-
A Novel Header Matching Algorithm for Intrusion Detection Systems
Abstract: The evolving necessity of the Internet increases the demand on the bandwidth. Therefore, this demand opens the doors for the hackers' community to develop new methods and techniques to gain control over networking systems. Hence, the intrusion detection systems (IDS) are insufficient to prevent/detect unauthorized access the network. Network Intrusion Detection System (NIDS) is one example that st… ▽ More
Submitted 5 August, 2011; originally announced August 2011.
Comments: 15 pages, 7 Figures, 2 Tables
Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011
-
An innovative platform to improve the performance of exact string matching algorithms
Abstract: Exact String Matching is an essential issue in many computer science applications. Unfortunately, the performance of Exact String Matching algorithms, namely, executing time, does not address the needs of these applications. This paper proposes a general platform for improving the existing Exact String Matching algorithms executing time, called the PXSMAlg platform. The function of this platform… ▽ More
Submitted 11 February, 2010; originally announced February 2010.
Comments: IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
Report number: Journal of Computer Science, ISSN 1947 5500
Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 280-283, January 2010, USA
-
Comparative Evaluation and Analysis of IAX and RSW
Abstract: Voice over IP (VoIP) is a technology to transport media over IP networks such as the Internet. VoIP has the capability of connecting people over packet switched networks instead of traditional circuit switched networks. Recently, the InterAsterisk Exchange Protocol (IAX) has emerged as a new VoIP which is gaining popularity among VoIP products. IAX is known for its simplicity, NAT friendliness,… ▽ More
Submitted 13 January, 2010; originally announced January 2010.
Comments: 3 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS December 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
Report number: Volume 6, No. 3, ISSN 1947 5500
Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 3, pp. 250-252, December 2009, USA
-
Detecting Botnet Activities Based on Abnormal DNS traffic
Abstract: IThe botnet is considered as a critical issue of the Internet due to its fast growing mechanism and affect. Recently, Botnets have utilized the DNS and query DNS server just like any legitimate hosts. In this case, it is difficult to distinguish between the legitimate DNS traffic and illegitimate DNS traffic. It is important to build a suitable solution for botnet detection in the DNS traffic an… ▽ More
Submitted 2 November, 2009; originally announced November 2009.
Comments: 8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
Report number: ISSN 1947 5500
Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 097-104, October 2009, USA