Research explorer tool

17 results

Intrusion detection using GSAD model for HTTP traffic on web services

Conference Proceeding
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. P. (2010)
Intrusion detection using GSAD model for HTTP traffic on web services. In IWCMC '10 Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, (1193-1197). https://doi.org/10.1145/1815396.1815669
Intrusion detection systems are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. Hypertext Transport Protocol (HTT...

Intrusion Detection Using Geometrical Structure

Conference Proceeding
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. (2009)
Intrusion Detection Using Geometrical Structure. In Fourth International Conference on Frontier of Computer Science and Technology, 2009. FCST '09, (327-333). https://doi.org/10.1109/fcst.2009.97
We propose a statistical model, namely Geometrical Structure Anomaly Detection (GSAD) to detect intrusion using the packet payload in the network. GSAD takes into account the ...

An Intrusion Detection System Based on Polynomial Feature Correlation Analysis

Conference Proceeding
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017)
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/I​SPA Conference Proceedingshttps://doi.org/10.1109/trustcom/bigdatase/icess.2017.340
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...

A framework for data security in cloud using collaborative intrusion detection scheme

Conference Proceeding
Nagar, U., Nanda, P., He, X., & Tan, Z. (. (2017)
A framework for data security in cloud using collaborative intrusion detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks. , (188-193). https://doi.org/10.1145/3136825.3136905
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors

Conference Proceeding
Kumar Mishra, A., Kumar Tripathy, A., Obaidat, M. S., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (2018)
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 89-98. https://doi.org/10.5220/0006850602550264
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...

Reviving legacy enterprise systems with microservice-based architecture within cloud environments

Conference Proceeding
Habibullah, S., Liu, X., Tan, Z., Zhang, Y., & Liu, Q. (2019)
Reviving legacy enterprise systems with microservice-based architecture within cloud environments. In Computer Science Conference Proceedingshttps://doi.org/10.5121/csit.2019.90713
Evolution has always been a challenge for enterprise computing systems. The microservice based architecture is a new design model which is rapidly becoming one of the most eff...

Network Intrusion Detection based on LDA for payload feature selection

Conference Proceeding
Tan, Z., Jamdagni, A., He, X., & Nanda, P. (2010)
Network Intrusion Detection based on LDA for payload feature selection. In 2010 IEEE Globecom Workshopshttps://doi.org/10.1109/glocomw.2010.5700198