Many new devices, such as phones and tablets as well as traditional computer systems, rely on wireless connections to the Internet and are susceptible to attacks. Two important types of attacks are the use of malware and exploiting Internet protocol vulnerabilities in devices and network systems. These attacks form a threat on many levels and therefore any approach to dealing with these nefarious attacks will take several methods to counter. In this research, we utilize machine learning to detect and classify malware, visualize, detect and classify worms, as well as detect deauthentication attacks, a form of Denial of Service (DoS). This work also includes two prevention mechanisms for DoS attacks, namely a one- time password (OTP) and thro...
Denial-of-Service (DoS) attacks are aimed at shutting a machine or network down to block users from ...
The landscape of network analysis is ever-evolving as the fields of technology and business progress...
An ad hoc network is a transient network that is self-organizing and does not require any infrastruc...
Many new devices, such as phones and tablets as well as traditional computer systems, rely on wirele...
Recently, intrusion detection systems (IDS) have become an essential part of most organisations’ sec...
The rapid evolution and growth of the internet through the last decades led to more concern about c...
Rapid shifting by government sectors and companies to provide their services and products over the i...
Internet usage has become essential for correspondence in almost every calling in our digital age. T...
With the rapid development of a computer network, our lives are already inseparable from it. Wireles...
Early detection of attacks and indicators of compromise is critical in identifying and mitigating th...
The author has not given permission for Aaltodoc -publishing.Intrusion detection systems are conside...
In cybersecurity, machine/deep learning approaches can predict and detect threats before they result...
Distributed denial of service attacks threaten the security and health of the Internet. These attack...
Today’s popularity of the internet has since proven an effective and efficient means of information ...
Cyber threats against the Department of Defense (DOD) and the greater U.S. public create an ever-inc...
Denial-of-Service (DoS) attacks are aimed at shutting a machine or network down to block users from ...
The landscape of network analysis is ever-evolving as the fields of technology and business progress...
An ad hoc network is a transient network that is self-organizing and does not require any infrastruc...
Many new devices, such as phones and tablets as well as traditional computer systems, rely on wirele...
Recently, intrusion detection systems (IDS) have become an essential part of most organisations’ sec...
The rapid evolution and growth of the internet through the last decades led to more concern about c...
Rapid shifting by government sectors and companies to provide their services and products over the i...
Internet usage has become essential for correspondence in almost every calling in our digital age. T...
With the rapid development of a computer network, our lives are already inseparable from it. Wireles...
Early detection of attacks and indicators of compromise is critical in identifying and mitigating th...
The author has not given permission for Aaltodoc -publishing.Intrusion detection systems are conside...
In cybersecurity, machine/deep learning approaches can predict and detect threats before they result...
Distributed denial of service attacks threaten the security and health of the Internet. These attack...
Today’s popularity of the internet has since proven an effective and efficient means of information ...
Cyber threats against the Department of Defense (DOD) and the greater U.S. public create an ever-inc...
Denial-of-Service (DoS) attacks are aimed at shutting a machine or network down to block users from ...
The landscape of network analysis is ever-evolving as the fields of technology and business progress...
An ad hoc network is a transient network that is self-organizing and does not require any infrastruc...