Analysis and simulation of DOS attack detection using dependency and correlation Muhammad Abu Baker Ilyas
Publisher: Rawalpindi MCS (NUST) April 2007Description: xi, 91, pSubject(s): PG Thesis | MSIS-1DDC classification: 005.8
Contents:
Introduction (page-1) Anatomy of denial of service attacks (page-6) Survey of Major denial of service incidents (page-21) Detecting and mitigating denial of service attacks (page-33) Detecting sources of dos attacks (page-44) Proposed feature selection method (page-61) Implementation and results (page-70) Conclusion and future work (page-81).
| Item type | Current location | Home library | Collection | Call number | URL | Status | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|---|---|
Book
|
Military College of Signals (MCS) | Military College of Signals (MCS) | NFIC | 005.8 ILY (Browse shelf) | Link to resource | Available | MCSTIS-21 | ||
Book
|
Military College of Signals (MCS) | Military College of Signals (MCS) | NFIC | 005.8 ILY (Browse shelf) | Link to resource | Available | MCSTIS-71 |
Total holds: 0
Introduction (page-1) Anatomy of denial of service attacks (page-6) Survey of Major denial of service incidents (page-21) Detecting and mitigating denial of service attacks (page-33) Detecting sources of dos attacks (page-44) Proposed feature selection method (page-61) Implementation and results (page-70) Conclusion and future work (page-81).
Almirah No 70 Shelf No 4

Book
There are no comments on this title.