6 Questions 2 Answers 0 Followers
Questions related from Dhanabal Lakshmanan
I am in progress of designing a hybridized IDS. Which simulation tool can be used to validate the IDS model. Please suggest a quality data set too...
24 June 2015 1,123 6 View
A latest clustering algorithm to cluster attack records in an IDS
25 May 2015 5,365 1 View
How does normalization enable an IDS to detect an attack flow?
30 March 2015 4,425 4 View
I have planned to pursue research on network intrusion detection. Can anyone help me on how to extract information on anomalous flow from a live network connection?
06 March 2015 4,744 3 View
Application Layer - DDoS attack
15 February 2014 2,550 2 View
DDoS attack pattern determination.
06 April 2013 4,014 1 View