by: Nur Ayuni, Nor Sobri, et al.
Published: (2022)
by: Nur Ayuni, Nor Sobri, et al.
Published: (2022)
Elements of layers and hybridity in architecture: a case study of Central Fire Station, Singapore
by: Rashid, Md. Mizanur
Published: (2011)
by: Rashid, Md. Mizanur
Published: (2011)
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Comparison study of Architectural design elements in major Ethnics of Malaysia
by: Pasupathy S/O, Karthigayan
Published: (2007)
by: Pasupathy S/O, Karthigayan
Published: (2007)
Shariah compliance hospitality design: a Malay Muslim oriented architecture
by: Abdul Majid, Noor Hanita, et al.
Published: (2015)
by: Abdul Majid, Noor Hanita, et al.
Published: (2015)
A comparative study of horizontal and vertical architectural design studio management
by: Abdullah, Fadzidah, et al.
Published: (2010)
by: Abdullah, Fadzidah, et al.
Published: (2010)
A comparative study of horizontal and vertical architectural design studio management in IIUM
by: Abdul Rahim, Asiah, et al.
Published: (2010)
by: Abdul Rahim, Asiah, et al.
Published: (2010)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
by: Adnan, -
Published: (2016)
Database System Model of Tender Management System in Kadastra
by: Noraziah, Ahmad, et al.
Published: (2007)
by: Noraziah, Ahmad, et al.
Published: (2007)
Review of intrusion detection systems based on deep learning
techniques: coherent taxonomy, challenges, motivations,
recommendations, substantial analysis and future directions
by: Aleesa, A. M., et al.
Published: (2004)
by: Aleesa, A. M., et al.
Published: (2004)
Students' trip to the campus: the case of Kuliyyah of Architecture and Environmental Design, IIUM, Malaysia
by: Bachok, Syahriah
Published: (2011)
by: Bachok, Syahriah
Published: (2011)
Qualities in architecture
Published: (2011)
Published: (2011)
Attributes sanitization in object-oriented design to improve database structure
by: Saringat, Mohd Zainuri
Published: (2014)
by: Saringat, Mohd Zainuri
Published: (2014)
Islam and architecture: architectural interpretation from the values of the Al-Quran and Sunnah
by: Yusof, Zeenat Begam
Published: (2011)
by: Yusof, Zeenat Begam
Published: (2011)
Methodologies in architectural research
Published: (2015)
Published: (2015)
The architecture: methods of constructions
by: Ahmad Latifi, Farah Liyana, et al.
Published: (2011)
by: Ahmad Latifi, Farah Liyana, et al.
Published: (2011)
MICIE: A model for identifying and collecting intrusion evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Intrusion detection and prevention of web service attacks for software as a service:Fuzzy association rules vs fuzzy associative patterns
by: Chan, Gaik Yee, et al.
Published: (2016)
by: Chan, Gaik Yee, et al.
Published: (2016)
Islam, architecture & urban planning
by: Omer, Spahic
Published: (2009)
by: Omer, Spahic
Published: (2009)
Similar Items
-
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017) -
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015) -
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008) -
Intrusion detection systems using K-means clustering system
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019) -
Intrusion Response Systems: Foundations, Design, and Challenges
by: Zakira, Inayat, et al.
Published: (2016)