Search Results - (( aiming attack detection algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Owing to the distributed nature of modern attacks (e.g. denial-of-service), it is extremely challenging to detect such malicious behaviour using traditional intrusion detection systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The "Remote to Local (R2L) Intrusion Detection System Using Decision Tree" project aims to address the escalating threat of network intrusions by developing an effective intrusion detection system. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Tole, Sutikno, Shahreen, Kasim, Rohayanti, Hassan, Zalmiyah, Zakaria, Mohd Saberi, Mohamad

    Published 2021
    “…The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. …”
    Get full text
    Get full text
    Article
  7. 7

    Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System by Ahmad, A, Zainuddin, WS, Kama, MN, Idris, NB, Saudi, MM

    Published 2024
    “…Cloud implementations also introduce a new term, "co-residency" attack and lack of research focusing on detecting this type of attack. …”
    Proceedings Paper
  8. 8

    Cloud co-residency denial of service threat detection inspired by artificial immune system by Ahmad, Azuan, Zainudin, Wan Shafiuddin, Kama, Mohd Nazri, Idris, Norbik Bashah, Mohd Saudi, Madihah

    Published 2018
    “…Cloud implementations also introduce a new term, "co-residency" attack and lack of research focusing on detecting this type of attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Design and analysis of an early heart attack detection using openCV by Muhammad Rafsanjani, Basri, Fahmi, Samsuri

    Published 2022
    “…Early detection of heart attack symptoms is a crucial part of treatment at the moment. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…A great deal of attention has been recently paid to anomaly detection to accomplish intrusion detection. However, a major problem with this approach is maximizing detection rate and accuracy, as well as minimizing false alarm i.e., inability to correctly discover particular types of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Performance evaluation for different intrusion detection system algorithms using machine learning by Zarir, Mustafa Nadhim

    Published 2018
    “…The aim of the Intrusion Detection System (IDS) is to monitor the network system for any sort of attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan by Mazlan, Muhammad Muhaimin Aiman

    Published 2018
    “…The software will be trained by using NSL KDD Cup dataset in order to make it learns about the Neptune attack and as a result, it will be able to detect and prevent such attack. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Social engineering exploitation detection (SEED) in Malaysia's SMEs using machine learning by Sia, Ken Yen

    Published 2022
    “…This project aims at building a model that is based on another popular field which is machine learning in detecting attacks. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18
  19. 19

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Bio-inspired for Features Optimization and Malware Detection by Mohd Faizal, Ab Razak, Nor Badrul, Anuar, Fazidah, Othman, Ahmad, Firdaus, Firdaus, Afifi, Rosli, Salleh

    Published 2018
    “…This paper aims to evaluate the effectiveness of the machine learning approach for detecting Android malware. …”
    Get full text
    Get full text
    Get full text
    Article