Search Results - (( timing attack detection algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- java simulation »
- timing »
-
1
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…Proposed real-time training dataset for SVM algorithm achieved highest detection rate of 99.13% while decision tree and Naïve Bayes has 93.28% & 86.41% of attack detection rate, respectively. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
3
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
4
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…The quantitative results acquired from the experiments are benchmarked with corresponding results acquired from the cooperative attack detection scheme. Through the result comparisons, we demonstrate the significance of cooperative detection mechanism, for detecting distributed denial of service attacks in a timely and energy-efficient manner, accuracy of detection and defence, as well as false alarm rate.…”
Get full text
Get full text
Thesis -
5
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The proposed attack graph reduced the generation time by 20 percent and the attack graph complexity.…”
Get full text
Get full text
Get full text
Get full text
Article -
6
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…The Controller Area Network (CAN), which is a protocol for the in-vehicle network, is lacking in security features, making the CAN bus vulnerable to a range of cyberattacks such as message injections, replay attacks, and denial of service attacks. This has prompted researchers to develop statistical and machine learning based intrusion detection systems for the CAN bus that use various features such as message timing and frequency to detect attacks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…The proposed attack graph reduced the generation time by 20% and the attack graph complexity. …”
Get full text
Get full text
Get full text
Thesis -
8
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Hence, the detection of network attacks on computer systems has remain a relevant field of research for some time. …”
Get full text
Get full text
Thesis -
9
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
10
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
11
Intrusion detection on the in-vehicle network using machine learning
Published 2021“…This paper presents an intrusion detection method based on the Isolation Forest (iForest) algorithm that detects message insertion attacks using message timing information. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
13
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…Cloud implementations also introduce a new term, "co-residency" attack and lack of research focusing on detecting this type of attack. …”
Proceedings Paper -
14
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…Many phishing detection methods, ranging from blacklists, heuristics and visual similarity to machine learning are used to detect phishing attacks for spam emails, machine learning approaches achieve the best phishing email detection results. …”
Get full text
Get full text
Thesis -
15
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018“…Cloud implementations also introduce a new term, "co-residency" attack and lack of research focusing on detecting this type of attack. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
17
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
18
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In particular, issues such as collects real time attack related audit data and cooperative global detection. …”
Get full text
Get full text
Get full text
Thesis -
19
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. The algorithms considered are the Naive Bays Algorithm, Decision Tree Algorithm and Hybrid Algorithm for different datasets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article
