Search Results - "Kalita, J K"
-
1
Network Anomaly Detection: Methods, Systems and Tools
Published in IEEE Communications surveys and tutorials (01-01-2014)“…Network anomaly detection is an important and dynamic research area. Many network intrusion detection methods and systems (NIDS) have been proposed in the…”
Get full text
Journal Article -
2
MIFS-ND: A mutual information-based feature selection method
Published in Expert systems with applications (15-10-2014)“…•We propose a greedy feature selection method using mutual information theory.•The method uses feature–class and feature–feature mutual information.•We use…”
Get full text
Journal Article -
3
Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions
Published in Computer journal (01-04-2014)“…Distributed denial of service (DDoS) attack is a coordinated attack, generally performed on a massive scale on the availability of services of a target system…”
Get full text
Journal Article -
4
Surveying Port Scans and Their Detection Methodologies
Published in Computer journal (01-10-2011)“…Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of Internet protocol addresses to find vulnerable hosts to…”
Get full text
Journal Article -
5
A multi-step outlier-based anomaly detection approach to network-wide traffic
Published in Information sciences (20-06-2016)“…•We propose a multi-step outlier-based anomaly detection approach to network-wide traffic.•We propose a feature selection algorithm to select relevant…”
Get full text
Journal Article -
6
Unmasking the common traits: an ensemble approach for effective malware detection
Published in International journal of information security (01-08-2024)“…Malware detection has become a critical aspect of ensuring the security and integrity of computer systems. With the ever-evolving landscape of malicious…”
Get full text
Journal Article -
7
Network attacks: Taxonomy, tools and systems
Published in Journal of network and computer applications (01-04-2014)“…To prevent and defend networks from the occurrence of attacks, it is highly essential that we have a broad knowledge of existing tools and systems available in…”
Get full text
Journal Article -
8
E‐LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
Published in Security and communication networks (10-11-2016)“…Distributed denial‐of‐service (DDoS) attacks cause havoc by exploiting threats to Internet services. In this paper, we propose E‐LDAT, a lightweight…”
Get full text
Journal Article -
9
BicBioEC: biclustering in biomarker identification for ESCC
Published in Network modeling and analysis in health informatics and bioinformatics (Wien) (01-12-2019)“…Analysis of gene expression patterns enables identification of significant genes related to a specific disease. We analyze gene expression data for esophageal…”
Get full text
Journal Article -
10
Detecting protein complexes based on a combination of topological and biological properties in protein-protein interaction network
Published in Journal of Genetic Engineering and Biotechnology (01-06-2018)“…Protein complexes are known to play a major role in controlling cellular activity in a living being. Identifying complexes from raw protein protein…”
Get full text
Journal Article -
11
A Fuzzy Mutual Information-based Feature Selection Method for Classification
Published in Fuzzy information and engineering (01-09-2016)“…In this paper, we present a feature selection method called Fuzzy Mutual Information-based Feature Selection with Non-Dominated solution (FMIFS-ND) using a…”
Get full text
Journal Article -
12
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
Published in Pattern recognition letters (01-01-2015)“…•Most common information metrics used in detecting DDoS attacks are discussed.•Empirical evaluation of information metrics for detecting DDoS attack is…”
Get full text
Journal Article -
13
An effective graph-based clustering technique to identify coherent patterns from gene expression data
Published in International journal of bioinformatics research and applications (2012)“…This paper presents an effective parameter-less graph based clustering technique (GCEPD). GCEPD produces highly coherent clusters in terms of various cluster…”
Get more information
Journal Article -
14
XSSD: A Cross-site Scripting Attack Dataset and its Evaluation
Published in 2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP) (01-02-2020)“…Cross-site Scripting (abbreviated as XSS) attacks are application level code injection attacks where a malicious user injects malicious scripts into the…”
Get full text
Conference Proceeding -
15
A survey of detection methods for XSS attacks
Published in Journal of network and computer applications (15-09-2018)“…Cross-site scripting attack (abbreviated as XSS) is an unremitting problem for the Web applications since the early 2000s. It is a code injection attack on the…”
Get full text
Journal Article -
16
Malware Dataset Generation and Evaluation
Published in 2020 IEEE 4th Conference on Information & Communication Technology (CICT) (03-12-2020)“…With the rapid growth of technology and IT-enabled services, the potential damage caused by malware is increasing rapidly. A large number of detection methods…”
Get full text
Conference Proceeding -
17
A Survey of Outlier Detection Methods in Network Anomaly Identification
Published in Computer journal (01-04-2011)“…The detection of outliers has gained considerable interest in data mining with the realization that outliers can be the key discovery to be made from very…”
Get full text
Journal Article -
18
Low-Rate and High-Rate Distributed DoS Attack Detection Using Partial Rank Correlation
Published in 2015 Fifth International Conference on Communication Systems and Network Technologies (01-04-2015)“…Distributed Denial of Service (DDoS) attacks pose a serious threat to efficient and uninterrupted Internet services. During Distributed Denial of Service…”
Get full text
Conference Proceeding -
19
MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method
Published in Computer journal (01-04-2014)“…With the growth of networked computers and associated applications, intrusion detection has become essential to keeping networks secure. A number of intrusion…”
Get full text
Journal Article -
20