Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 12
Page No. 3108 - 3112

A Semi Supervised Hybrid Protection for Network and Host Based Attacks

Authors : JaspreetKaur

References

Agarwal, M., S. Biswas and S. Nandi, 2013. Detection of de-authentication denial of service attack in 802.11 networks. Proceedings of the 2013 Annual IEEE Conference on India (INDICON), December 13-15, 2013, IEEE, Guwahati, India, ISBN:978-1-4799-2276-5, pp: 1-6.

Davi, L., A. Dmitrienko, A.R. Sadeghi and M. Winandy, 2010. Privilege escalation attacks on android. Proceedings of the 13th International Conference on Information Security 2010, October 25-28, 2010, Springer, Boca Raton, Florida, pp: 346-360.

Gandotra, E., D. Bansal and S. Sofat, 2014. Malware analysis and classification: A survey. J. Inf. Sec., 2014: 1-9.
CrossRef  |  Direct Link  |  

Keragala, D., 2016. Detecting malware and sandbox evasion techniques. SANS Institute, USA.

Korcak, M., L. Jaroslav and J. Frantisek, 2014. Intrusion prevention /intrusion detection system (IPS/IDS) for wifi networks. Intl. J. Comput. Netw. Commun., 6: 77-89.
CrossRef  |  Direct Link  |  

Nevlud, P., M. Bures, L. Kapicak and J. Zdralek, 2013. Anomaly-based network intrusion detection methods. Adv. Electr. Electron. Eng., 11: 468-474.
Direct Link  |  

Peterson, D.S., M. Bishop and R. Pandey, 2002. A flexible containment mechanism for executing untrusted code. Proceedings of the Usenix Symposium on Security, August 7, 2002, Usenix, Santa Clara, California, pp: 207-225.

Potter, B., 2004. Wireless intrusion detection. Netw. Secur., 2004: 4-5.
Direct Link  |  

Roesch, M., 1999. Snort: Lightweight Intrusion Detection for Networks. Proceedings of the 13th USENIX conference on System Administration, November 7-12, 1999, Seattle, Washington, USA., pp: 229-238.

Teller, T., 2013. Detecting the one percent: Advanced targeted malware detection. Proceedings of the RSA Conference on Antivirus Vol. 8, February 25-March 1, 2013, Moscone Center, San Francisco, USA., pp: 1-38.

Veeramachaneni, K., I. Arnaldo, V. Korrapati, C. Bassias and K. Li, 2016. AI2: Training a big data machine to defend. Proceedings of the 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity) and IEEE International Conference on High Performance and Smart Computing (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), April 9-10, 2016, IEEE, Cambridge, Massachusetts, ISBN:978-1-5090-2403-2, pp: 49-54.

Yusuf, B., 2005. Layer 2 attacks and mitigation techniques. Cisco Systems, San Jose, California. http://www.sanog.org/resources/sanog7/yusuf-L2-attack-mitigation.pdf

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved