Search Results - (( using optimization method algorithm ) OR ( rate detection packet algorithm ))
Search alternatives:
- method algorithm »
- detection packet »
- packet algorithm »
- rate detection »
-
1
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Published 2017“…In addition, it is also aimed to improve the resource consumption of the packet-based detection approach. CHID applied attribute wrapper features evaluation algorithms that marked malicious flows for further analysis by the packet-based detection. …”
Get full text
Get full text
Get full text
Thesis -
4
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…The effectiveness of the IADS has been evaluated under different detection capabilities (i.e., false positive, false negative, true positive, true negative, false alarm, accuracy,detection rate, attack data detection rate, normal data detection rate) and detection times using the DARPA 1999 and ISCX 2012 intrusion detection benchmark datasets as well as with Live-data. …”
Get full text
Get full text
Thesis -
5
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006“…To achieve this, the users implement a flow control algorithm that controls the rate at which data packets are sent into the Internet. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…FPF of SVM have merged the analyzed results of flexible packet filtering with support vector machine algorithm to get better classification of the captured network traffics and to detect anomalies. …”
Get full text
Get full text
Get full text
Thesis -
7
DDoS Classification using Combined Techniques
Published 2024“…Based on the results of detection accuracy and false positive rate for all the techniques involved, it proves the PTA-KNN technique is a more effective technique in the context of detection of incoming packets whether DDoS attacks or normal packets…”
Get full text
Get full text
Article -
8
DDoS Classification using Combined Techniques
Published 2024“…Based on the results of detection accuracy and false positive rate for all the techniques involved, it proves the PTA-KNN technique is a more effective technique in the context of detection of incoming packets whether DDoS attacks or normal packets.…”
Get full text
Get full text
Article -
9
Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload
Published 2016“…The experimental outcome demonstrated that our proposed anomaly detection achieved promising results with 97% detection rate with 1.2% false positive rate for ISCX 2012 dataset and 100% detection rate with 0.06% false positive rate for DARPA 1999 dataset. …”
Get full text
Get full text
Get full text
Article -
10
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Therefore, the first problem to be tackled is the privacy optimization of Modbus/TCP packet fields. In scientific literatures, packet anonymization is performed according to attribute types (numerical, categorical and hierarchical), not taking into consideration the singular characteristics of the Modbus packet fields, using Euclidean distance algorithms that are not capable to deal with binary data and may result in information loss. …”
Get full text
Get full text
Thesis -
11
Non-invasive pathological voice classifications using linear and non-linear classifiers
Published 2010“…In the case of detection of specific disorders, wavelet packet and entropy features perform well compared to time-domain energy variations based features and MFCCs and SVD based features. …”
Get full text
Thesis -
12
Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET
Published 2022“…It minimizes the transmission rate and network lifetime and improves packet latency and energy usage. …”
Get full text
Get full text
Article -
13
SVM driven approach for detecting DoS attacks in SDN environment
Published 2025“…To address this challenge, we propose a novel approach that efficiently detects DoS attacks by implementing a packet inspection process using a queuing mechanism, followed by machine learning classification using SVM and KNN algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Anomaly detection in ICS datasets with machine learning algorithms
Published 2021“…The ICS cyber threats are growing at an alarming rate on industrial automation applications. Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as the first line of defense, have been detailed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
Get full text
Get full text
Get full text
Article -
16
Multiuser Sensing for Opportunistic Spectrum Access in Cognitive Radio Networks
Published 2011“…Subsequently, number of user and packet arrival rate can affect the throughput performance of SUs as well.…”
Get full text
Get full text
Get full text
Citation Index Journal -
17
Multiuser Sensing for Opportunistic Spectrum Access in Cognitive Radio Networks
Published 2011“…Subsequently, number of user and packet arrival rate can affect the throughput performance of SUs as well.…”
Get full text
Get full text
Get full text
Citation Index Journal -
18
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…On the other hand, the detection algorithm based on the energy consumption achieves PDR of 91.6%, EED of 14.03 ms and detection rate accuracy of 93%. …”
Get full text
Get full text
Get full text
Thesis -
19
Depth frame loss concealment for wireless transmission utilising motion detection information
Published 2014“…The proposed method is able to improve the quality of video in comparison with frame copy algorithm. The feasibility and performance of the proposed method based on motion detection error concealment is evaluated analytically by considering different packet and frame loss rates. …”
Get full text
Get full text
Thesis -
20
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…Results obtained showed that the classifier had detection accuracy, Area Under Receiver Operating Curve (AUC), true positive rate, false positive rate and a false negative rate of 99.89%, 99.89%, 99.95%, 0.18%, and 0.05% respectively. …”
Get full text
Get full text
Get full text
Get full text
Article
