CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Inspecting packets to detect intrusions faces challenges when coping with a high volume of network traffic. Packet-based detection processes every payload on the wire, which degrades the performance of network intrusion detection system (NIDS). This issue requires an introduction of a flow-based NID...
| Main Author: | Alaidaros, Hashem Mohammed |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/6950/1/s93165_01.pdf https://etd.uum.edu.my/6950/2/s93165_02.pdf https://etd.uum.edu.my/6950/ |
| Abstract | Abstract here |
Similar Items
Intrusion Alert Quality Framework For
Security False Alert Reduction
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Parallel Network Alert Management System For IDS False Positive Reduction
by: el-Taj, Homam Reda Kamel
Published: (2011)
by: el-Taj, Homam Reda Kamel
Published: (2011)
Intrusion Alert Quality Framework For Security False Alert Reduction [TH9737. N162 2007 f rb].
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
Intrusion Detection by Port Scan Using Snort
by: Alkhushayni, Suboh Mohammad Shehadah
Published: (2008)
by: Alkhushayni, Suboh Mohammad Shehadah
Published: (2008)
Modified Statistical Process Control For Short Runs Test And Measurement Process To Reduce False Alarm
by: Koh, Chin Kok
Published: (2018)
by: Koh, Chin Kok
Published: (2018)
Sound event detection of wildlife reserve intrusion detection using hybrid convolutional neural network and random forest / Muhamad Amirul Sadikin Md Afendi
by: Md Afendi, Muhamad Amirul Sadikin
Published: (2022)
by: Md Afendi, Muhamad Amirul Sadikin
Published: (2022)
Gpu Based Fast Phylogenetic Tree
Construction Algorithm With Reduce
Dataset
by: Ibrahim, Najihah
Published: (2016)
by: Ibrahim, Najihah
Published: (2016)
Multi-Objective Hybrid Algorithm For
The Classification Of Imbalanced
Datasets
by: Saeed, Sana
Published: (2019)
by: Saeed, Sana
Published: (2019)
Hybrid intelligent approach for network intrusion detection
by: Al-Mohammed, Wael Hasan Ali
Published: (2015)
by: Al-Mohammed, Wael Hasan Ali
Published: (2015)
An architectural design for hybrid intrusion detection system for database
Published: (2025)
Published: (2025)
Hybrid fuzzy techniques for unsupervised intrusion detection system
by: Witcha Chimphlee
Published: (2025)
by: Witcha Chimphlee
Published: (2025)
Modern code review knowledge sharing model to reduce software engineering waiting waste
by: Nargis Fatima
Published: (2025)
by: Nargis Fatima
Published: (2025)
A study of false alarm from CMS serving buildings
by: Tee, Siew Chong
Published: (1999)
by: Tee, Siew Chong
Published: (1999)
Human resource management system
by: Azeem Saleem Rathore
Published: (2025)
by: Azeem Saleem Rathore
Published: (2025)
Hybrid of structural-causal and statistical model for intrusion alert correlation
by: Maheyzah Md. Sirat @ Md. Siraj
Published: (2025)
by: Maheyzah Md. Sirat @ Md. Siraj
Published: (2025)
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016)
by: Tabaan, Alaa Abdulrahman
Published: (2016)
Global Positioning System (GPS): The Utilization Of GPS In Lembaga Pelesenan Kenderaan Perdagangan (LPKP)
by: Aisa Azira, Abdul Aziz
Published: (2008)
by: Aisa Azira, Abdul Aziz
Published: (2008)
False data detection in mobile ad-hoc network based on digital signature
by: Babak Emami Abarghouei
Published: (2025)
by: Babak Emami Abarghouei
Published: (2025)
Asynchronous point to point FSK- FM radio telemetry system with data encryption for monitoring environmental conditions / Shuhaimi Shamsuddin
by: Shamsuddin, Shuhaimi
Published: (2003)
by: Shamsuddin, Shuhaimi
Published: (2003)
E-Resource Searcher (ERS) System
by: Chen, Liang
Published: (2010)
by: Chen, Liang
Published: (2010)
Modeling and optimization of power consumption towards energy saving
by: Hashem Zeinali Boroujeni
Published: (2025)
by: Hashem Zeinali Boroujeni
Published: (2025)
Comparison between intrusion detection system tools with j48 and naive bayes classification
by: Mohd. Fairuz Shahadan
Published: (2025)
by: Mohd. Fairuz Shahadan
Published: (2025)
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
by: Mohammed Alaidaros, Hashem
Published: (2007)
by: Mohammed Alaidaros, Hashem
Published: (2007)
Development of novel distance relay scheme to prevent false tripping during power swing
by: Mohamad, Nor Zulaily
Published: (2017)
by: Mohamad, Nor Zulaily
Published: (2017)
Reduce energy consumption in the wireless sensor network by using EEL-MAC protocol
by: Jawad, Moheimen Mohomed Jleil
Published: (2015)
by: Jawad, Moheimen Mohomed Jleil
Published: (2015)
A comparative study of breast cancer dataset using multiple hybrid of clustering and classification algorithms
by: Gopinathaan Rajamohan
Published: (2025)
by: Gopinathaan Rajamohan
Published: (2025)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
False report identification algorithm using support vector machine text classifier for citiact application
by: Sharmiladevi Sonah Kakian @ Rajoo
Published: (2025)
by: Sharmiladevi Sonah Kakian @ Rajoo
Published: (2025)
Behaviour and physiology assessment of false gharial [Tomistoma schlegelii (Müller, 1838)] in captivity in Peninsular Malaysia
by: Ab Latip, Mohd Qayyum
Published: (2017)
by: Ab Latip, Mohd Qayyum
Published: (2017)
A development of web - based bernese automated global positioning system processing package
Published: (2025)
Published: (2025)
Impacts Of Energy Consumption, Natural Resource Use And Education On Environmental Degradation In
by: Victor, Osuntuyi Busayo
Published: (2022)
by: Victor, Osuntuyi Busayo
Published: (2022)
Hybrid BLEU Algorithm For Structured Exam Management System
by: Zulhana, Zulkifle
Published: (2008)
by: Zulhana, Zulkifle
Published: (2008)
Software Based Scalable Packet
Capture Mechanism To Reduce
Packet Loss
by: Alias, Syazwina
Published: (2019)
by: Alias, Syazwina
Published: (2019)
Automated lane detection of gel electrophoresis image using false peak elimination / Ros Surya Taher
by: Taher, Ros Surya
Published: (2017)
by: Taher, Ros Surya
Published: (2017)
Hybrid flower pollination and k-nearest neighbor algorithm for high dimensional feature selection using microarray dataset
by: Muhammad Nasiru Dankolo
Published: (2025)
by: Muhammad Nasiru Dankolo
Published: (2025)
A clustering method based on genetic algorithm to reduce energy consumption in wireless sensor network
by: Farab Alipanah
Published: (2025)
by: Farab Alipanah
Published: (2025)
Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method
by: Abdul Razak, Aina Nabila
Published: (2019)
by: Abdul Razak, Aina Nabila
Published: (2019)
Ensemble methods in intrusion detection
by: Kekere Temitope Josiah
Published: (2025)
by: Kekere Temitope Josiah
Published: (2025)
Packet-level intrusion detection
by: Rami Hussen Mohammed Altilib
Published: (2025)
by: Rami Hussen Mohammed Altilib
Published: (2025)
Similar Items
-
Intrusion Alert Quality Framework For
Security False Alert Reduction
by: Abu Bakar, Najwa
Published: (2007) -
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013) -
Parallel Network Alert Management System For IDS False Positive Reduction
by: el-Taj, Homam Reda Kamel
Published: (2011) -
Intrusion Alert Quality Framework For Security False Alert Reduction [TH9737. N162 2007 f rb].
by: Abu Bakar, Najwa
Published: (2007) -
Intrusion Detection by Port Scan Using Snort
by: Alkhushayni, Suboh Mohammad Shehadah
Published: (2008)