作者
MA Faizal, Shahrin Sahib, Y Robiah, Siti Rahayu
发表日期
2010/9/22
研讨会论文
2010 Second International Conference on Network Applications, Protocols and Services
页码范围
148-152
出版商
IEEE
简介
In recent years network attack are easily launch since the tools to execute the attack are freely available on the Internet. Even the script kiddies can initiate a sophisticated attack with just a basic knowledge on network and software technology. To overcome this matter, Intrusion Detection System (IDS) has been used as a vital instrument in defending the network from this malicious activity. With the ability to analyze network traffic and recognize incoming and on-going network attack, majority of network administrator has turn to IDS to help them in detecting anomalies in network traffic. The gathering of information and analysis on the anomalies activity can be classified into fast and slow attack. Since fast attack activity make a connection in few second and uses a large amount of packet, detecting this early connection provide the administrator one step ahead in deflecting further damages towards the network …
引用总数
201120122013201420152016201720182019202020212022202322422211
学术搜索中的文章
MA Faizal, S Sahib, Y Robiah, S Rahayu - 2010 Second International Conference on Network …, 2010