Approach for solving active perturbation attack problem in stepping stone detection.

Batu loncatan merupakan salah satu daripada teknik menyembunyikan jejak yang digunakan oleh penceroboh untuk menyembunyikan jejaknya. Untuk lebih daripada satu dekad, para penyelidik menumpukan usaha mereka untuk mempertingkatkan pendekatan Pengesanan Batu Loncatan (PBL) untuk mengidentifikasi seca...

Full description

Saved in:
Bibliographic Details
Main Author: Omar, Mohd Nizam
Format: Thesis
Language:en
Published: 2011
Subjects:
Online Access:http://eprints.usm.my/43113/1/Pages_from_APPROACH_FOR_SOLVING_ACTIVE_PERTURBATION.pdf
http://eprints.usm.my/43113/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1834502749712023552
author Omar, Mohd Nizam
author_facet Omar, Mohd Nizam
author_sort Omar, Mohd Nizam
building Hamzah Sendut Library
collection Institutional Repository
content_provider Universiti Sains Malaysia
content_source USM Institutional Repository
continent Asia
country Malaysia
description Batu loncatan merupakan salah satu daripada teknik menyembunyikan jejak yang digunakan oleh penceroboh untuk menyembunyikan jejaknya. Untuk lebih daripada satu dekad, para penyelidik menumpukan usaha mereka untuk mempertingkatkan pendekatan Pengesanan Batu Loncatan (PBL) untuk mengidentifikasi secara tepatnya hos yang dipergunakan untuk melakukan serangan batu loncatan. Tambahan pula, Serangan Penembusan Aktif (SPA) seperti lengah, jatuhan paket dan chaf mengancam pendekatan PBL. Hari ini, di antara pelbagai jenis SPA, chaf, lengah dan jatuhan paket adalah sangat penting. Stepping stone is one of the hidden tracking techniques used by an intruder to hide its tracks. For more than a decade, researchers have focused themselves in enhancing the Stepping Stone Detection (SSD) approaches in order to identify accurately a compromised host using stepping stones to attack. In addition, Active Perturbation Attacks (APA) such as delays, dropped packets and chaffs threaten the SSD approaches. Today, among the types of APAs, chaffs, delays and packet drops are very significant.
format Thesis
id my.usm.eprints.43113
institution Universiti Sains Malaysia
language en
publishDate 2011
record_format eprints
spelling my.usm.eprints.43113 http://eprints.usm.my/43113/ Approach for solving active perturbation attack problem in stepping stone detection. Omar, Mohd Nizam QA75.5-76.95 Electronic computers. Computer science Batu loncatan merupakan salah satu daripada teknik menyembunyikan jejak yang digunakan oleh penceroboh untuk menyembunyikan jejaknya. Untuk lebih daripada satu dekad, para penyelidik menumpukan usaha mereka untuk mempertingkatkan pendekatan Pengesanan Batu Loncatan (PBL) untuk mengidentifikasi secara tepatnya hos yang dipergunakan untuk melakukan serangan batu loncatan. Tambahan pula, Serangan Penembusan Aktif (SPA) seperti lengah, jatuhan paket dan chaf mengancam pendekatan PBL. Hari ini, di antara pelbagai jenis SPA, chaf, lengah dan jatuhan paket adalah sangat penting. Stepping stone is one of the hidden tracking techniques used by an intruder to hide its tracks. For more than a decade, researchers have focused themselves in enhancing the Stepping Stone Detection (SSD) approaches in order to identify accurately a compromised host using stepping stones to attack. In addition, Active Perturbation Attacks (APA) such as delays, dropped packets and chaffs threaten the SSD approaches. Today, among the types of APAs, chaffs, delays and packet drops are very significant. 2011-08 Thesis NonPeerReviewed application/pdf en http://eprints.usm.my/43113/1/Pages_from_APPROACH_FOR_SOLVING_ACTIVE_PERTURBATION.pdf Omar, Mohd Nizam (2011) Approach for solving active perturbation attack problem in stepping stone detection. PhD thesis, Universiti Sains Malaysia.
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Omar, Mohd Nizam
Approach for solving active perturbation attack problem in stepping stone detection.
title Approach for solving active perturbation attack problem in stepping stone detection.
title_full Approach for solving active perturbation attack problem in stepping stone detection.
title_fullStr Approach for solving active perturbation attack problem in stepping stone detection.
title_full_unstemmed Approach for solving active perturbation attack problem in stepping stone detection.
title_short Approach for solving active perturbation attack problem in stepping stone detection.
title_sort approach for solving active perturbation attack problem in stepping stone detection.
topic QA75.5-76.95 Electronic computers. Computer science
url http://eprints.usm.my/43113/1/Pages_from_APPROACH_FOR_SOLVING_ACTIVE_PERTURBATION.pdf
http://eprints.usm.my/43113/
url_provider http://eprints.usm.my/