Search Results - (( java implementation using algorithm ) OR ( attack detection software algorithm ))

Refine Results
  1. 1

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks by Akanji, Oluwatobi Shadrach, Abisoye, Opeyemi Aderiike, Iliyasu, Mohammed Awwal

    Published 2021
    “…This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller by Aladaileh, Mohammad Adnan Ahmad

    Published 2021
    “…Thus, this thesis proposes an efficient DDoS attack detection approach called Generalized Entropy-Based Approach with a Dynamic Threshold to Detect DDoS Attacks on Software-Defined Networking Controller (GEADDDC). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Secure address resolution protocol proxy in software defined network by Munther, Munther Numan

    Published 2018
    “…In addition, ARP based attack detection technique combines ARP storm and ARP spoofing detection algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan by Mazlan, Muhammad Muhaimin Aiman

    Published 2018
    “…The software will be trained by using NSL KDD Cup dataset in order to make it learns about the Neptune attack and as a result, it will be able to detect and prevent such attack. …”
    Get full text
    Get full text
    Student Project
  8. 8
  9. 9
  10. 10

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…Software security vulnerabilities have led to many successful attacks on applications, on a daily basis. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network by Najmun, Nisa, Adnan Shahid, Khan, Zeeshan, Ahmed, Najmun, Nisa

    Published 2024
    “…These results confirm that our Two-Phase Authentication for Attack Detection architecture identifies and mitigates SDN DoS attacks with low overhead.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    SVM driven approach for detecting DoS attacks in SDN environment by Najmun, Nisa, Adnan Shahid, Khan, Azman, Bujang Masli, Nusrat, Shaheen

    Published 2025
    “…To address this challenge, we propose a novel approach that efficiently detects DoS attacks by implementing a packet inspection process using a queuing mechanism, followed by machine learning classification using SVM and KNN algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…In this research, Two-Phase Authentication of Attack Detection (TPAAD) scheme is proposed and investigated for detection and mitigation of DoS attacks in SDN to increase the performance of the above-mentioned issues. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Presentation attack detection for face recognition on smartphones: a comprehensive review by Abdul Ghaffar, Idris, Haji Mohd, Mohd Norzali

    Published 2017
    “…Face Presentation Attack Detection through the sensor level technique involved in using additional hardware or sensor to protect recognition system from spoofing while feature level techniques are purely software-based algorithms and analysis. …”
    Get full text
    Get full text
    Article
  19. 19

    Unprecedented smart algorithm for uninterrupted SDN services during DDoS attack by Muhammad Reazul Haque, Saw, Chin Tan, Zulfadzli Yusoff, Kashif Nisar, Rizaludin Kaspin, Iram Haider, Sana Nisar, Rodrigues, J. P. C., Bhawani Shankar Chowdhry, Muhammad Aslam Uqaili, Satya Prasad Majumder, Danda B. Rawat, Etengu, Richard, Rajkumar Buyya

    Published 2021
    “…Nevertheless, it creates a significant loophole for the manifestation of a distributed denial of service (DDoS) attack straightforwardly. Furthermore, recently a Distributed Reflected Denial of Service (DRDoS) attack, an unusual DDoS attack, has been detected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman by Abdul Rahman, Muhammad Faiz Hazim

    Published 2022
    “…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
    Get full text
    Get full text
    Student Project