An implementation of LoSS detection using SOSS model
Recent studies have shown that malicious Internet traffic such as Denial of Service (DoS) packets introduces distribution error and perturbs the self-similarity property of network traffic. As a result, Loss of Self-Similarity (LoSS) is detected due to the abnormal traffic packets hence degrading th...
| Main Authors: | Rohani, M.F, Maarof, M.A., Selamat, A., Kettani, H. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTM Press
2007
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/5603/ http://eprints.utm.my/5603/1/MohdFoad_Rohani12007_AnIimplementationofLoSSDetection.pdf |
Similar Items
Uncovering anomaly traffic based on loss of self-similarity behavior using second order statistical model
by: Rohani, M. F., et al.
Published: (2007)
by: Rohani, M. F., et al.
Published: (2007)
Implementation of a DS-SS CDMA transmitter and receiver
by: Sharif, Md. Raihan, et al.
Published: (2011)
by: Sharif, Md. Raihan, et al.
Published: (2011)
Decision Support System Framework for Implementation of Enterprise Resource Planning (ERP) System
by: Khalil, M.A.T., et al.
Published: (2010)
by: Khalil, M.A.T., et al.
Published: (2010)
extending our sense of cyberspace language plurality: the value of the language observatory (LO) project
by: Abd. Rozan, Mohd. Zaidi, et al.
Published: (2005)
by: Abd. Rozan, Mohd. Zaidi, et al.
Published: (2005)
The Role of Factors in Business-to-Business E-Procurement Implementation
by: Naseebullah, M., et al.
Published: (2010)
by: Naseebullah, M., et al.
Published: (2010)
Improvements Over Two Phase Shortest Path Algorithm
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Handover enhancement in IP mobility for 6LoWPAN scenario
by: Abdulrahman, Ahmed Faris
Published: (2016)
by: Abdulrahman, Ahmed Faris
Published: (2016)
Recommendation of meals and restaurant's location based on body mass index (MerLO) / Nusyasya Fizani M Halizan
by: M Halizan, Nusyasya Fizani
Published: (2019)
by: M Halizan, Nusyasya Fizani
Published: (2019)
Security awareness: A lesson from Tcpdump and Ethereal
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
SAISMS : Transforming ammunition management through loT-enabled inventory and safety monitoring system
by: Mohammad Faris, Mahdhir, et al.
Published: (2023)
by: Mohammad Faris, Mahdhir, et al.
Published: (2023)
Congestive Loss in Wireless Ad hoc Network: Network Performance Analysis
by: Nahar, H., et al.
Published: (2011)
by: Nahar, H., et al.
Published: (2011)
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009)
by: Safdar, S., et al.
Published: (2009)
A O(|E|) Time Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Client’s Perspective: Realization as a New Generation Process for Software Project Development and Management
by: Akbar, R., et al.
Published: (2010)
by: Akbar, R., et al.
Published: (2010)
Analysis and design of intrusion detection system implementation / Chia Fook Keong
by: Chia, Fook Keong
Published: (2003)
by: Chia, Fook Keong
Published: (2003)
Detailed Sunyaev-Zel'dovich study with AMI of 19 LoCuSS galazy clusters: masses and temperatures out to the virial radius
by: Rodriguez-Gonzalvez, C., et al.
Published: (2012)
by: Rodriguez-Gonzalvez, C., et al.
Published: (2012)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
An Edge-Wise Linear Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Authentication Model Based on Reformation Mapping Method
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Coordinated Constraint Relaxation Using a
Distributed Agent Protocol
by: Hassan, M.F.
Published: (2007)
by: Hassan, M.F.
Published: (2007)
The optimization of stepping stone detection: packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Rough Set Discretize Classification of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Framework for Alternate Execution of Workflows Under Threat
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs
by: Qureshi, MA., et al.
Published: (2010)
by: Qureshi, MA., et al.
Published: (2010)
Interaction Protocol For Agent-Based E-Learning System
by: Latif, N.A., et al.
Published: (2009)
by: Latif, N.A., et al.
Published: (2009)
Automated Notification and Document Downloading in E-Learning –
Development of an Agent-Based Framework Utilizing the Push-Pull
Technology Interaction Policy
by: Latif, N.A., et al.
Published: (2008)
by: Latif, N.A., et al.
Published: (2008)
Utilizing Electronic Institution For Protocol Specification In Agent-Based E-Learning System
by: Latif, N.A., et al.
Published: (2009)
by: Latif, N.A., et al.
Published: (2009)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Development of Simulation Environment for Agent Interaction Protocol
by: Latif, N.A., et al.
Published: (2010)
by: Latif, N.A., et al.
Published: (2010)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Ensemble based categorization and adaptive model for malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
Rough Set Significant Reduct and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
Theoretical Framework of the Effect of Extrinsic Rewards and Individual's Intrinsic Attributes on Knowledge Sharing Behavior
by: Amin, A., et al.
Published: (2009)
by: Amin, A., et al.
Published: (2009)
Two-Step Implementation of Sigmoid Function for Artificial Neural Network in Field Programmable Gate Array
by: Syahrulanuar, Ngah, et al.
Published: (2014)
by: Syahrulanuar, Ngah, et al.
Published: (2014)
A framework for non-contact ECG signal detection device on smart chair and its implementation
by: Wali, Tuerxun, et al.
Published: (2015)
by: Wali, Tuerxun, et al.
Published: (2015)
Towards the implementation of energy harvesting for IoT sensor nodes in an early warning flood detection system
by: Mohd Yazid, Mohd Aizat, et al.
Published: (2020)
by: Mohd Yazid, Mohd Aizat, et al.
Published: (2020)
Solving time gap problems through the optimization of detecting stepping stone algorithm
by: Omar, Mohd. Nizam, et al.
Published: (2004)
by: Omar, Mohd. Nizam, et al.
Published: (2004)
Similar Items
-
Uncovering anomaly traffic based on loss of self-similarity behavior using second order statistical model
by: Rohani, M. F., et al.
Published: (2007) -
Implementation of a DS-SS CDMA transmitter and receiver
by: Sharif, Md. Raihan, et al.
Published: (2011) -
Decision Support System Framework for Implementation of Enterprise Resource Planning (ERP) System
by: Khalil, M.A.T., et al.
Published: (2010) -
extending our sense of cyberspace language plurality: the value of the language observatory (LO) project
by: Abd. Rozan, Mohd. Zaidi, et al.
Published: (2005) -
The Role of Factors in Business-to-Business E-Procurement Implementation
by: Naseebullah, M., et al.
Published: (2010)