Showing 1 - 5 results of 5 for search '"anomaly detection"', query time: 0.05s Refine Results
  1. 1

    Packet header anomaly detection using statistical analysis by Yassin, Warusia, Udzir, Nur Izura, Abdullah, Azizol, Abdullah @ Selimun, Mohd Taufik, Muda, Zaiton, Zulzalil, Hazura

    Published 2014
    “…The disclosure of network packets to recurrent cyber intrusion has upraised the essential for modelling various statistical-based anomaly detection methods lately. Theoretically, the statistical-based anomaly detection method fascinates researcher’s attentiveness, but technologically, the fewer intrusion detection rates persist as vulnerable disputes. …”
    Conference or Workshop Item
  2. 2

    Host-based packet header anomaly detection using statistical analysis by Yassin, Warusia, Udzir, Nur Izura, Abdullah, Azizol, Abdullah @ Selimun, Mohd Taufik, Muda, Zaiton, Zulzalil, Hazura

    Published 2013
    “…The exposure of network packets to frequent cyber attacks has increased the need for designing statistical-based anomaly detection recently. Conceptually, the statistical based anomaly detection attracts researcher's attention, but technically, the low attack detection rates remains an open challenges. …”
    Get full text
    Conference or Workshop Item
  3. 3

    Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload by Kakavand, Mohsen, Mustapha, Norwati, Mustapha, Aida, Abdullah @ Selimun, Mohd Taufik

    Published 2016
    “…Our proposed anomaly detection also achieved comparable performance in terms of computational complexity when compared to three state-of-the-art anomaly detection systems.…”
    Get full text
    Article
  4. 4

    Signature-based anomaly intrusion detection using integrated data mining classifiers by Yassin, Warusia, Udzir, Nur Izura, Abdullah, Azizol, Abdullah @ Selimun, Mohd Taufik, Zulzalil, Hazura, Muda, Zaiton

    Published 2014
    “…In this work, a novel Signature-Based Anomaly Detection Scheme (SADS) which could be applied to scrutinize packet headers' behaviour patterns more precisely and promptly is proposed. …”
    Get full text
    Conference or Workshop Item
  5. 5

    An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…Considering that using a combination of ANN and EA can produce an advanced technique to develop an efficient anomaly detection approach for IDS, several types of research have used ENN algorithms to detect the attacks. …”
    Get full text
    Article