Security awareness: A lesson from Tcpdump and Ethereal
Ethernet has survived for several decades as essential media for LAN technology because of its relative inexpensive and reasonably fast. Shared Ethernet uses broadcast technology where CSMA/CD acts as medium access control. CSMA/CD deploys principle of media sharing and the drawback is promiscuous...
| Main Authors: | Rohani, Mohd. Fo’ad, Maarof, Mohd. Aizaini, Selamat, Ali |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/5608/ http://eprints.utm.my/5608/1/Foad2005_SecurityAwarenessLessonTcpdumpEthereal.pdf |
Similar Items
Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Evaluating Cyber Security Awareness Levels For Employees In DRB-Hicom Auto Solutions
by: Mohd Fadli Kasim,
Published: (2021)
by: Mohd Fadli Kasim,
Published: (2021)
Computer security and ethics awareness among IIUM students: an empirical study
by: Aliyu, Mansur, et al.
Published: (2010)
by: Aliyu, Mansur, et al.
Published: (2010)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
The optimization of stepping stone detection: Packet capturing steps
by: Omar, Mohd Nizam, et al.
Published: (2006)
by: Omar, Mohd Nizam, et al.
Published: (2006)
Solving time gap problems through the optimization of detecting stepping stone algorithm
by: Omar, Mohd. Nizam, et al.
Published: (2004)
by: Omar, Mohd. Nizam, et al.
Published: (2004)
Multi-Scale Skin Sample Approach for Dynamic Skin Color Detection: An Analysis
by: Mohd Zamri, Osman, et al.
Published: (2018)
by: Mohd Zamri, Osman, et al.
Published: (2018)
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)
by: Zainal, Anazida, et al.
Published: (2005)
Avalanche Analysis of Extended Feistel Network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
The optimization of stepping stone detection: packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Finding granular features using rough-PSO in IDS
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007)
by: Idris, Mohd. Yazid, et al.
Published: (2007)
User access control and security model
by: Crysdian, Cahyo, et al.
Published: (2000)
by: Crysdian, Cahyo, et al.
Published: (2000)
A multi-color based features from facial images for automatic ethnicity identification model
by: Mohd Zamri, Osman, et al.
Published: (2019)
by: Mohd Zamri, Osman, et al.
Published: (2019)
Ensemble based categorization and adaptive model for malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Automated web pages classification with integration of principal component analysis (PCA) and independent component analysis (ICA) as feature reduction
by: Sam, Lee Zhi, et al.
Published: (2006)
by: Sam, Lee Zhi, et al.
Published: (2006)
Automated web pages classification with independent component analysis
by: Sam, Lee Zhi, et al.
Published: (2006)
by: Sam, Lee Zhi, et al.
Published: (2006)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
A friend mechanism for mobile ad hoc networks
by: Abd. Razak, Shukor, et al.
Published: (2008)
by: Abd. Razak, Shukor, et al.
Published: (2008)
Uncovering anomaly traffic based on loss of self-similarity behavior using second order statistical model
by: Rohani, M. F., et al.
Published: (2007)
by: Rohani, M. F., et al.
Published: (2007)
An implementation of LoSS detection using SOSS model
by: Rohani, M.F, et al.
Published: (2007)
by: Rohani, M.F, et al.
Published: (2007)
Knowledge management (KM) framework for representing lessons learned Malaysian
by: Ahmad, Mohd. Nazir, et al.
Published: (2004)
by: Ahmad, Mohd. Nazir, et al.
Published: (2004)
Implementation and recent progress in cloud-based smart home automation systems
by: Katuk, Norliza, et al.
Published: (2018)
by: Katuk, Norliza, et al.
Published: (2018)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Similar Items
-
Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant
by: Rohani, Mohd. Fo'ad, et al.
Published: (2006) -
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023) -
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005) -
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005) -
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005)