Intrusion Detection by Port Scan Using Snort
Network intrusion detection systems (NIDS) are an important part of any network security architecture. They provide a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected. Network I...
| Main Author: | Alkhushayni, Suboh Mohammad Shehadah |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/1077/1/Suboh_Mohammad_Alkhushayni.pdf https://etd.uum.edu.my/1077/2/Suboh_Mohammad_Alkhushayni.pdf https://etd.uum.edu.my/1077/ |
| Abstract | Abstract here |
Similar Items
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
by: Jia, Liu
Published: (2024)
by: Jia, Liu
Published: (2024)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
A fast learning network with improved particle swarm optimization for intrusion detection system
by: Ali, Mohammed Hasan
Published: (2019)
by: Ali, Mohammed Hasan
Published: (2019)
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
by: Alaidaros, Hashem Mohammed
Published: (2017)
by: Alaidaros, Hashem Mohammed
Published: (2017)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
by: Adnan, -
Published: (2016)
Analyzing pattern matching algorithms applied on snort intrusion detection system
by: Abdifatah Abdirahman Abdullahi
Published: (2025)
by: Abdifatah Abdirahman Abdullahi
Published: (2025)
Utilizing Snort in the Analysis of Intrusion Detection System
by: Noorulsadiqin Azbiya, Yaacob
Published: (2003)
by: Noorulsadiqin Azbiya, Yaacob
Published: (2003)
Internet information server scanner : scanning on URL vulnerabilities / Tan Yu Jin.
by: Tan, Yu Jin
Published: (2002)
by: Tan, Yu Jin
Published: (2002)
A mean convolution layer for network intrusion detection systems / Leila Mohammadpour
by: Leila , Mohammadpour
Published: (2024)
by: Leila , Mohammadpour
Published: (2024)
A signature based intrusion detection system (IDS) : using snort / Nik Mariza Nik Abdul Malik
by: Nik Abdul Malik, Nik Mariza
Published: (2004)
by: Nik Abdul Malik, Nik Mariza
Published: (2004)
Performance Evaluation In Real-Time Network Intrusion Detection System Using Snort
by: Majeed, Ausama A.
Published: (2008)
by: Majeed, Ausama A.
Published: (2008)
An Innovative Signature Detection System for Polymorphic and Monomorphic Internet Worms Detection and Containment
by: Rasheed, Mohammad M.
Published: (2012)
by: Rasheed, Mohammad M.
Published: (2012)
Masked face detection system using google firebase
by: Azman, Anis Zahirah
Published: (2021)
by: Azman, Anis Zahirah
Published: (2021)
Detecting Fraud Patterns in Telecommunications Using Case Based Reasoning
by: Shuaibu, Bala Musa
Published: (2008)
by: Shuaibu, Bala Musa
Published: (2008)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)
by: He , Xiao Dong
Published: (2008)
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
by: Norulazmi, Kasim
Published: (2008)
by: Norulazmi, Kasim
Published: (2008)
Detection-criterion independent proof for digital watermark detection : a support vector machine approach
by: Then,, Patrick Hang Hui
Published: (2007)
by: Then,, Patrick Hang Hui
Published: (2007)
Improving The Algorithm To Detect Internet Worms
by: Rasheed, Mohmmad M
Published: (2008)
by: Rasheed, Mohmmad M
Published: (2008)
Preliminary Analysis Of Intruder Detection System In UUM
by: Ibrahim, Yusof
Published: (2002)
by: Ibrahim, Yusof
Published: (2002)
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
by: Mazlan, Nurul Hidayah
Published: (2019)
by: Mazlan, Nurul Hidayah
Published: (2019)
Utilization Of Java Reflection In Detecting Object Concept Similarities
by: Tan, Choo Jun
Published: (2000)
by: Tan, Choo Jun
Published: (2000)
A line traversal approach to boundary detection on cadastral map
by: Su, Benjamin Chung Tai
Published: (2006)
by: Su, Benjamin Chung Tai
Published: (2006)
Steganalysis: Detecting Existence of File Types Embedded in Grey Scale Image
by: Amirulikhsan, Zolkafli
Published: (2008)
by: Amirulikhsan, Zolkafli
Published: (2008)
A malware analysis and detection system for mobile devices / Ali Feizollah
by: Ali, Feizollah
Published: (2017)
by: Ali, Feizollah
Published: (2017)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
Design and development of skin detection model based deep learning on different skin tones
by: Al-Qaysi, Mohammed Ahmed Chyad
Published: (2021)
by: Al-Qaysi, Mohammed Ahmed Chyad
Published: (2021)
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
by: Adewole Kayode, Sakariyah
Published: (2018)
by: Adewole Kayode, Sakariyah
Published: (2018)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
by: Najmun, Najmun
Published: (2024)
by: Najmun, Najmun
Published: (2024)
The Use of Multimedia Material of Teaching Modern Mathematics
by: Layous, Mohammad Kaisb
Published: (2011)
by: Layous, Mohammad Kaisb
Published: (2011)
Developing E-learning Web Based Using ADDIE Model In Engineering Department For ACM
by: Al-Sa'di, Ahmad Abdel Kareem Mohammad
Published: (2008)
by: Al-Sa'di, Ahmad Abdel Kareem Mohammad
Published: (2008)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Agent based syntex error detection for C programming language
by: Syra G Mokunjil
Published: (2013)
by: Syra G Mokunjil
Published: (2013)
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
Web development productivity improvement through object-oriented application framework
by: Mohammad Nuruzzaman, ,
Published: (2014)
by: Mohammad Nuruzzaman, ,
Published: (2014)
Integration of Student Information Data Using XML
by: Mohd Amar Maarof, Ahmad
Published: (2008)
by: Mohd Amar Maarof, Ahmad
Published: (2008)
Log Mining Using Generalized Association Rules
by: Mohd. Helmy, Abd. Wahab
Published: (2004)
by: Mohd. Helmy, Abd. Wahab
Published: (2004)
Predicting The Area Of Specialization Using Neural Network
by: Nurulisma, Hj. Ismail
Published: (2002)
by: Nurulisma, Hj. Ismail
Published: (2002)
Psychology Test Using HyperCard On The Macintosh
by: Norida, Muhd Darus
Published: (1995)
by: Norida, Muhd Darus
Published: (1995)
Similar Items
-
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
by: Jia, Liu
Published: (2024) -
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019) -
A fast learning network with improved particle swarm optimization for intrusion detection system
by: Ali, Mohammed Hasan
Published: (2019) -
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
by: Alaidaros, Hashem Mohammed
Published: (2017) -
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
