Browsing by Author "Jamdagni, Aruna"

UTSePress Research/Manakin Repository

Search UTSePress Research

Browse

My Account

Browsing by Author "Jamdagni, Aruna"

Sort by: Order: Results:

  • Jamdagni, Aruna; Nanda, Priyadarsi; Liu, Ren Ping; Tan, Thomas; He, Sean (Springer-Verlag, 2011)
    The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a ...
  • Jamdagni, Aruna; Liu, Renping; Nanda, Priyadarsi; Tan, Thomas; He, Sean (CSIRO, 2009)
    The growth of Internet offers quality and convenience to human life, but at the same time provides a platform for hackers and criminals. The Internet security hence becomes an important issue. Intrusion Detection System ...
  • Jamdagni, Aruna; Nanda, Priyadarsi; Liu, Renping; Tan, Thomas; He, Sean (IEEE Computer Society, 2009)
    Geometrical Structure Anomaly Detection (GSAD) model to detect intrusion using the packet payload in the network. GSAD takes into account the correlations among the packet payload features arranged in a geometrical ...
  • Jamdagni, Aruna; Nanda, Priyadarsi; Liu, Renping; Tan, Thomas; He, Sean (Association for Computing Machinery, Inc. (ACM), 2010)
    Intrusion detection systems are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. Hypertext Transport Protocol (HTTP) is used for new applications without much ...
  • Jamdagni, Aruna; Nanda, Priyadarsi; Liu, Ren Ping; Tan, Thomas; He, Sean (SECAU - Security Research Centre, 2010)
    Web servers and web-based applications are commonly used as attack targets. The main issues ar how to prevent unauthorised access and to protect web servers from the attack. Intrusion Detection Systems (IDSs) are widely ...
  • Jamdagni, Aruna; Nanda, Priyadarsi; Liu, Ren Ping; Tan, Thomas; He, Sean (Springer Verlag, 2011)
    The quality of feature has significant impact on the performance of detection techniques used for Denial-of-Service (DoS) attack. The features that fail to provide accurate characterization for network traffic records ...
  • Jamdagni, Aruna; Nanda, Priyadarsi; Tan, Thomas; He, Sean (IEEE Computer Society, 2010)
    Anomaly Intrusion Detection System (IDS) is a statistical based network IDS which can detect attack variants and nove attacks without a priori knowledge. Current anomaly IDSs are inefficient for real-time detection because ...
  • Jamdagni, Aruna; Liu, Ren Ping; Nanda, Priyadarsi; Tan, Thomas; He, Sean (CSIRO, 2010)
    The universal use of the Internet has made it more difficult to achieve high security. Attackers target web applications instead of Telnet ports. Cyber-attacks and breaches of information security are increasing in ...
  • Jamdagni, Aruna (2012)
    Internet provides quality and convenience to human life but at the same time it provides a platform for network hackers and criminals. Intrusion Detection Systems (IDSs) have been proven to be powerful methods for detecting ...
  • Jamdagni, Aruna; Nanda, Priyadarsi; Liu, Renping; Tan, Thomas; He, Sean (Elsevier BV, 2013)
    Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of existing systems lack the ability to process data ...
  • Jamdagni, Aruna; Nanda, Priyadarsi; Liu, Ren Ping; Tan, Thomas; He, Sean (IEEE Computer Society, 2012)
    Cloud computing plays an important role in current converged networks. It brings convenience of accessing services and information to users regardless of location and time. However, there are some critical security ...
  • Jamdagni, Aruna; Nanda, Priyadarsi; Liu, Ren Ping; Jia, Wenjing; Yeh, Wei-Chang; Tan, Thomas; He, Sean (Springer, 2010)
    Computational cost is one of the major concerns of the commercial Intrusion Detection Systems (IDSs). Although these systems are proven to be promising in detecting network attacks, they need to check all the signatures ...