[go: up one dir, main page]

Shah et al., 2015 - Google Patents

Disclosing malicious traffic for Network Security

Shah et al., 2015

Document ID
4320829635695166734
Author
Shah K
Kapdi T
Publication year
Publication venue
International Journal of Advances in Engineering & Technology

External Links

Snippet

Network anomaly detection is a broad area of research. The use of entropy and distributions of traffic features has received a lot of attention in the research community. While previous work has demonstrated the benefits of using the entropy of different traffic distributions in …
Continue reading at search.proquest.com (other versions)

Similar Documents

Publication Publication Date Title
Rubio et al. Current cyber-defense trends in industrial control systems
Navaz et al. Entropy based anomaly detection system to prevent DDoS attacks in cloud
Patel et al. An intrusion detection and prevention system in cloud computing: A systematic review
Niksefat et al. Privacy issues in intrusion detection systems: A taxonomy, survey and future directions
Chung et al. NICE: Network intrusion detection and countermeasure selection in virtual network systems
US20060026682A1 (en) System and method of characterizing and managing electronic traffic
KR100947211B1 (en) Active Security Audit System
Krishnan et al. An adaptive distributed intrusion detection system for cloud computing framework
Varma et al. A review of DDoS attacks and its countermeasures in cloud computing
Agrawal et al. A SURVEY ON ATTACKS AND APPROACHES OF INTRUSION DETECTION SYSTEMS.
Shah et al. Disclosing malicious traffic for Network Security
STIAWAN1&2 et al. Intrusion prevention system: a survey
Ramprasath et al. Virtual Guard Against DDoS Attack for IoT Network Using Supervised Learning Method
Selvaraj et al. security vulnerabilities, threats, and attacks in IoT and big data: Challenges and solutions
Seifi et al. A study on the efficiency of intrusion detection systems in IoT networks
Singh Intrusion detection system (IDS) and intrusion prevention system (IPS) for network security: a critical analysis
Mallissery et al. Survey on intrusion detection methods
Sivakumar et al. Preventing Network From Intrusive Attack Using Artificial Neural Networks
Khanday et al. Intrusion detection systems for trending cyberattacks
Pareta et al. An integrated approach for effective intrusion detection with elasticsearch
Gomathi et al. Identification of Network Intrusion in Network Security by Enabling Antidote Selection
Jain et al. The role of decision tree technique for automating intrusion detection system
Hooper Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacy
Wang ‘Big Data in Network Security Systems
Shephard Information security-who cares?