The optimization of stepping stone detection: packet capturing steps
This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. The aim of the research is to improve the packet capturing step in stepping stone algorithm, thus, improve the response from overall detection and response sy...
| Main Authors: | Omar, Mohd. Nizam, Maarof, Mond. Aizaini, Zainal, Anazida |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTM Press
2006
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3050/ http://eprints.utm.my/3050/1/MohdAzainiMaarof2006_TheOptimizationofSteppingStoneDetectionPacket.pdf |
Similar Items
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
Solving time gap problems through the optimization of detecting stepping stone algorithm
by: Omar, Mohd. Nizam, et al.
Published: (2004)
by: Omar, Mohd. Nizam, et al.
Published: (2004)
The optimization of stepping stone detection: Packet capturing steps
by: Omar, Mohd Nizam, et al.
Published: (2006)
by: Omar, Mohd Nizam, et al.
Published: (2006)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Ensemble based categorization and adaptive model for malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
Detecting backdoor using stepping stone detection approach
by: Alminshid, Khalid, et al.
Published: (2013)
by: Alminshid, Khalid, et al.
Published: (2013)
Evolution of stepping stone detection and emerging applications
by: Omar, Mohd Nizam, et al.
Published: (2012)
by: Omar, Mohd Nizam, et al.
Published: (2012)
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)
by: Zainal, Anazida, et al.
Published: (2005)
Finding granular features using rough-PSO in IDS
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
A stepping stone perspective to detection of network threats
by: Omar, Mohd Nizam, et al.
Published: (2013)
by: Omar, Mohd Nizam, et al.
Published: (2013)
Stepping-stone detection technique for recognizing legitimate and attack connections
by: Daud, Ali Yusny, et al.
Published: (2015)
by: Daud, Ali Yusny, et al.
Published: (2015)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Software Based Scalable Packet
Capture Mechanism To Reduce
Packet Loss
by: Alias, Syazwina
Published: (2019)
by: Alias, Syazwina
Published: (2019)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Intrusion detection system : a step ahead in protecting e-commerce security infrastucture
by: Zakaria, Nur Haryani
Published: (2002)
by: Zakaria, Nur Haryani
Published: (2002)
C++ programming: step by step
Published: (2011)
Published: (2011)
Two-Step Implementation of Sigmoid Function for Artificial Neural Network in Field Programmable Gate Array
by: Syahrulanuar, Ngah, et al.
Published: (2014)
by: Syahrulanuar, Ngah, et al.
Published: (2014)
Two-Steps Implementation of Sigmoid Function for Artificial Neural Network in Field Programmable Gate Array
by: Syahrulanuar, Ngah, et al.
Published: (2016)
by: Syahrulanuar, Ngah, et al.
Published: (2016)
Packet sniffer & analyzer / Ong Khoon Kok
by: Ong , Khoon Kok
Published: (2000)
by: Ong , Khoon Kok
Published: (2000)
Packet sniffer and analyzer / Zarina Mohamed Alias
by: Zarina, Mohamed Alias
Published: (2005)
by: Zarina, Mohamed Alias
Published: (2005)
A Multi-objective Evolutionary Algorithm Based On Decomposition For Continuous Optimization Using A Step-function Technique
by: Chuah, How Siang
Published: (2022)
by: Chuah, How Siang
Published: (2022)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
The VANET-Solution Approach for Data Packet Forwarding Improvement
by: Hammood, Omar A., et al.
Published: (2018)
by: Hammood, Omar A., et al.
Published: (2018)
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007)
by: Idris, Mohd. Yazid, et al.
Published: (2007)
An effective transmit packet coding with trust-based relay nodes in VANETs
by: Hammood, Omar A., et al.
Published: (2020)
by: Hammood, Omar A., et al.
Published: (2020)
Enhance video quality through VANET based on Transmit Packet Coding (TPC)
by: Hammood, Omar A., et al.
Published: (2018)
by: Hammood, Omar A., et al.
Published: (2018)
Packet sniffing system / Chan Hai Chai
by: Chan , Hai Chai
Published: (2005)
by: Chan , Hai Chai
Published: (2005)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Similar Items
-
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006) -
Solving time gap problems through the optimization of detecting stepping stone algorithm
by: Omar, Mohd. Nizam, et al.
Published: (2004) -
The optimization of stepping stone detection: Packet capturing steps
by: Omar, Mohd Nizam, et al.
Published: (2006) -
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al. -
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)