作者
Rajalakshmi Selvaraj, Venu Madhav Kuthadi, Tshilidzi Marwala
发表日期
2016
研讨会论文
Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 2
页码范围
73-82
出版商
Springer India
简介
Generally, Intrusion detection system (IDS) is installed in industrial environment for protecting network that works based on signature, where they are not capable of detecting most unidentified attacks. The detection of undefined attack and intrusion is not more helpful to identify the several kinds of attack, where intrusion-based attack has become a challenging task to detect intruder on network. A skilled attacker can obtain a sensible information and data from the system after knowing the weakness. Distributed denial of service (DDoS) is a major thread over the security and most enlarging thread in recent days. There are so many types of Denial of Service (DoS) such as Teardrop, Smurf, Ping of Death, and Clone attack. The aim of the cyber defense system is to detect the main cause of the several counter attacks on the enterprise network. On the way to fix these issues, we are proposing a novel idea that …
引用总数
201620172018201920202021202220232024231311
学术搜索中的文章
R Selvaraj, VM Kuthadi, T Marwala - Proceedings of the Second International Conference …, 2016