Search Results - (( attack detection based algorithm ) OR ( using simulation based algorithm ))
Search alternatives:
- simulation based »
- detection based »
-
1
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Adaptive optimization techniques such as fuzzy logic controller (FLC), reinforcement learning are discussed in this thesis in order to adopt Q-leaning algorithm to FLCs. We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
Get full text
Get full text
Thesis -
2
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
3
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
4
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. The algorithms considered are the Naive Bays Algorithm, Decision Tree Algorithm and Hybrid Algorithm for different datasets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…This paper proposes an energy trust system (ETS) for WSNs to effectively detect sybil attacks. It employs multi-level detection based on identity and position verification. …”
Get full text
Get full text
Get full text
Article -
6
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…ETERS also incorporates an irregular attenuation factor during the evaluation of communication trust to reflect the effect of various external factors such as natural calamity (earthquake), network congestion, etc., based on the trust values. However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
7
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
8
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
Published 2012“…Firstly, we divide the malicious peers into six categories; secondly, we bring forward PeerMate, a malicious peers detection algorithm based on Multiscale Principal Component Analysis (MSPCA) and Quality of Reconstruction (QR), to detect malicious peers in reputation based P2P systems; finally, we show through simulations that PeerMate can detect malicious peers efficiently and accurately.…”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
Get full text
Get full text
Get full text
Thesis -
10
Network tool for preventing DDOS attacks on cloud computing
Published 2015“…This algorithm is simple and it is based on existing security protocol and is proposed for detecting and preventing security attacks on the network by filtering packets in the network. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
12
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018“…This MLFNN with BP algorithm was simulated using MATLAB software. The performance of this classifier was evaluated based on three parameters: accuracy, sensitivity, and False Positive Rate (FPR). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
Get full text
Get full text
Article -
14
Snort-based smart and swift intrusion detection system
Published 2018Get full text
Get full text
Get full text
Article -
15
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…The OMNET++ simulation program is used to justify the proposed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
16
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. …”
Get full text
Get full text
Thesis -
17
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
18
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
Published 2024“…The experiment was conducted in a controlled lab environment using open source tools by implementing dynamic analysis on 1260 datasets from the Android Malware Genome Project. Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. …”
Proceedings Paper -
19
Industrial datasets with ICS testbed and attack detection using machine learning techniques
Published 2021“…An innovative concept of using real operational technology network traffic-based testbed, for cyber-physical system simulation and analysis, is presented. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Damageless Digital Watermarking Using Complex-valued Artificial Neural Network
Published 2010“…Several high-ranking watermarking schemes using neural networks have been proposed in order to make the watermark stronger to resist attacks. …”
Get full text
Get full text
Get full text
Article
