[[abstract]]The aim of this study is to protect an electronic mail (email) server system based on an integrated Entropy calculation via detecting flooding attacks. Lots of approaches have been proposed by many researchers to detect packets accessing email whether are belonging to the normal or abnormal packets. Entropy is an approach of the mathematical theory of Communication; it can be used to measure the uncertainty or randomness in a random variable. A normal email server usually supports the four protocols consists of Simple Mail Transfer Protocol (SMTP), Post Office Protocol version 3 (POP3), Internet Message Access Protocol version 4 (IMAP4), and HTTPS being used by remote web-based email. However, in Internet, there are many floodin...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
Ransomware consists of malicious codes that restrict users from accessing their own files while dema...
Targeted Malicious Email (TME) has become more dangerous because it gathers user sensitive informati...
[[abstract]]In recent years, there have been many approaches proposed by many researchers to detect ...
Part 9: ATIMCNInternational audienceIn this paper, we propose a new approach of detecting a kind of ...
AbstractDenial of service attack and Distributed Denial of Service attacks are becoming an increasin...
Abstract- Many detection techniques against worms, denial of service attacks and botnets on the Inte...
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources whic...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
Email is a crucial part of our daily life, but email systems are facing increasing security threats ...
Abstract: Distributed Denial of Service (DDoS) attack launched in Cloud computing environment result...
Internet is widely spread in each corner of the world. With rapidly growing the use of computer reso...
DDoS attacks whose are embedded in spam emails are increasingly becoming numerous and sophisticated ...
Intrusion Detection System (IDS) typically generates a huge number of alerts with high false rate, e...
In information theory, entropies make up of the basis for distance and divergence measures among var...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
Ransomware consists of malicious codes that restrict users from accessing their own files while dema...
Targeted Malicious Email (TME) has become more dangerous because it gathers user sensitive informati...
[[abstract]]In recent years, there have been many approaches proposed by many researchers to detect ...
Part 9: ATIMCNInternational audienceIn this paper, we propose a new approach of detecting a kind of ...
AbstractDenial of service attack and Distributed Denial of Service attacks are becoming an increasin...
Abstract- Many detection techniques against worms, denial of service attacks and botnets on the Inte...
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources whic...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
Email is a crucial part of our daily life, but email systems are facing increasing security threats ...
Abstract: Distributed Denial of Service (DDoS) attack launched in Cloud computing environment result...
Internet is widely spread in each corner of the world. With rapidly growing the use of computer reso...
DDoS attacks whose are embedded in spam emails are increasingly becoming numerous and sophisticated ...
Intrusion Detection System (IDS) typically generates a huge number of alerts with high false rate, e...
In information theory, entropies make up of the basis for distance and divergence measures among var...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
Ransomware consists of malicious codes that restrict users from accessing their own files while dema...
Targeted Malicious Email (TME) has become more dangerous because it gathers user sensitive informati...