Detecting TCP SYN flood attack based on anomaly detection
Link to publisher's homepage at http://ieeexplore.ieee.org/
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Working Paper |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2011
|
Subjects: | |
Online Access: | http://dspace.unimap.edu.my/xmlui/handle/123456789/10455 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.unimap-10455 |
---|---|
record_format |
dspace |
spelling |
my.unimap-104552011-01-10T08:19:53Z Detecting TCP SYN flood attack based on anomaly detection Siti Hajar, C. Haris R. Badlishah, Ahmad Dr. Mohd Alif Hasmani, Abd Ghani shajar_charis@yahoo.com badli@unimap.edu.my alifhasmani@unimap.edu.my Transmission Control Protocol (TCP) Synchronized (SYN) Flood Anomaly detection Link to publisher's homepage at http://ieeexplore.ieee.org/ The adsorption of Cu, Cd, Ni, Zn, and Cr from synthetic solutions on powdered activated carbon (PAC), activated sludge, and dried sludge were investigated under laboratory conditions to assess its ability to remove heavy metals. The adsorption efficiency increased rapidly within the first 30 min and then slowed down as it approached a steady state after 5 h of contact time. The results showed that activated sludge and PAC had a higher adsorption capacity than dried sludge. However, PAC showed a better adsorption capacity for Cu, Zn, and Ni than activated sludge. The maximum adsorption capacity, as quantified by the Langmuir parameter Q for activated sludge was 44, 30, 24, 23, and 18 mg/g for Cu, Ni, Cd, Cr, and Zn, respectively. In the case of dried sludge, the respective values of Q were 20, 13, 11,3, and 10 mg/g. The acute toxicity of these five heavy metals to the activated sludge microorganisms was determined on the basis of the reduction in the specific oxygen uptake rate (SOUR). The results obtained from the SOUR measurements indicated a decreasing toxicity scale, Cu > Cd > Ni ∼ Cr > Zn on activated sludge microorganisms. 2011-01-10T08:19:53Z 2011-01-10T08:19:53Z 2010-09-22 Working Paper p. 240-244 978-1-4244-8048-7 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5635797&tag=1 http://hdl.handle.net/123456789/10455 en Proceedings of the 2nd International Conference on Network Applications, Protocols and Services (NETAPPS) 2010 Institute of Electrical and Electronics Engineers (IEEE) |
institution |
Universiti Malaysia Perlis |
building |
UniMAP Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Perlis |
content_source |
UniMAP Library Digital Repository |
url_provider |
http://dspace.unimap.edu.my/ |
language |
English |
topic |
Transmission Control Protocol (TCP) Synchronized (SYN) Flood Anomaly detection |
spellingShingle |
Transmission Control Protocol (TCP) Synchronized (SYN) Flood Anomaly detection Siti Hajar, C. Haris R. Badlishah, Ahmad Dr. Mohd Alif Hasmani, Abd Ghani Detecting TCP SYN flood attack based on anomaly detection |
description |
Link to publisher's homepage at http://ieeexplore.ieee.org/ |
author2 |
shajar_charis@yahoo.com |
author_facet |
shajar_charis@yahoo.com Siti Hajar, C. Haris R. Badlishah, Ahmad Dr. Mohd Alif Hasmani, Abd Ghani |
format |
Working Paper |
author |
Siti Hajar, C. Haris R. Badlishah, Ahmad Dr. Mohd Alif Hasmani, Abd Ghani |
author_sort |
Siti Hajar, C. Haris |
title |
Detecting TCP SYN flood attack based on anomaly detection |
title_short |
Detecting TCP SYN flood attack based on anomaly detection |
title_full |
Detecting TCP SYN flood attack based on anomaly detection |
title_fullStr |
Detecting TCP SYN flood attack based on anomaly detection |
title_full_unstemmed |
Detecting TCP SYN flood attack based on anomaly detection |
title_sort |
detecting tcp syn flood attack based on anomaly detection |
publisher |
Institute of Electrical and Electronics Engineers (IEEE) |
publishDate |
2011 |
url |
http://dspace.unimap.edu.my/xmlui/handle/123456789/10455 |
_version_ |
1643789908257538048 |
score |
13.214268 |