Search Results - (( (programme OR program) attack detection algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An Intelligence Technique For Denial Of Service (Dos) Attack Detection by Wan Nurul Safawati, Wan Manan, Tuan Muhammad, Safiuddin

    Published 2017
    “…Special features of connection records have been acknowledged to be used in DoS attacks. The result from this experiment will show the effectiveness of Neural Network using the backpropagation learning algorithm for detecting DoS attack.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    An intelligence technique for denial of service (DoS) attack detection by Wan Nurulsafawati, Wan Manan, Tuan Muhammad, Safiuddin, Zarina, Dzolkhifli, Mohd Hafiz, Mohd Hassin

    Published 2018
    “…Special features of connection records have been acknowledged to be used in DoS attacks. The result from this experiment will show the effectiveness of Neural Network using the backpropagation learning algorithm for detecting DoS attack.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller by Aladaileh, Mohammad Adnan Ahmad

    Published 2021
    “…GEADDDC generalizes the Renyi Joint Entropy algorithm and uses a dynamic threshold to detect DDoS attacks on the SDN controller.…”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Unprecedented smart algorithm for uninterrupted SDN services during DDoS attack by Muhammad Reazul Haque, Saw, Chin Tan, Zulfadzli Yusoff, Kashif Nisar, Rizaludin Kaspin, Iram Haider, Sana Nisar, Rodrigues, J. P. C., Bhawani Shankar Chowdhry, Muhammad Aslam Uqaili, Satya Prasad Majumder, Danda B. Rawat, Etengu, Richard, Rajkumar Buyya

    Published 2021
    “…Nevertheless, it creates a significant loophole for the manifestation of a distributed denial of service (DDoS) attack straightforwardly. Furthermore, recently a Distributed Reflected Denial of Service (DRDoS) attack, an unusual DDoS attack, has been detected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…Likewise, the soft programmable switches that are directly connected to the controller running atop end host servers are attractive targets for attackers to initiate control plane flooding; apart from authorized but untrusted hosts. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…In this research, Two-Phase Authentication of Attack Detection (TPAAD) scheme is proposed and investigated for detection and mitigation of DoS attacks in SDN to increase the performance of the above-mentioned issues. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Designing a New Model for Worm Response Using Security Metrics by Madihah Mohd Saudi, Taib, BM

    Published 2024
    “…Once the user's computer detects any indication of the worm attacks, the apoptosis is triggered. …”
    Proceedings Paper
  13. 13
  14. 14
  15. 15

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
    Proceedings Paper
  18. 18
  19. 19

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector by Abdulkader, Zaid A.

    Published 2018
    “…The OMNET++ simulation program is used to justify the proposed algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis