An Innovative Signature Detection System for Polymorphic and Monomorphic Internet Worms Detection and Containment
Most current anti-worm systems and intrusion-detection systems use signature-based technology instead of anomaly-based technology. Signature-based technology can only detect known attacks with identified signatures. Existing anti-worm systems cannot detect unknown Internet scanning worms automatical...
| Main Author: | Rasheed, Mohammad M. |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/3353/1/MOHAMMAD_M._RASHEED.pdf https://etd.uum.edu.my/3353/3/MOHAMMAD_M._RASHEED.pdf https://etd.uum.edu.my/3353/ http://sierra.uum.edu.my/record=b1242446~S1 |
| Abstract | Abstract here |
Similar Items
Improving The Algorithm To Detect Internet Worms
by: Rasheed, Mohmmad M
Published: (2008)
by: Rasheed, Mohmmad M
Published: (2008)
Fuzzy C mean clustering in off-line handwriting signature verfication system
by: Lee, Beng Yong
Published: (2006)
by: Lee, Beng Yong
Published: (2006)
Spiral bit-map signature for content-based images retrieval
by: Wang, Hui Hui
Published: (2003)
by: Wang, Hui Hui
Published: (2003)
Feature fusion using a modified genetic algorithm for face and signature recognition system
by: Suryanti, Awang
Published: (2015)
by: Suryanti, Awang
Published: (2015)
Intrusion Detection by Port Scan Using Snort
by: Alkhushayni, Suboh Mohammad Shehadah
Published: (2008)
by: Alkhushayni, Suboh Mohammad Shehadah
Published: (2008)
Preliminary Analysis Of Intruder Detection System In UUM
by: Ibrahim, Yusof
Published: (2002)
by: Ibrahim, Yusof
Published: (2002)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Masked face detection system using google firebase
by: Azman, Anis Zahirah
Published: (2021)
by: Azman, Anis Zahirah
Published: (2021)
Detection-criterion independent proof for digital watermark detection : a support vector machine approach
by: Then,, Patrick Hang Hui
Published: (2007)
by: Then,, Patrick Hang Hui
Published: (2007)
A malware analysis and detection system for mobile devices / Ali Feizollah
by: Ali, Feizollah
Published: (2017)
by: Ali, Feizollah
Published: (2017)
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
by: Jia, Liu
Published: (2024)
by: Jia, Liu
Published: (2024)
Utilization Of Java Reflection In Detecting Object Concept Similarities
by: Tan, Choo Jun
Published: (2000)
by: Tan, Choo Jun
Published: (2000)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
A fast learning network with improved particle swarm optimization for intrusion detection system
by: Ali, Mohammed Hasan
Published: (2019)
by: Ali, Mohammed Hasan
Published: (2019)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
by: Norulazmi, Kasim
Published: (2008)
by: Norulazmi, Kasim
Published: (2008)
A line traversal approach to boundary detection on cadastral map
by: Su, Benjamin Chung Tai
Published: (2006)
by: Su, Benjamin Chung Tai
Published: (2006)
Detecting Fraud Patterns in Telecommunications Using Case Based Reasoning
by: Shuaibu, Bala Musa
Published: (2008)
by: Shuaibu, Bala Musa
Published: (2008)
Steganalysis: Detecting Existence of File Types Embedded in Grey Scale Image
by: Amirulikhsan, Zolkafli
Published: (2008)
by: Amirulikhsan, Zolkafli
Published: (2008)
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
by: Alaidaros, Hashem Mohammed
Published: (2017)
by: Alaidaros, Hashem Mohammed
Published: (2017)
Design and development of skin detection model based deep learning on different skin tones
by: Al-Qaysi, Mohammed Ahmed Chyad
Published: (2021)
by: Al-Qaysi, Mohammed Ahmed Chyad
Published: (2021)
Pemodelan Sistem Pesanan Berasaskan Internet Menggunakan UML
by: Hazaruddin, Harun
Published: (2000)
by: Hazaruddin, Harun
Published: (2000)
Membangunkan Senibina Sistem Pengurusan Bilik Berasaskan Internet
by: Mohd. Hadzrami, Harun Rasit
Published: (2002)
by: Mohd. Hadzrami, Harun Rasit
Published: (2002)
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
by: Adewole Kayode, Sakariyah
Published: (2018)
by: Adewole Kayode, Sakariyah
Published: (2018)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
by: Adnan, -
Published: (2016)
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
by: Najmun, Najmun
Published: (2024)
by: Najmun, Najmun
Published: (2024)
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
by: Mazlan, Nurul Hidayah
Published: (2019)
by: Mazlan, Nurul Hidayah
Published: (2019)
Internet information server scanner : scanning on URL vulnerabilities / Tan Yu Jin.
by: Tan, Yu Jin
Published: (2002)
by: Tan, Yu Jin
Published: (2002)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
The Challenges Of Understanding Security In Web Browser Case Study: Internet Explorer And Mozilla Firefox
by: Saleh, Ashraf Mousa
Published: (2008)
by: Saleh, Ashraf Mousa
Published: (2008)
Agent based syntex error detection for C programming language
by: Syra G Mokunjil
Published: (2013)
by: Syra G Mokunjil
Published: (2013)
A trust model mechanism based on quality of service to reduce energy consumption in the internet of things network
by: Hikmat, Ameer Nadhum
Published: (2022)
by: Hikmat, Ameer Nadhum
Published: (2022)
An improved framework for content and link-based web spam detection: a combined approach
by: Shahzad, Asim
Published: (2021)
by: Shahzad, Asim
Published: (2021)
OffSig-sinGAN: A deep learning-based image augmentation model for offline signature verification / Muhammad Muzaffar Hameed
by: Muhammad Muzaffar , Hameed
Published: (2023)
by: Muhammad Muzaffar , Hameed
Published: (2023)
A mean convolution layer for network intrusion detection systems / Leila Mohammadpour
by: Leila , Mohammadpour
Published: (2024)
by: Leila , Mohammadpour
Published: (2024)
Coronary artery stenosis detection and visualization / Tang Sze Ling
by: Tang, Sze Ling
Published: (2015)
by: Tang, Sze Ling
Published: (2015)
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
by: Somayeh, Sadeghi
Published: (2015)
by: Somayeh, Sadeghi
Published: (2015)
Mobile Reservation System for UUM INN
by: Fouad, Luma M.
Published: (2008)
by: Fouad, Luma M.
Published: (2008)
Improvement to the Appointment System for Clinic: A Case Study in UUM Clinic
by: Hamouda, Shady M.S.
Published: (2008)
by: Hamouda, Shady M.S.
Published: (2008)
Designing UUM Halls Reservation System
by: Wane, Khald M. Hassen
Published: (2008)
by: Wane, Khald M. Hassen
Published: (2008)
Similar Items
-
Improving The Algorithm To Detect Internet Worms
by: Rasheed, Mohmmad M
Published: (2008) -
Fuzzy C mean clustering in off-line handwriting signature verfication system
by: Lee, Beng Yong
Published: (2006) -
Spiral bit-map signature for content-based images retrieval
by: Wang, Hui Hui
Published: (2003) -
Feature fusion using a modified genetic algorithm for face and signature recognition system
by: Suryanti, Awang
Published: (2015) -
Intrusion Detection by Port Scan Using Snort
by: Alkhushayni, Suboh Mohammad Shehadah
Published: (2008)
