11 Questions 3 Answers 0 Followers
Questions related from Dhanabal Lakshmanan
I am in progress of designing a hybridized IDS. Which simulation tool can be used to validate the IDS model. Please suggest a quality data set too...
24 June 2015 1,132 6 View
A latest clustering algorithm to cluster attack records in an IDS
25 May 2015 5,380 1 View
How does normalization enable an IDS to detect an attack flow?
30 March 2015 4,438 4 View
I have planned to pursue research on network intrusion detection. Can anyone help me on how to extract information on anomalous flow from a live network connection?
06 March 2015 4,757 3 View
I'm interested in finding the latest papers on TCP SYN attacks.
05 June 2014 5,997 1 View
DDoS Attack Detection - Survey
25 May 2014 918 3 View
Simulation of Application Layer DDoS attack
09 April 2014 5,949 2 View
Application Layer - DDoS attack
15 February 2014 2,564 2 View
I am interested in attack pattern recognition.
05 October 2013 6,534 4 View
DDoS attack pattern determination.
06 April 2013 4,025 1 View
Attack on well known services running in webservers.
27 March 2013 1,623 3 View