11 Questions 3 Answers 0 Followers
Questions related from Dhanabal Lakshmanan
I am in progress of designing a hybridized IDS. Which simulation tool can be used to validate the IDS model. Please suggest a quality data set too...
24 June 2015 1,149 6 View
A latest clustering algorithm to cluster attack records in an IDS
25 May 2015 5,416 1 View
How does normalization enable an IDS to detect an attack flow?
30 March 2015 4,466 4 View
I have planned to pursue research on network intrusion detection. Can anyone help me on how to extract information on anomalous flow from a live network connection?
06 March 2015 4,775 3 View
I'm interested in finding the latest papers on TCP SYN attacks.
05 June 2014 6,008 1 View
DDoS Attack Detection - Survey
25 May 2014 927 3 View
Simulation of Application Layer DDoS attack
09 April 2014 5,956 2 View
Application Layer - DDoS attack
15 February 2014 2,585 2 View
I am interested in attack pattern recognition.
05 October 2013 6,543 4 View
DDoS attack pattern determination.
06 April 2013 4,036 1 View
Attack on well known services running in webservers.
27 March 2013 1,631 3 View