-
181
An Anomaly Mitigation Framework for IoT Using Fog Computing
Published 2020-09-01“…The signature-based module utilizes a database of attack sources (blacklisted IP addresses) to ensure faster detection when attacks are executed from the blacklisted IP address, while the anomaly-based module uses an extreme gradient boosting algorithm for accurate classification of network traffic flow into normal or abnormal. …”
Get full text
Article -
182
ANALISIS DAN IMPLEMENTASI MIKROTIK ROUTER BOARD RB450G UNTUK MANAJEMEN JARINGAN (STUDI KASUS : BADAN PENGKAJIAN DAN PENERAPAN TEKNOLOGI SUB BALAI BESAR TEKNOLOGI ENERGI (B2TE-BPPT)...
Published 2015-09-01“…Then, for security, made the policy in terms of access to the IP address and port. In terms of permissions, can be applied to the scheduling of access to certain sites. …”
Get full text
Article -
183
<italic>Dark-TRACER</italic>: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns
Published 2022-01-01“…The darknet, an unused IP address space, is relatively conducive to observing and analyzing indiscriminate cyberattacks because of the absence of legitimate communication. …”
Get full text
Article -
184
Delicar: A Smart Deep Learning Based Self Driving Product Delivery Car in Perspective of Bangladesh
Published 2021-12-01“…Geoip2 (a python library) retrieves the longitude and latitude from the equipped system’s IP address to report the live geographical position to the authorities. …”
Get full text
Article -
185
Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro
Published 2015-04-01“…The web application also has IpTables firewall module to block attacker's IP address. The hardware used is Cisco IPS 4240, two computers Compaq Presario 4010F as client and gateway, and Cisco Catalyst 2960 switch. …”
Get full text
Article -
186
SDN-Enabled FiWi-IoT Smart Environment Network Traffic Classification Using Supervised ML Models
Published 2021-06-01“…We capture the different IoT and non-IoT device network traffic trace files based on the traffic flow and analyze the traffic traces to extract statistical attributes (port source and destination, IP address, etc.). We develop a robust IoT device classification process module framework, using these network-level attributes to classify IoT and non-IoT devices. …”
Get full text
Article -
187
QPSK communication between two nodes using USRP
Published 2017“…By assigning the fixed IP address to the device itself, the Windows PC will be able to detect the USRP X310. …”
Get full text
Final Year Project (FYP) -
188
SISTEM KOMUNIKASI TELEMEDIS BERBASIS JARINGAN PEER TO PEER
Published 2012“…Difficulty to access IP address in telemedicine can be handled by add virtua dedicated lines e.g. …”
Thesis -
189
High performance web servers using load balancing technique / Siti Aishah Ab Rahman
Published 2006“…The Round Robin method that will be use in this project is dispatcher-based load balancing cluster where the parallel services of servers can appear as a virtual service on a single IP address. For routing, Network Address Translation is a technique in which the source or destination addresses of IP packets are rewritten as they pass through a router or firewall.…”
Get full text
Student Project -
190
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…There is no easy way to this approach because attacker can spoof the source IP address easily. Traceback models try to locate source of attack regardless of whether the source address field in each packet contains false information or not. …”
Get full text
Thesis -
191
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…This system works by creating alerts built from an engine that reads the parameters in the attacker's IP address. Webmin is used to simplify rule management. …”
Get full text
Get full text
Conference or Workshop Item -
192
A Dual-Connectivity Mobility Link Service for Producer Mobility in the Named Data Networking
Published 2020-08-01“…Named Data Networking (NDN), which could request data by content name rather than location (IP address), is suitable for such mobile IoT environments. …”
Get full text
Article -
193
Analisa QoS Pada Penerapan Local IPTV Dalam Jaringan IEEE 802.11
Published 2020-05-01“…IPTV merupakan protokol aplikasi TCP/IP yang menggunakan pengalamatan internet (IP Address) dalam suatu jaringan telekomunikasi untuk pengiriman konten multimedia berbentuk audio video, yaitu berupa layanan siaran televisi digital. …”
Get full text
Article -
194
Ubiquitous Control of a CNC Machine: Proof of Concept for Industrial IoT Applications
Published 2021-12-01“…To avert potential cyber attacks or threats to a reasonable extent and to guarantee the security of the PoC, a multi-factor authentication (MFA) including an administrative password and an IP address is implemented to control the access to the web-based ubiquitous HMI proffered by the PoC.…”
Get full text
Article -
195
Content Management Based on Content Popularity Ranking in Information-Centric Networks
Published 2021-06-01“…Although the host-based Internet has been serving its users for a long time, managing network resources efficiently during high traffic load is problematic for the host-based Internet because locating the host with their IP address is one of the primary mechanisms behind this architecture. …”
Get full text
Article -
196
Cross channel fraud detection framework in financial services using recurrent neural networks
Published 2019“…Firstly, the study focuses on Feature Engineering where along raw attributes such as IP Address, Amount and other, two novel features for remote banking fraud are evaluated, i.e., the time spend on a page and the time between page transition. …”
Get full text
Thesis -
197
Mobile health applications digital evidence taxonomy with knowledge sharing approach for digital forensics readiness
Published 2020“…From the analysis of the result, various types of information for forensic investigation were acquired, such as type of outdoor activity, activity timestamp, client IP address and date accessed. In the final phase, the M-Health Digital Evidence Taxonomy System (MDETS) was developed as a proof of concept to demonstrate the integration of digital evidence taxonomy with the knowledge-sharing approach to facilitate digital forensic readiness. …”
Get full text
Get full text
Get full text
Thesis -
198
An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic
Published 2019“…The agent is equipped with three analysis functions that operate on three parameters of normal traffic intensity, traffic attack behavior, and IP address history log. The agent accordingly reacts on each of these attacks with different types of filtering actions as required. …”
Get full text
Get full text
Get full text
Thesis -
199
Mobile health applications digital evidence taxonomy with knowledge sharing approach for digital forensics readiness
Published 2020“…From the analysis of the result, various types of information for forensic investigation were acquired, such as type of outdoor activity, activity timestamp, client IP address and date accessed. In the final phase, the M-Health Digital Evidence Taxonomy System (MDETS) was developed as a proof of concept to demonstrate the integration of digital evidence taxonomy with the knowledge-sharing approach to facilitate digital forensic readiness. …”
Get full text
Get full text
Get full text
Thesis -
200
An adaptive protection of flooding attacks model for complex network environments
Published 2021“…There are three parameters on which the agent relies, normal traffic intensity, traffic attack behavior, and IP address history log, to decide on the operation of two traffic filters. …”
Get full text
Article