Deceiving entropy based DoS detection

İ Özçelik, RR Brooks - Computers & Security, 2015 - Elsevier
Abstract Denial of Service (DoS) attacks disable network services for legitimate users. As a
result of growing dependence on the Internet by both the general public and service …

A fully integrated D-band direct-conversion I/Q transmitter and receiver chipset in SiGe BiCMOS technology

S Carpenter, H Zirath, ZS He… - … of Communications and …, 2021 - ieeexplore.ieee.org
This paper presents design and characterization of single-chip 110–170 GHz (D-band)
direct conversion in-phase/quadrature-phase (I/Q) transmitter and receiver monolithic …

[图书][B] Distributed denial of service attacks: Real-world detection and mitigation

İ Özçelik, R Brooks - 2020 - books.google.com
Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread
and harder to control over time. This book allows students to understand how these attacks …

Traffic and overhead analysis of applied pre-filtering ACL firewall on HPC service network

JK Lee, T Hong, G Li - Journal of Communications and …, 2021 - ieeexplore.ieee.org
In an high-performance computing (HPC), supercomputing service environment, the security
of infrastructure nodes that are points of contact for researchers is very important. We have …

Anomaly-based online intrusion detection system as a sensor for cyber security situational awareness system

T Kokkonen - 2016 - jyx.jyu.fi
ISSN 1456-5390; 1456-5390; 251) ISBN 978-951-39-6831-1 (nid.) ISBN 978-951-39-6832-
8 (PDF) Finnish summary Diss. Almost all the organisations and even individuals rely on …

Soft computing‐based intrusion detection system with reduced false positive rate

DG Bhatti, PV Virparia - … and Analysis of Security Protocol for …, 2020 - Wiley Online Library
Summary Intrusion Detection System is one of the important security mechanisms in today's
information era. Two different approaches are used for intrusion detection: signature based …

Dos attack detection and mitigation

I Ozcelik - 2015 - search.proquest.com
As a result of growing dependence on the Internet by both the general public and service
providers, the availability of Internet services has become a concern. While DoS attacks …

[PDF][PDF] An operational framework for alert correlation using a novel clustering approach

AB Mohamed, NB Idris… - International Journal of …, 2012 - researchgate.net
ABSTRACT Intrusion Detection System (IDS) is a well known security feature and widely
implemented among practitioners. However, since the creation of IDS the enormous number …

[PDF][PDF] Towards the development of an efficient intrusion detection system

S Borah, A Chakraborty - International Journal of Computer Applications, 2014 - Citeseer
Intrusion is a set of related activities which is performed to provide unauthorized activities
such as access to the useful information, file modification etc. It is a set of any actions that …

False alarm reduction using adaptive agent-based profiling

S Hacini, Z Guessoum, M Cheikh - International Journal of …, 2013 - igi-global.com
In this paper the authors propose a new efficient anomaly-based intrusion detection
mechanism based on multi-agent systems. New networks are particularly vulnerable to …