An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Demand for cyberspace-enabled services has expanded dramatically in recent years, in lockstep with the global Internet user population expansion. This rising demand for these services has increased the number of cyber threats launched by attackers, as well as the diversity and sophistication of the...
| Main Author: | Al Ogaili, Riyadh Rahef Nuiaa |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/61328/ |
| Abstract | Abstract here |
Similar Items
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
Effects Of Pineapple Consumptions On Sensory Perceptions, Somatosensation And Taste Threshold
by: Romli, Siti Rashima
Published: (2023)
by: Romli, Siti Rashima
Published: (2023)
Spot filtering adaptive thresholding method for iris pigment spots feature extraction and detection
by: Mohamad Faizal Ab. Jabal
Published: (2025)
by: Mohamad Faizal Ab. Jabal
Published: (2025)
Passive Rule-Based Approach To Detect Sinkhole Attack In 6lowpan Rpl Based Internet Of Things Networks
by: Subh, Al Sarawi Shadi Mustafa
Published: (2024)
by: Subh, Al Sarawi Shadi Mustafa
Published: (2024)
Evaluation of metal artefact reduction using dual-step adaptive thresholding technique in computed tomography
by: Hassan, Mohd Norsyafi
Published: (2018)
by: Hassan, Mohd Norsyafi
Published: (2018)
An Improved Secure Router Discovery Mechanism To Prevent Fake Ra Attack In Link Local Ipv6 Network
by: C. Arjuman, Navaneethan
Published: (2021)
by: C. Arjuman, Navaneethan
Published: (2021)
Effectiveness of structured query language injection attacks detection mechanisms
Published: (2025)
Published: (2025)
Secure-Rpl: Approach To Prevent Resource-Based Attacks In Wireless Sensor Networks Using Balanced Clustering
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
Design analog cells based on threshold voltage reduction technique
by: Voon, Zheng Loong
Published: (2025)
by: Voon, Zheng Loong
Published: (2025)
Determination of muscle fatigue threshold using sliding window technique and slope of median frequency
by: Por, Shi Ying
Published: (2025)
by: Por, Shi Ying
Published: (2025)
Prevention Mechanism Against Denial Of Service Attack On Duplicate Address Detection Process In Ipv6 Link-Local Networks
by: Ibrahim Al-Ani, Ahmed Khallel
Published: (2020)
by: Ibrahim Al-Ani, Ahmed Khallel
Published: (2020)
Determination Of Cost-Effectiveness
Threshold For Malaysia
by: Lim , Yen Wei
Published: (2015)
by: Lim , Yen Wei
Published: (2015)
Anomaly-Based Detection Approach To Detect The Flash Crowd Attack During The Flash Event
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
The Effects Of Continuous Adaptation Of Online Contents Based On The Aptitude Profile On Learners’ Engagement
by: Eldenfria, Atef Hamza
Published: (2018)
by: Eldenfria, Atef Hamza
Published: (2018)
Detection of wormhole attack in mobile ad-hoc networks
by: Mojtaba Ghanaatpisheh Sanaei
Published: (2025)
by: Mojtaba Ghanaatpisheh Sanaei
Published: (2025)
Adopting deep learning for detection of DDOS attack on IOT
by: Fakhriyah Salih Mohammed Abouzaekouk
Published: (2025)
by: Fakhriyah Salih Mohammed Abouzaekouk
Published: (2025)
Adaptation Experience Of Overseas Chinese Studyingin Guangxi Province Through ‘Chineseness’ Perspective In Higher Education Institutions
by: Li, Ying
Published: (2024)
by: Li, Ying
Published: (2024)
Multi-shape symmetric encryption mechanism for nongeneric attacks mitigation
by: Abdelrahman Abdelgader Altigani Abdelgader
Published: (2025)
by: Abdelrahman Abdelgader Altigani Abdelgader
Published: (2025)
Enhanced priority-based adaptive energy-aware mechanisms for wireless sensor networks
by: Uzougbo, Onwuegbuzie Innocent
Published: (2025)
by: Uzougbo, Onwuegbuzie Innocent
Published: (2025)
The development of a passive Wi-Fi radar fall detection system for elderly based on cumulative sum thresholding
by: Razali, Hidayatusherlina
Published: (2025)
by: Razali, Hidayatusherlina
Published: (2025)
The Development of The Odour Threshold Test for Environmental Odour Assessment
by: Rosli, Ros Nadiah
Published: (2015)
by: Rosli, Ros Nadiah
Published: (2015)
A study on speech enhancement method based on two microphone adaptive beamforming technique
by: Nur Diana Kamarudin
Published: (2025)
by: Nur Diana Kamarudin
Published: (2025)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
A secure method to detect wormhole attack in mobile adhoc network
by: Parichehr Manouchehri Ardestani
Published: (2025)
by: Parichehr Manouchehri Ardestani
Published: (2025)
Abnormal Transactions Detection In The Ethereum Network Using Semi-Supervised Generative Adversarial Networks
by: Mahmoud Al-Emari, Salam Radi
Published: (2022)
by: Mahmoud Al-Emari, Salam Radi
Published: (2022)
Reduction Of Heavy Metals Sludge By Vermicomposting Technique
by: Hamdi, Shaymaa Mundher Ahmed
Published: (2011)
by: Hamdi, Shaymaa Mundher Ahmed
Published: (2011)
A robust against rotation attack watermaking technique based on wavelet transform
by: Reza Aghababaeyan
Published: (2025)
by: Reza Aghababaeyan
Published: (2025)
Detecting applications with excessive privileges and applications vulnerable to privilege escalation attack in android
by: Iman Kashefi
Published: (2025)
by: Iman Kashefi
Published: (2025)
Collaborative detection and mitigation of distributed denial-of-service attacks in software-defined networks
by: Omer Elsier Tayfour
Published: (2025)
by: Omer Elsier Tayfour
Published: (2025)
An elapsed-time based scheme for detecting and mitigating DDOS attacks in the SDN environment
by: Wisam H A.Muragaa
Published: (2024)
by: Wisam H A.Muragaa
Published: (2024)
Detection And Identification Of Cyanobacterial Toxin Encoding Gene In Malaysia
by: Mohamad, Rohaslinda
Published: (2017)
by: Mohamad, Rohaslinda
Published: (2017)
Enhancement of the physical and chemical properties of palm oil blends.
by: Mobin Siddique, Md.Bazlul
Published: (2010)
by: Mobin Siddique, Md.Bazlul
Published: (2010)
Enhanced Steganography Framework Based On Lossless Compression And Histogram
by: Kasasbeh, Dima Suliman Mohammad
Published: (2024)
by: Kasasbeh, Dima Suliman Mohammad
Published: (2024)
fMRI study of pain threshold in the presence and absence of the loved one
by: Tamam, Sofina
Published: (2016)
by: Tamam, Sofina
Published: (2016)
Determination of threshold value for estimating significant wave height and depth of similarity
by: Soheil Saeed Far
Published: (2025)
by: Soheil Saeed Far
Published: (2025)
Rainfall thresholds for the initiation of slope failures at Jelapang and Gua Tempurung area.
by: Abd Rahaman, Norisam
Published: (2025)
by: Abd Rahaman, Norisam
Published: (2025)
A situation assessment and prediction mechanism for network security situation awareness
by: Leau, Yu Beng
Published: (2016)
by: Leau, Yu Beng
Published: (2016)
Development Of Hydrocolloids-Coated Noodles For Enhanced Salt Release In The Mouth
by: Yeoh, Shin Yong
Published: (2022)
by: Yeoh, Shin Yong
Published: (2022)
Similar Items
-
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021) -
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023) -
Effects Of Pineapple Consumptions On Sensory Perceptions, Somatosensation And Taste Threshold
by: Romli, Siti Rashima
Published: (2023) -
Spot filtering adaptive thresholding method for iris pigment spots feature extraction and detection
by: Mohamad Faizal Ab. Jabal
Published: (2025) -
Passive Rule-Based Approach To Detect Sinkhole Attack In 6lowpan Rpl Based Internet Of Things Networks
by: Subh, Al Sarawi Shadi Mustafa
Published: (2024)