Search Results - "DARPA"

Refine Results
  1. 1

    Identification of distributed denial of services anomalies by using combination of entropy and sequential probabilities ratio test methods by Ali, Basheer Husham, Sulaiman, Nasri, Al-Haddad, Syed Abdul Rahman, Atan, Rodziah, Mohd Hassan, Siti Lailatul, Alghrairi, Mokhalad Khaleel

    Published 2021
    “…The Defense Advanced Research Projects Agency (DARPA) 1998, DARPA2000, and Canadian Institute for Cybersecurity (CIC-DDoS2019) databases were used to evaluate the implementation of this method. …”
    Get full text
    Get full text
  2. 2

    Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload by Kakavand, Mohsen, Mustapha, Norwati, Mustapha, Aida, Abdullah @ Selimun, Mohd Taufik

    Published 2016
    “…The proposed approach was assessed using HTTP packet payload of ISCX 2012 IDS and DARPA 1999 dataset. The experimental outcome demonstrated that our proposed anomaly detection achieved promising results with 97% detection rate with 1.2% false positive rate for ISCX 2012 dataset and 100% detection rate with 0.06% false positive rate for DARPA 1999 dataset. …”
    Get full text
    Get full text
  3. 3

    Anomaly behavior detection using flexible packet filtering and support vector machine algorithms by Abdul Wahid, Mohammed N.

    Published 2016
    “…The proposed FPFaSVM method and TAaM depending on the network traffic analyzer to capture and analyze the network traffics, and a special technique that detects anomalies while monitoring network traffics have been proposed by both methods using DARPA 99 dataset and real environments. The Entropy and SVM (EaSVM) is relying on DARPA 99 dataset for analyzing the captured traffics based on anomalies and the use of SVM is to classify the entropy values of the data traffic into normal and abnormal behavior for more accurate results. …”
    Get full text
    Get full text
  4. 4

    Improved hybrid intelligent intrusion detection system using AI technique by Shanmugam, Bharanidharan, Idris, Norbik Bashah

    Published 2007
    “…Simple fuzzy rules allow us to construct if-then rules that reflect common ways of describing security attacks. We use DARPA dataset for training and benchmarking…”
    Get full text
  5. 5

    A Havelock source panel method for near-surface submarines by Gourlay, Tim, Dawson, E.

    Published 2015
    “…Comparisons are made with model tests for wave resistance of Series 58 and DARPA SUBOFF hulls, as well as with wave resistance, lift force and trim moment of three length-to-diameter variants of the DSTO Joubert submarine hull. …”
    Get full text
  6. 6

    To identify suspicious activity in anomaly detection based on soft computing by Chimphlee, Witcha, Sap, M., Abdullah, Abdul Hanan, Chimphlee, Siriporn, Srinoy, Surat

    Published 2006
    “…Empirical studies using the network security data set from the DARPA 1998 offline intrusion detection project (KDD 1999 Cup) show the feasibility of misuse and anomaly detection results.…”
    Get full text
  7. 7

    A naturally inspired statistical intrusion detection model by Mahboubian, Mohammad, Udzir, Nur Izura

    Published 2013
    “…The model is examined with DARPA data set which is famous among IDS researchers. …”
    Get full text
    Get full text
  8. 8

    Anomaly network intrusion detection method in network security based on principle component analysis by Chimphlee, Witcha, Md Sap, Mohd Noor, Abdullah, Abdul Hanan, Chimphlee, Siriporn

    Published 2006
    “…Based on the preliminary analysis using a set of benchmark data from KDD (Knowledge Discovery and Data Mining) Competition designed by DARPA, PCA demonstrates the ability to reduce huge dimensional data into a lower dimensional subspace without losing important information. …”
    Get full text
    Get full text
  9. 9

    Finding granular features using rough-PSO in IDS by Zainal, Anazida, Maarof, Mohd. Aizaini, Shamsuddin, Siti Mariyam

    Published 2007
    “…Data used in this experiment was originally obtained from dataset created by DARPA in the framework ofthe 1998 Intrusion Detection Evaluation Program. …”
    Get full text
    Get full text
  10. 10

    An intelligence technique for denial of service (DoS) attack detection by Wan Nurulsafawati, Wan Manan, Tuan Muhammad, Safiuddin, Zarina, Dzolkhifli, Mohd Hafiz, Mohd Hassin

    Published 2018
    “…The data used in training and testing was KDD 99 data set based on the Defense Advanced Research Projects Agency (DARPA) intrusion detection programme, which is publicly accessible by Lincoln Labs. …”
    Get full text
    Get full text
  11. 11

    An Intelligence Technique For Denial Of Service (Dos) Attack Detection by Wan Nurul Safawati, Wan Manan, Tuan Muhammad, Safiuddin

    Published 2017
    “…The data used in training and testing was KDD 99 data set based on the Defense Advanced Research Projects Agency (DARPA) intrusion detection programme, which is publicly accessible by Lincoln Labs. …”
    Get full text
    Get full text
  12. 12

    Packet header anomaly detection using statistical analysis by Yassin, Warusia, Udzir, Nur Izura, Abdullah, Azizol, Abdullah @ Selimun, Mohd Taufik, Muda, Zaiton, Zulzalil, Hazura

    Published 2014
    “…The experiment validate that HbPHAD is effectively in correctly detecting suspicious packet at above 90% as an intrusion detection rate for both ISCX 2012 and is capable to detect 40 attack types from DARPA 1999 benchmark dataset.…”
    Get full text
  13. 13

    Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant by Rohani, Mohd. Fo'ad, Maarof, Mohd. Aizaini, Selamat, Ali

    Published 2006
    “…These changes in the LRD function and Energy Invariant therefore can give direction of developing more robust network anomaly detection. We use benchmark DARPA for our data testing. From the experiments we categorize the QoS impact into three categories: increase LRD, imitate LRD and decrease LRD.…”
    Get full text
    Get full text
  14. 14

    Signature-based anomaly intrusion detection using integrated data mining classifiers by Yassin, Warusia, Udzir, Nur Izura, Abdullah, Azizol, Abdullah @ Selimun, Mohd Taufik, Zulzalil, Hazura, Muda, Zaiton

    Published 2014
    “…Results from a number of experiments using DARPA 1999 and ISCX 2012 benchmark dataset have validated that SADS own better detection capabilities with lower processing duration as contrast to conventional anomaly-based detection method.…”
    Get full text
    Get full text
  15. 15

    Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means by Chimphlee, Witcha, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan, Chimphlee, Siriporn

    Published 2005
    “…Experiments were performed with DARPA data sets, which have information on computer networks, during normal behavior and intrusive behavior.…”
    Get full text
    Get full text
  16. 16

    A study into the need for legal measures against blogging in Malaysia / Siti Nursarah Saroni, Sofia Shereen Kambali, Syahrulfaizi Adli Md Desa by Saroni, Siti Nursarah, Kambali, Sofia Shereen, Md Desa, Syahrulfaizi Adli

    Published 2007
    “…The Internet is originated from the United States which was developed in 1962 by the United States Defence Advanced Research Projects Agency (DARPA).1 This was called the Intemeting project and the system of networks, which emerged from the research, later it was known as the "Internet" Malaysia has launched its Multimedia Super Corridor3 project (hereinafter as MSC) by the former Prime Minister Tun Mahathir Mohamed in 1999. …”
    Get full text
  17. 17

    DDoS detection using active and idle features of revised CICFlowMeter and statistical approaches by Ali, Basheer Husham, Sulaiman, Nasri, Al-Haddad, S. A. R., Atan, Rodziah, Mohd Hassan, Siti Lailatul

    Published 2022
    “…The problems of original CICFlowMeter were presented, and the differences between original and revised version of CICFlowMeter tool were explored. The DARPA database and confusion matrix were used to evaluate the detection technique and present the comparison between two versions of CICFlowMeter. …”
    Get full text
  18. 18

    A framework for multiple moving objects detection in aerial videos by Kalantar, Bahareh, Abdul Halin, Alfian, Al-Najjar, Husam Abdulrasool H., Mansor, Shattri, Genderen, John L. Van, M. Shafri, Helmi Zulhaidi, Zand, Mohsen

    Published 2019
    “…Two datasets, namely (1) the DARPA-VIVID dataset and (2) self-captured videos using an unmanned aerial vehicle-mounted camera, have been used to validate the feasibility of MDMRBF. …”
    Get full text
    Get full text
  19. 19

    Development of an optimal dragonfly-like flapping wing structure for use in biomimetic micro air vehicles / Praveena Nair Sivasankaran by Praveena Nair, Sivasankaran

    Published 2016
    “…They were first defined by the US Defense Advanced Research Projects Agency (DARPA) in 1997 as unmanned aircraft that are less than 15 cm in any dimension. …”
    Get full text
    Get full text
  20. 20

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…MDMRBF has been evaluated against two datasets namely the (i) Defense Advanced Research Projects Agency (DARPA) Video Verification of Identity (VIVID) dataset and (ii) two self-captured videos using a mounted camera on a UAV. …”
    Get full text
    Get full text